Overview
overview
8Static
static
3assets.appx
windows7-x64
assets.appx
windows10-2004-x64
PsfRunDll32.exe
windows7-x64
1PsfRunDll32.exe
windows10-2004-x64
3PsfRunDll64.exe
windows7-x64
1PsfRunDll64.exe
windows10-2004-x64
1PsfRuntime32.dll
windows7-x64
3PsfRuntime32.dll
windows10-2004-x64
3PsfRuntime64.dll
windows7-x64
1PsfRuntime64.dll
windows10-2004-x64
1StartingSc...er.ps1
windows7-x64
3StartingSc...er.ps1
windows10-2004-x64
3VFS/AppDat...pg.exe
windows7-x64
1VFS/AppDat...pg.exe
windows10-2004-x64
3VFS/AppDat...nv.dll
windows7-x64
3VFS/AppDat...nv.dll
windows10-2004-x64
3cdj.ps1
windows7-x64
3cdj.ps1
windows10-2004-x64
8main-x86.appx
windows7-x64
main-x86.appx
windows10-2004-x64
scale-125.appx
windows7-x64
scale-125.appx
windows10-2004-x64
scale-150.appx
windows7-x64
scale-150.appx
windows10-2004-x64
scale-200.appx
windows7-x64
scale-200.appx
windows10-2004-x64
scale-400.appx
windows7-x64
scale-400.appx
windows10-2004-x64
Analysis
-
max time kernel
7s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
assets.appx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
assets.appx
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
PsfRunDll32.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
PsfRunDll32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
PsfRunDll64.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PsfRunDll64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
PsfRuntime32.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
PsfRuntime32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
PsfRuntime64.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
PsfRuntime64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
StartingScriptWrapper.ps1
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
StartingScriptWrapper.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
VFS/AppData/local/gpg.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
VFS/AppData/local/gpg.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
VFS/AppData/local/iconv.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
VFS/AppData/local/iconv.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
cdj.ps1
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
cdj.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
main-x86.appx
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
main-x86.appx
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
scale-125.appx
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
scale-125.appx
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
scale-150.appx
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
scale-150.appx
Resource
win10v2004-20240910-en
Behavioral task
behavioral25
Sample
scale-200.appx
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
scale-200.appx
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
scale-400.appx
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
scale-400.appx
Resource
win10v2004-20240802-en
General
-
Target
PsfRuntime32.dll
-
Size
341KB
-
MD5
1f4025731397555f1f98c1deeda8a09c
-
SHA1
f0794fe1618ab94105bc2666a727008d15ff4d7d
-
SHA256
36f592cf70f944e63007659305729b44ec9def9373800b02bbdd0ec520a175b0
-
SHA512
3f0e5226dcc1ee3795a798a2087f590b26551491add90488760cb07c129f6a7c119dccf380ef0664ec5c6ab4b19faef7f82d65ef137fc0bad179b4697e6bed9a
-
SSDEEP
6144:vmgCWF608HGAfV1U2YBXVluknXF7ySuaxZuKFJJxH1Y6vv:vmgIGAfQ2YBXjuknnbJxLvv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2372 2356 rundll32.exe 29 PID 2356 wrote to memory of 2372 2356 rundll32.exe 29 PID 2356 wrote to memory of 2372 2356 rundll32.exe 29 PID 2356 wrote to memory of 2372 2356 rundll32.exe 29 PID 2356 wrote to memory of 2372 2356 rundll32.exe 29 PID 2356 wrote to memory of 2372 2356 rundll32.exe 29 PID 2356 wrote to memory of 2372 2356 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\PsfRuntime32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\PsfRuntime32.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2372
-