Analysis
-
max time kernel
33s -
max time network
18s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
29-09-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
fix/ErrorDetails.dll
Resource
win10-20240404-en
General
-
Target
fix/x86_64-w64-ranlib.exe
-
Size
706KB
-
MD5
3e00b2ac577756508194da0c22034e44
-
SHA1
1fa05fd59f9f76eee4802af1c7106adceaa0e455
-
SHA256
803ef9e29b6f457ef4c3ef1c946a2dd50def32a4b307afb5a8ea72d05a270086
-
SHA512
986da32de1f706cad06e73f0a4386ca3926555b5fa85a19f335f2d16633aeb13b988decc54f0b0a351049ad74fd839323cb75403bbbd5775f157ef5e1c9f91b5
-
SSDEEP
6144:N6yVP6bIPM4t4+/2M/6FG6Sv8qLYOeRJdzsW5LDVE+dPHemjrPoeSFzbby:FPMS7FSFGn8qLYpRJdzh9hdPjjrPoT2
Malware Config
Extracted
lumma
Extracted
lumma
https://possiwreeste.site/api
https://underlinemdsj.site/api
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3296 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 3296 set thread context of 2072 3296 rundll32.exe aspnet_regiis.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exeaspnet_regiis.exex86_64-w64-ranlib.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x86_64-w64-ranlib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
x86_64-w64-ranlib.execmd.exerundll32.exedescription pid process target process PID 1452 wrote to memory of 4428 1452 x86_64-w64-ranlib.exe cmd.exe PID 1452 wrote to memory of 4428 1452 x86_64-w64-ranlib.exe cmd.exe PID 1452 wrote to memory of 4428 1452 x86_64-w64-ranlib.exe cmd.exe PID 4428 wrote to memory of 3296 4428 cmd.exe rundll32.exe PID 4428 wrote to memory of 3296 4428 cmd.exe rundll32.exe PID 4428 wrote to memory of 3296 4428 cmd.exe rundll32.exe PID 3296 wrote to memory of 2072 3296 rundll32.exe aspnet_regiis.exe PID 3296 wrote to memory of 2072 3296 rundll32.exe aspnet_regiis.exe PID 3296 wrote to memory of 2072 3296 rundll32.exe aspnet_regiis.exe PID 3296 wrote to memory of 2072 3296 rundll32.exe aspnet_regiis.exe PID 3296 wrote to memory of 2072 3296 rundll32.exe aspnet_regiis.exe PID 3296 wrote to memory of 2072 3296 rundll32.exe aspnet_regiis.exe PID 3296 wrote to memory of 2072 3296 rundll32.exe aspnet_regiis.exe PID 3296 wrote to memory of 2072 3296 rundll32.exe aspnet_regiis.exe PID 3296 wrote to memory of 2072 3296 rundll32.exe aspnet_regiis.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fix\x86_64-w64-ranlib.exe"C:\Users\Admin\AppData\Local\Temp\fix\x86_64-w64-ranlib.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Roaming\msvcp110.dll,GetGameData2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Roaming\msvcp110.dll,GetGameData3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554KB
MD50619f2ae3728e652d6f6518733ce66c6
SHA118daacd593425b947dacb09066b620aa322e2520
SHA256745d33c9f3089b1b59cd26e61e146c6180708b6e203e4b5aab15e0f0bbc311c3
SHA512e18e67fc9406f349b14a2cf171fecd63f64010f56fe85704d3e79386531b1aa1f24c04a4bdd26bc68c0a89cf6bff2d740e6e5d486f33e73b1c11c3ce58bc85d5