Overview
overview
9Static
static
3windirstat...up.exe
windows10-2004-x64
9$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$_5_.exe
windows10-2004-x64
9Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows10-2004-x64
3shfolder.dll
windows10-2004-x64
3wdsh0407.chm
windows10-2004-x64
1wdsh040e.chm
windows10-2004-x64
1wdsh0415.chm
windows10-2004-x64
1wdsr0405.dll
windows10-2004-x64
1wdsr0407.dll
windows10-2004-x64
1wdsr040a.dll
windows10-2004-x64
1wdsr040b.dll
windows10-2004-x64
1wdsr040c.dll
windows10-2004-x64
1wdsr040e.dll
windows10-2004-x64
1wdsr0410.dll
windows10-2004-x64
1wdsr0413.dll
windows10-2004-x64
1wdsr0415.dll
windows10-2004-x64
1wdsr0419.dll
windows10-2004-x64
1wdsr0425.dll
windows10-2004-x64
1windirstat.chm
windows10-2004-x64
1windirstat.exe
windows10-2004-x64
9Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
windirstat1_1_2_setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral4
Sample
$_5_.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
shfolder.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
wdsh0407.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
wdsh040e.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
wdsh0415.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
wdsr0405.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
wdsr0407.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
wdsr040a.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
wdsr040b.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
wdsr040c.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
wdsr040e.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral17
Sample
wdsr0410.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
wdsr0413.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
wdsr0415.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
wdsr0419.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
wdsr0425.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
windirstat.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
windirstat.exe
Resource
win10v2004-20240802-en
General
-
Target
shfolder.dll
-
Size
22KB
-
MD5
33c369a535290299ed5e5167cea37fdc
-
SHA1
4ea387cb55cada35de02738dfb324ab830d416f4
-
SHA256
e69da5febb5a2932cbe731e32a5d7f6615bb987a119ef2cedead4555d86144e8
-
SHA512
581f2bf315c90e200fd621477d0192c6b3b4c51575b9d9f8c85114783c4425a7de221898055aa275068e4c6c5fb0458eb13a66b4512cc7499e7cc7843aaf9e78
-
SSDEEP
384:kqXjRYAhfBALfdpju122HoSHigH2euwsHTGHVb+d3HmnH+aHjHqLHxmoqQG0CHuz:kWjRLhZAL7juAL4+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4988 wrote to memory of 4344 4988 rundll32.exe rundll32.exe PID 4988 wrote to memory of 4344 4988 rundll32.exe rundll32.exe PID 4988 wrote to memory of 4344 4988 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\shfolder.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\shfolder.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4344