Overview
overview
7Static
static
3DFX.for.Re...up.exe
windows7-x64
7DFX.for.Re...up.exe
windows10-2004-x64
7$COMMONFIL...an.exe
windows7-x64
3$COMMONFIL...an.exe
windows10-2004-x64
3$COMMONFIL...ni.exe
windows7-x64
3$COMMONFIL...ni.exe
windows10-2004-x64
3$COMMONFIL...FX.exe
windows7-x64
3$COMMONFIL...FX.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$_0_/dfxbtn.dll
windows7-x64
3$_0_/dfxbtn.dll
windows10-2004-x64
3$_1_/dfxrealr.dll
windows7-x64
3$_1_/dfxrealr.dll
windows10-2004-x64
3RealPlayer...te.exe
windows7-x64
1RealPlayer...te.exe
windows10-2004-x64
3RealPlayer...il.exe
windows7-x64
1RealPlayer...il.exe
windows10-2004-x64
3RealPlayer...rs.exe
windows7-x64
1RealPlayer...rs.exe
windows10-2004-x64
3RealPlayer...al.chm
windows7-x64
1RealPlayer...al.chm
windows10-2004-x64
1DFX.for.Re...pk.dll
windows7-x64
7DFX.for.Re...pk.dll
windows10-2004-x64
7Analysis
-
max time kernel
93s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
DFX.for.RealPlayer.v9.103/3ddown.com_setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DFX.for.RealPlayer.v9.103/3ddown.com_setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$COMMONFILES/DFX/Skins/Obsidian/Obsidian.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$COMMONFILES/DFX/Skins/Obsidian/Obsidian.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$COMMONFILES/DFX/Skins/Obsidian_mini/Obsidian_mini.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$COMMONFILES/DFX/Skins/Obsidian_mini/Obsidian_mini.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$COMMONFILES/DFX/Skins/SoundFX/SoundFX.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$COMMONFILES/DFX/Skins/SoundFX/SoundFX.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$_0_/dfxbtn.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
$_0_/dfxbtn.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$_1_/dfxrealr.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$_1_/dfxrealr.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
RealPlayer/Apps/record_date.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
RealPlayer/Apps/record_date.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
RealPlayer/Apps/record_email.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
RealPlayer/Apps/record_email.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
RealPlayer/Apps/registryCleanUsers.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
RealPlayer/Apps/registryCleanUsers.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
RealPlayer/Help/DFX Manual.chm
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
RealPlayer/Help/DFX Manual.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
DFX.for.RealPlayer.v9.103/lpk.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
DFX.for.RealPlayer.v9.103/lpk.dll
Resource
win10v2004-20240802-en
General
-
Target
DFX.for.RealPlayer.v9.103/lpk.dll
-
Size
45KB
-
MD5
fcdc863503f8b1be2104614f948179fc
-
SHA1
71485de3e22c42df5f0c9e39f47420e48195fef5
-
SHA256
d80b59ded380078af93526a8fb78bf19ab05a924958b15a9fdcee8b0e31c3f3a
-
SHA512
ca0bf43bf2615e32a496a8cd65f2db8bee08c19da36310bc58a7f7dde8849d9aea610a054e3088a9c6bf0284400370806fd38e4e89ba54a35f0f13e8a9f6c2b9
-
SSDEEP
768:zojY9Pg68uUCS77GhGLhLpms1RZo9yHHojY9P:GmY6BS7LL18+o9yHSm
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 212 hrlA9EC.tmp 1288 yqewma.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\yqewma.exe hrlA9EC.tmp File opened for modification C:\Windows\SysWOW64\yqewma.exe hrlA9EC.tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1288 set thread context of 4020 1288 yqewma.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 1720 4020 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrlA9EC.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yqewma.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2412 wrote to memory of 3516 2412 rundll32.exe 81 PID 2412 wrote to memory of 3516 2412 rundll32.exe 81 PID 2412 wrote to memory of 3516 2412 rundll32.exe 81 PID 3516 wrote to memory of 212 3516 rundll32.exe 82 PID 3516 wrote to memory of 212 3516 rundll32.exe 82 PID 3516 wrote to memory of 212 3516 rundll32.exe 82 PID 1288 wrote to memory of 4020 1288 yqewma.exe 84 PID 1288 wrote to memory of 4020 1288 yqewma.exe 84 PID 1288 wrote to memory of 4020 1288 yqewma.exe 84 PID 1288 wrote to memory of 4020 1288 yqewma.exe 84 PID 1288 wrote to memory of 4020 1288 yqewma.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\DFX.for.RealPlayer.v9.103\lpk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\DFX.for.RealPlayer.v9.103\lpk.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\hrlA9EC.tmpC:\Users\Admin\AppData\Local\Temp\hrlA9EC.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:212
-
-
-
C:\Windows\SysWOW64\yqewma.exeC:\Windows\SysWOW64\yqewma.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 123⤵
- Program crash
PID:1720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4020 -ip 40201⤵PID:4660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD54b5b96093cdd0eb372be9a459b2bc27e
SHA16c36841cabbf00bb365bddede0897fcc6338e68f
SHA256b3c425ac158293c36809f69d6c53cc4b77c6f14eb63c548320e280414ae7a4fa
SHA512cba45a987e23452f630790ae620876916710ecda846e5300be0f399ed57bc994cfd594b0a638d217af7a611a5c7c3430f6369f47f3b72403f3eb2fdff0e033fe