Overview
overview
3Static
static
3ninjarippe...mp.exe
windows10-2004-x64
3blender-im...nja.py
windows10-2004-x64
3ninjarippe...rip.py
windows10-2004-x64
3fmt_ninjar...rip.py
windows10-2004-x64
3ninjarippe...er.exe
windows10-2004-x64
1ninjarippe...ap.dll
windows10-2004-x64
1ninjarippe...er.exe
windows10-2004-x64
1ninjarippe...er.dll
windows10-2004-x64
1ninjarippe...er.exe
windows10-2004-x64
3ninjarippe...ap.dll
windows10-2004-x64
3ninjarippe...8d.dll
windows10-2004-x64
3ninjarippe...er.exe
windows10-2004-x64
3ninjarippe...er.dll
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
ninjaripper1.7.1/ripdump.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
blender-import-ninjaripper-master/import-ninja.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ninjaripper1.7.1/tools/noesis_importer/fmt_ninjaripper_rip.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
fmt_ninjaripper_rip.py
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
ninjaripper1.7.1/x64/NinjaRipper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
ninjaripper1.7.1/x64/d3dwrap.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ninjaripper1.7.1/x64/injhelper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
ninjaripper1.7.1/x64/intruder.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ninjaripper1.7.1/x86/NinjaRipper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
ninjaripper1.7.1/x86/d3dwrap.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ninjaripper1.7.1/x86/d3dx8d.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
ninjaripper1.7.1/x86/injhelper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ninjaripper1.7.1/x86/intruder.dll
Resource
win10v2004-20240802-en
General
-
Target
ninjaripper1.7.1/x86/d3dx8d.dll
-
Size
677KB
-
MD5
06dcb937d1a7c534c9b745e7e9e62985
-
SHA1
265e38e54ffdde1363d7ce57ab39048960e5ea0a
-
SHA256
f6e4b6004ba3a6aa8d47f5d273e668123891da09dd3d907ce29d4aaae8ba984e
-
SHA512
56ecd076c0cf71fcb577e89cec3f7043a8d372e97efd23549114839d22a2488479623fa15868a97d8818170b151725720b666e822764eeccb0ceb0cdef4331cd
-
SSDEEP
12288:RAaluE+pH6ShnH5Ar1upSJPN74h7ZWyjhh2psN9bCoUy0d:RAaAE+pH6qnG74h0yjeogoo
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2752 4556 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4556 5088 rundll32.exe 83 PID 5088 wrote to memory of 4556 5088 rundll32.exe 83 PID 5088 wrote to memory of 4556 5088 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ninjaripper1.7.1\x86\d3dx8d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ninjaripper1.7.1\x86\d3dx8d.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 6123⤵
- Program crash
PID:2752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4556 -ip 45561⤵PID:1960