Overview
overview
7Static
static
3Setup.exe
windows7-x64
3Setup.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ON.dll
windows7-x64
3$PLUGINSDI...ON.dll
windows10-2004-x64
3Resubmissions
21-09-2024 00:46
240921-a45chsxdjj 721-09-2024 00:46
240921-a4v4vaxbkb 720-09-2024 23:15
240920-28kx8atfjl 7Analysis
-
max time kernel
69s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 23:15
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/inetc.dll
-
Size
38KB
-
MD5
a35cdc9cf1d17216c0ab8c5282488ead
-
SHA1
ed8e8091a924343ad8791d85e2733c14839f0d36
-
SHA256
a793929232afb78b1c5b2f45d82094098bcf01523159fad1032147d8d5f9c4df
-
SHA512
0f15b00d0bf2aabd194302e599d69962147b4b3ef99e5a5f8d5797a7a56fd75dd9db0a667cfba9c758e6f0dab9ced126a9b43948935fe37fc31d96278a842bdf
-
SSDEEP
384:njt65uI9oYzcCaHjl9Cb4I1f0AGhrHXoREnRxtIpH/u0abJ2v2DW9O9tk8ZwkpwD:noHtNQoRSIwTJB6Q/kPyBp6
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2188 2988 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1592 wrote to memory of 2988 1592 rundll32.exe 30 PID 1592 wrote to memory of 2988 1592 rundll32.exe 30 PID 1592 wrote to memory of 2988 1592 rundll32.exe 30 PID 1592 wrote to memory of 2988 1592 rundll32.exe 30 PID 1592 wrote to memory of 2988 1592 rundll32.exe 30 PID 1592 wrote to memory of 2988 1592 rundll32.exe 30 PID 1592 wrote to memory of 2988 1592 rundll32.exe 30 PID 2988 wrote to memory of 2188 2988 rundll32.exe 31 PID 2988 wrote to memory of 2188 2988 rundll32.exe 31 PID 2988 wrote to memory of 2188 2988 rundll32.exe 31 PID 2988 wrote to memory of 2188 2988 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\inetc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\inetc.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 2363⤵
- Program crash
PID:2188
-
-