Overview
overview
7Static
static
3disk_recov...up.exe
windows7-x64
7disk_recov...up.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3BlackShark.exe
windows7-x64
1BlackShark.exe
windows10-2004-x64
3Disk Recov...rd.exe
windows7-x64
7Disk Recov...rd.exe
windows10-2004-x64
7FLUSH.exe
windows7-x64
FLUSH.exe
windows10-2004-x64
MIG_29.dll
windows7-x64
3MIG_29.dll
windows10-2004-x64
3PascalStreams.dll
windows7-x64
3PascalStreams.dll
windows10-2004-x64
3StarBurn.dll
windows7-x64
3StarBurn.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3WiaDll.dll
windows7-x64
4WiaDll.dll
windows10-2004-x64
4bs_load.dll
windows7-x64
3bs_load.dll
windows10-2004-x64
3bs_wm.dll
windows7-x64
3bs_wm.dll
windows10-2004-x64
3contmenu.dll
windows7-x64
3contmenu.dll
windows10-2004-x64
3gdiplus.dll
windows7-x64
3gdiplus.dll
windows10-2004-x64
3Analysis
-
max time kernel
136s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
disk_recovery_wizard_setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
disk_recovery_wizard_setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
BlackShark.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
BlackShark.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Disk Recovery Wizard.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Disk Recovery Wizard.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
FLUSH.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
FLUSH.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
MIG_29.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
MIG_29.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
PascalStreams.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
PascalStreams.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
StarBurn.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
StarBurn.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
WiaDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
WiaDll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
bs_load.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
bs_load.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
bs_wm.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
bs_wm.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
contmenu.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
contmenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
gdiplus.dll
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
gdiplus.dll
Resource
win10v2004-20240910-en
General
-
Target
WiaDll.dll
-
Size
40KB
-
MD5
18bb16df754bac73d670b945d721247e
-
SHA1
6c327d84e2afa4a6acbaadcabce5dca6410de30d
-
SHA256
eb69efd10a60d308d47965771aa66aab8b746f82d627f2d1cc47b162e3290dc6
-
SHA512
65ea31b8e989641cfacd249a26035e85564995ac9cfb1d72ce04f499828a76e9d928f3c822caa5d9ff1fe0e8008862d0666dfd73532dab402563dca5132f6981
-
SSDEEP
768:Os44cEDZtkBEMOurZaL8A+qmTNSMkFEDksaj:T4/gt+EMOurZaL8/q9qD3aj
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 748 wrote to memory of 1560 748 rundll32.exe 90 PID 748 wrote to memory of 1560 748 rundll32.exe 90 PID 748 wrote to memory of 1560 748 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\WiaDll.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\WiaDll.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1560
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4008,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:81⤵PID:4108