Overview
overview
10Static
static
7Invoice.htm
windows7-x64
3Invoice.htm
windows10-2004-x64
3MSRC4Plugin.dll
windows7-x64
5MSRC4Plugin.dll
windows10-2004-x64
5Run.exe
windows7-x64
10Run.exe
windows10-2004-x64
10rssvnc.exe
windows7-x64
3rssvnc.exe
windows10-2004-x64
3vnchooks.dll
windows7-x64
3vnchooks.dll
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 10:56
Behavioral task
behavioral1
Sample
Invoice.htm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Invoice.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
MSRC4Plugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
MSRC4Plugin.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Run.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Run.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
rssvnc.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
rssvnc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
vnchooks.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
vnchooks.dll
Resource
win10v2004-20240802-en
General
-
Target
MSRC4Plugin.dll
-
Size
13KB
-
MD5
35ecd42a2f8c0c1c90d42f8ac2fb7952
-
SHA1
60ae00b0e4f4000e6e27f30d4674a0e931261314
-
SHA256
55e4d509d24bed0600d773d43e92e8fb454c1707874ad98944b47df2ef149379
-
SHA512
eca977d209e7cf414b2c830b903853274a74fb4efa9158da9472b145cf3ab6c794b96264d0a3bae0edbb18bea4364b7ed73884058bc79959ef8adc7d5c5201f3
-
SSDEEP
192:+63K+YfHxi9izPpGAQF7cY22YCxyjuj2jllUyeQU/fdJOO3y/0ZkvDJn9:9OD5k7cCh2Bir9vLZkln
Malware Config
Signatures
-
resource yara_rule behavioral4/memory/4916-0-0x0000000010000000-0x0000000010012000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3096 wrote to memory of 4916 3096 rundll32.exe 82 PID 3096 wrote to memory of 4916 3096 rundll32.exe 82 PID 3096 wrote to memory of 4916 3096 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\MSRC4Plugin.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\MSRC4Plugin.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4916
-