Overview
overview
8Static
static
3FarmFrenzy...er.exe
windows10-1703-x64
8$PLUGINSDI...if.dll
windows10-1703-x64
3$PLUGINSDI...nt.dll
windows10-1703-x64
3$PLUGINSDIR/INetC.dll
windows10-1703-x64
3$PLUGINSDI...ss.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDI...sh.dll
windows10-1703-x64
3$PLUGINSDI...gs.dll
windows10-1703-x64
3$PLUGINSDI...nz.dll
windows10-1703-x64
3Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30-09-2024 12:02
Static task
static1
Behavioral task
behavioral1
Sample
FarmFrenzyInstaller.exe
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/AnimGif.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/INetC.dll
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NsisWindowSubClass.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/newadvsplash.dll
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10-20240404-en
General
-
Target
$PLUGINSDIR/newadvsplash.dll
-
Size
8KB
-
MD5
55a723e125afbc9b3a41d46f41749068
-
SHA1
01618b26fec6b8c6bdb866e6e4d0f7a0529fe97c
-
SHA256
0a70cc4b93d87ecd93e538cfbed7c9a4b8b5c6f1042c6069757bda0d1279ed06
-
SHA512
559157fa1b3eb6ae1f9c0f2c71ccc692a0a0affb1d6498a8b8db1436d236fd91891897ac620ed5a588beba2efa43ef064211a7fcadb5c3a3c5e2be1d23ef9d4c
-
SSDEEP
96:/VV0Rwtvrm2nQujIvP9dir3UniV/zRzVR3rN3k8Jd18tsPcaqhx:/VV0KtC2yH9d83BzVR53kEQFaq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 368 4900 rundll32.exe 73 PID 4900 wrote to memory of 368 4900 rundll32.exe 73 PID 4900 wrote to memory of 368 4900 rundll32.exe 73
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\newadvsplash.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\newadvsplash.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:368
-