Overview
overview
8Static
static
3FarmFrenzy...er.exe
windows10-1703-x64
8$PLUGINSDI...if.dll
windows10-1703-x64
3$PLUGINSDI...nt.dll
windows10-1703-x64
3$PLUGINSDIR/INetC.dll
windows10-1703-x64
3$PLUGINSDI...ss.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDI...sh.dll
windows10-1703-x64
3$PLUGINSDI...gs.dll
windows10-1703-x64
3$PLUGINSDI...nz.dll
windows10-1703-x64
3Analysis
-
max time kernel
129s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30-09-2024 12:02
Static task
static1
Behavioral task
behavioral1
Sample
FarmFrenzyInstaller.exe
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/AnimGif.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/INetC.dll
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NsisWindowSubClass.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/newadvsplash.dll
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10-20240404-en
General
-
Target
$PLUGINSDIR/nsisunz.dll
-
Size
88KB
-
MD5
bd97d86d8bd07ebdc8ec662a3f31dfd5
-
SHA1
5e2b3a1af5ee53ab6d1d6c2cb8127add39ee7e82
-
SHA256
c31b590cba443de87f0f4a81712f0883ac3b506f3868759d918d9a81f84ea922
-
SHA512
4575d1ea0d1b2f74df74cad94eae7fdf31c513e5dc6d945e81e0873b99f94a5d81b1c385c71ab79a19e5bb6c00fc5fffec7a3bbfd60ad7de312cbb53d8bcce9a
-
SSDEEP
1536:uPmnCuZs9reYWvAHvXhxQdJeY3tMCo9NTJwd6aimHr5jr5T51NT:uPmnCuZs9KoPX6rA9Nl2Rrt51h
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1320 3164 WerFault.exe 74 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5068 wrote to memory of 3164 5068 rundll32.exe 74 PID 5068 wrote to memory of 3164 5068 rundll32.exe 74 PID 5068 wrote to memory of 3164 5068 rundll32.exe 74
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisunz.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3164 -s 6163⤵
- Program crash
PID:1320
-
-