Overview
overview
3Static
static
3ninjarippe...mp.exe
windows10-2004-x64
3blender-im...nja.py
windows10-2004-x64
3ninjarippe...rip.py
windows10-2004-x64
3fmt_ninjar...rip.py
windows10-2004-x64
3ninjarippe...er.exe
windows10-2004-x64
1ninjarippe...ap.dll
windows10-2004-x64
1ninjarippe...er.exe
windows10-2004-x64
1ninjarippe...er.dll
windows10-2004-x64
1ninjarippe...er.exe
windows10-2004-x64
3ninjarippe...ap.dll
windows10-2004-x64
3ninjarippe...8d.dll
windows10-2004-x64
3ninjarippe...er.exe
windows10-2004-x64
3ninjarippe...er.dll
windows10-2004-x64
3Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
ninjaripper1.7.1/ripdump.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
blender-import-ninjaripper-master/import-ninja.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ninjaripper1.7.1/tools/noesis_importer/fmt_ninjaripper_rip.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
fmt_ninjaripper_rip.py
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
ninjaripper1.7.1/x64/NinjaRipper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
ninjaripper1.7.1/x64/d3dwrap.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ninjaripper1.7.1/x64/injhelper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
ninjaripper1.7.1/x64/intruder.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ninjaripper1.7.1/x86/NinjaRipper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
ninjaripper1.7.1/x86/d3dwrap.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ninjaripper1.7.1/x86/d3dx8d.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
ninjaripper1.7.1/x86/injhelper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ninjaripper1.7.1/x86/intruder.dll
Resource
win10v2004-20240802-en
General
-
Target
ninjaripper1.7.1/x86/d3dwrap.dll
-
Size
126KB
-
MD5
bcd2b978b5b6e054329918191f5e4f59
-
SHA1
2ccb4a14a5f57a8b7f017d35f05c3f508cd00e77
-
SHA256
2ef4a920ec0565e29e5cf4150a2262177b65197a369929ea530835939839b8f7
-
SHA512
bf8ced021515aa74c15c02f64a477be66b96d78ed93b04d7e8946ddfd96326abdaa0e5c9aed0690e1378ee29997c29265e05834ec7653104c3a0736fd4eef57a
-
SSDEEP
1536:nsXiYT+/q1hsXI4j4zF/vuS0nk8Ng394CgZccjns8jcdvk+TKP6sDy:nsyYFDs44WYfnk7vk+TKP6sO
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3384 2568 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe 2568 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4424 wrote to memory of 2568 4424 rundll32.exe 89 PID 4424 wrote to memory of 2568 4424 rundll32.exe 89 PID 4424 wrote to memory of 2568 4424 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ninjaripper1.7.1\x86\d3dwrap.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ninjaripper1.7.1\x86\d3dwrap.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 7843⤵
- Program crash
PID:3384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2568 -ip 25681⤵PID:4220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4404,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=4444 /prefetch:81⤵PID:1880