Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
7378d17da044e619988f03a2b03b2c5e1b9edfc0f16102bbf0747fedde0482eb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7378d17da044e619988f03a2b03b2c5e1b9edfc0f16102bbf0747fedde0482eb.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ActiveX/BROWSER2UC.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
ActiveX/BROWSER2UC.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
12KB
-
MD5
1e8f2fefe3ce893b117b26948b8978cb
-
SHA1
59cfc6c3f5716e91609e54ca80ae8b06c93ef8ab
-
SHA256
8203ae1589a50e6ff012e5d27bdd4f8ed7506077ca9b052827f5e90aaeb98519
-
SHA512
b3c36e1aa5d3ee5f482f4175a7d6fe10cf2bf3bd3423ab4266d11c4181cfbc7e3f66a30855034a8ec026a4d5987598f0116e98519b7445d9e5687bcbab2c0e5c
-
SSDEEP
192:qzixixDOHhG9db9rd+oSVPECMlh3I8tqDyng7hwbbHF1QuCb:qOx0DOHqrdwTY6+ng72bbMum
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2256 2252 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 588 wrote to memory of 2252 588 rundll32.exe 30 PID 588 wrote to memory of 2252 588 rundll32.exe 30 PID 588 wrote to memory of 2252 588 rundll32.exe 30 PID 588 wrote to memory of 2252 588 rundll32.exe 30 PID 588 wrote to memory of 2252 588 rundll32.exe 30 PID 588 wrote to memory of 2252 588 rundll32.exe 30 PID 588 wrote to memory of 2252 588 rundll32.exe 30 PID 2252 wrote to memory of 2256 2252 rundll32.exe 31 PID 2252 wrote to memory of 2256 2252 rundll32.exe 31 PID 2252 wrote to memory of 2256 2252 rundll32.exe 31 PID 2252 wrote to memory of 2256 2252 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 2483⤵
- Program crash
PID:2256
-
-