Malware Analysis Report

2024-11-15 10:21

Sample ID 241105-exekqsvfml
Target cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe
SHA256 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87
Tags
discovery guloader vipkeylogger downloader keylogger stealer collection spyware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87

Threat Level: Known bad

The file cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe was found to be: Known bad.

Malicious Activity Summary

discovery guloader vipkeylogger downloader keylogger stealer collection spyware

Guloader,Cloudeye

VIPKeylogger

Vipkeylogger family

Guloader family

Loads dropped DLL

Reads user/profile data of local email clients

Reads user/profile data of web browsers

Accesses Microsoft Outlook profiles

Looks up external IP address via web service

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of SetThreadContext

Suspicious use of NtCreateThreadExHideFromDebugger

Drops file in Windows directory

Browser Information Discovery

Unsigned PE

System Location Discovery: System Language Discovery

Program crash

Enumerates physical storage devices

NSIS installer

Suspicious use of WriteProcessMemory

outlook_office_path

outlook_win_path

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: MapViewOfSection

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-05 04:18

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-11-05 04:18

Reported

2024-11-05 04:21

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2436 wrote to memory of 3664 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2436 wrote to memory of 3664 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2436 wrote to memory of 3664 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3664 -ip 3664

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3664 -s 612

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 110.11.19.2.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-05 04:18

Reported

2024-11-05 04:21

Platform

win7-20240903-en

Max time kernel

118s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe"

Signatures

Guloader family

guloader

Guloader,Cloudeye

downloader guloader

VIPKeylogger

stealer keylogger vipkeylogger

Vipkeylogger family

vipkeylogger

Looks up external IP address via web service

Description Indicator Process Target
N/A checkip.dyndns.org N/A N/A

Suspicious use of NtCreateThreadExHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\resources\0409\backstrap\lejekassernerne.Osc55 C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A
File opened for modification C:\Windows\resources\ttningslisternes\Poulardes50.sto C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2216 wrote to memory of 840 N/A C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe
PID 2216 wrote to memory of 840 N/A C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe
PID 2216 wrote to memory of 840 N/A C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe
PID 2216 wrote to memory of 840 N/A C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe
PID 2216 wrote to memory of 840 N/A C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe
PID 2216 wrote to memory of 840 N/A C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe

Processes

C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe

"C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe"

C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe

"C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe"

Network

Country Destination Domain Proto
NL 109.248.150.169:80 109.248.150.169 tcp
US 8.8.8.8:53 checkip.dyndns.org udp
JP 132.226.8.169:80 checkip.dyndns.org tcp
US 8.8.8.8:53 reallyfreegeoip.org udp
US 172.67.177.134:443 reallyfreegeoip.org tcp
US 8.8.8.8:53 api.telegram.org udp
NL 149.154.167.220:443 api.telegram.org tcp

Files

\Users\Admin\AppData\Local\Temp\nsj1113.tmp\System.dll

MD5 6ad39193ed20078aa1b23c33a1e48859
SHA1 95e70e4f47aa1689cc08afbdaef3ec323b5342fa
SHA256 b9631423a50c666faf2cc6901c5a8d6eb2fecd306fdd2524256b7e2e37b251c2
SHA512 78c89bb8c86f3b68e5314467eca4e8e922d143335081fa66b01d756303e1aec68ed01f4be7098dbe06a789ca32a0f31102f5ba408bc5ab28e61251611bb4f62b

C:\Users\Admin\AppData\Local\Temp\nso1133.tmp

MD5 5d04a35d3950677049c7a0cf17e37125
SHA1 cafdd49a953864f83d387774b39b2657a253470f
SHA256 a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266
SHA512 c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b

C:\Users\Admin\AppData\Local\Temp\nsy11C0.tmp

MD5 50484c19f1afdaf3841a0d821ed393d2
SHA1 c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA256 6923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512 d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b

C:\Users\Admin\AppData\Local\Temp\nsy11C0.tmp

MD5 67cfa7364c4cf265b047d87ff2e673ae
SHA1 56e27889277981a9b63fcf5b218744a125bbc2fa
SHA256 639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA512 17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

C:\Users\Admin\AppData\Local\Temp\nsy11C0.tmp

MD5 c3cb69218b85c3260387fb582cb518dd
SHA1 961c892ded09a4cbb5392097bb845ccba65902ad
SHA256 1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA512 2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

C:\Users\Admin\AppData\Local\Temp\nsy11C0.tmp

MD5 2b3884fe02299c565e1c37ee7ef99293
SHA1 d8e2ef2a52083f6df210109fea53860ea227af9c
SHA256 ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858
SHA512 aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

C:\Users\Admin\AppData\Local\Temp\nsy11C0.tmp

MD5 9a53fc1d7126c5e7c81bb5c15b15537b
SHA1 e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256 a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512 b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1

C:\Users\Admin\AppData\Local\Temp\nsj12EA.tmp

MD5 8ce4b16b22b58894aa86c421e8759df3
SHA1 13fbd79c3d390e5d6585a21e11ff5ec1970cff0c
SHA256 8254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a
SHA512 2af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25

C:\Users\Admin\AppData\Local\Temp\nsj12EA.tmp

MD5 25bc6654798eb508fa0b6343212a74fe
SHA1 15d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA256 8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA512 5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

C:\Users\Admin\AppData\Local\Temp\nsj12EA.tmp

MD5 4e27f2226785e9abbe046fc592668860
SHA1 28b18a7f383131df509f7191f946a32c5a2e410c
SHA256 01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d
SHA512 2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

C:\Users\Admin\AppData\Local\Temp\nsj12EA.tmp

MD5 cde63b34c142af0a38cbe83791c964f8
SHA1 ece2b194b486118b40ad12c1f0e9425dd0672424
SHA256 65e2d70166c9a802b7ad2a87129b8945f083e5f268878790a9d1f1c03f47938d
SHA512 0559d3d34ad64ccc27e685431c24fc6ead0f645db14fa0e125a64fb67dbd158c15432c1fc5407811aac8a3486090dfbcfcbc3c6bf5aa0ec73f979ef62d14853c

C:\Users\Admin\AppData\Local\Temp\nsj12EA.tmp

MD5 e2fecc970546c3418917879fe354826c
SHA1 63f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256 ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA512 3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

memory/2216-567-0x00000000040B0000-0x0000000006DCC000-memory.dmp

memory/2216-568-0x00000000779F1000-0x0000000077AF2000-memory.dmp

memory/2216-569-0x00000000779F0000-0x0000000077B99000-memory.dmp

memory/2216-570-0x00000000040B0000-0x0000000006DCC000-memory.dmp

memory/840-571-0x00000000779F0000-0x0000000077B99000-memory.dmp

memory/2216-572-0x00000000040B0000-0x0000000006DCC000-memory.dmp

memory/840-573-0x0000000000480000-0x00000000014E2000-memory.dmp

memory/840-574-0x0000000000480000-0x00000000004C8000-memory.dmp

memory/840-576-0x00000000779F0000-0x0000000077B99000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-05 04:18

Reported

2024-11-05 04:21

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe"

Signatures

Guloader family

guloader

Guloader,Cloudeye

downloader guloader

VIPKeylogger

stealer keylogger vipkeylogger

Vipkeylogger family

vipkeylogger

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A checkip.dyndns.org N/A N/A

Suspicious use of NtCreateThreadExHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\resources\0409\backstrap\lejekassernerne.Osc55 C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A
File opened for modification C:\Windows\resources\ttningslisternes\Poulardes50.sto C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

outlook_office_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

outlook_win_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe

"C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe"

C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe

"C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
NL 109.248.150.169:80 109.248.150.169 tcp
US 8.8.8.8:53 checkip.dyndns.org udp
BR 132.226.247.73:80 checkip.dyndns.org tcp
US 8.8.8.8:53 169.150.248.109.in-addr.arpa udp
US 8.8.8.8:53 reallyfreegeoip.org udp
US 104.21.67.152:443 reallyfreegeoip.org tcp
US 8.8.8.8:53 152.67.21.104.in-addr.arpa udp
US 8.8.8.8:53 73.247.226.132.in-addr.arpa udp
US 8.8.8.8:53 api.telegram.org udp
NL 149.154.167.220:443 api.telegram.org tcp
US 8.8.8.8:53 220.167.154.149.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 101.11.19.2.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\nsb7D6E.tmp

MD5 d584d82e5221c4884dc3062781421038
SHA1 d8a56398883028032d6fc1c8630b8a8479127277
SHA256 f8d9811bb3d103f15ec0af4c4dea41769bcfb128bb961445461efa233772902a
SHA512 071d0f71114e7a0bb94ec3886fe1b9823ab2740b1509c755c8a08f40e4aeb5f04186722ae8a39ae8b66fc35ce4fc5cdee998bd6b85215cb02ef041366645f076

C:\Users\Admin\AppData\Local\Temp\nsw7E3A.tmp\System.dll

MD5 6ad39193ed20078aa1b23c33a1e48859
SHA1 95e70e4f47aa1689cc08afbdaef3ec323b5342fa
SHA256 b9631423a50c666faf2cc6901c5a8d6eb2fecd306fdd2524256b7e2e37b251c2
SHA512 78c89bb8c86f3b68e5314467eca4e8e922d143335081fa66b01d756303e1aec68ed01f4be7098dbe06a789ca32a0f31102f5ba408bc5ab28e61251611bb4f62b

C:\Users\Admin\AppData\Local\Temp\nsm7E4B.tmp

MD5 c3cb69218b85c3260387fb582cb518dd
SHA1 961c892ded09a4cbb5392097bb845ccba65902ad
SHA256 1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA512 2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

C:\Users\Admin\AppData\Local\Temp\nsm7E4B.tmp

MD5 aa56823a4614597aa5035bfb3f63c847
SHA1 873c3e649bf0b41d9b4d1ee998df6e47abd32841
SHA256 7d544ae2f97f0655acb9017ff329202409d17e86552e93c27c08ae532cb57f98
SHA512 0a9c4cac8181cdd5638c9bcd1898370c1b51bef5094eaa886e06937e6e36986f31a54b14a0d044c64ef4b332dc5d785dfdaf5ac5e1c067eb4421fd87f2486472

C:\Users\Admin\AppData\Local\Temp\nsm7E4B.tmp

MD5 874eecec3fc35024420ce6005d6991bf
SHA1 743f31a53191481b4d1e95cc5d4330c123e69a0a
SHA256 1feb2f5544655440d6bdf724776f3fc7b9c9dfb226fe96385423579e03954626
SHA512 b5b5ecceeb820a519b3bd277265ed874def5a0a16d1a13af5d60e709cc7e8c8fdfd7a7b7ba694943d00e7a30fb9c267258fd1ed57418c5187acb42177bbe6c6c

C:\Users\Admin\AppData\Local\Temp\nsh7EC9.tmp

MD5 1783e9a8f74ea827208a35b5a8c0c0b4
SHA1 68913138931e5d1cdf495708cf86d082454dc6cf
SHA256 20ed8777c986040dba3187aab791c6df6f87f42c3002b15bcc8bfa9718d842e8
SHA512 8da8702b8e97de4d9cd9c294574e10363e34f3cf7796b1e2c78be543a482472922be3d75a716c67b63a291b898528531c132553ef20174ea99eb3bd37ac3608b

C:\Users\Admin\AppData\Local\Temp\nsm7E4B.tmp

MD5 5d04a35d3950677049c7a0cf17e37125
SHA1 cafdd49a953864f83d387774b39b2657a253470f
SHA256 a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266
SHA512 c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b

C:\Users\Admin\AppData\Local\Temp\nsh7EC9.tmp

MD5 981d979ec49cb64b078f50013c191acd
SHA1 18f103644da4913b96391b7d457ded5706e4d0f2
SHA256 f4e95849a9bf43f048e70b6beb4716762d41fd3efcb59bc58923386a6e3aeb5b
SHA512 d2901d088095cfb15227db5b49f510591e3480be1d4bd16991e794347657bcc4e1e940834961a09d9eaf48c3224886b850973a8eff9cd3ee74f7eec622bb6eba

C:\Users\Admin\AppData\Local\Temp\nsh7EC9.tmp

MD5 34f8724a3a772a2de0ccabb072b5ccd1
SHA1 84ee8e0abbbd3263c6a7e5a95d05c0545154b6e8
SHA256 e29c9af6036b8539c52d2625388e268cff4d98747535644d89d4fc48c27edd72
SHA512 dca8eed55737be03515ba6401e8a0d47d99a3829e4a35748ad73eb37b1b62a2eddb4a7561fe32b13404e11052a30c17620e47a9f368b0898654fbf6bc91ffb81

C:\Users\Admin\AppData\Local\Temp\nsh7EC9.tmp

MD5 e36e1dde686cd0a4af58f338410c2617
SHA1 59b8e6e0b5950b80809fdbc262def51345eb484a
SHA256 2b1923b72399c7e6f9ec1f4c28d183921089957705c7b59cac4cd57b4870d684
SHA512 07845c52d3c67451907da51cd88c1f78442466c71281d2438ecd90c7e95ced97b035d22d0d5bed919f078a14e19dc786b9ef146aeda3eeb9974cdbc10acf4c70

C:\Users\Admin\AppData\Local\Temp\nsh7EC9.tmp

MD5 6be1fc61ef445284ae963b5f74615f66
SHA1 3c1cb4c84d46db513530f271e4f89993217d7291
SHA256 b091f88a1dbbde4a52f427ad4af8322dbc07c1f202c26dffc3928b084e6ed53e
SHA512 1fb3746bbbbdbee7bb0c36b2e5e0e3903554cbaeb8650632a5ba726b5f4305a641da13ba7d62f051bfc30bfd3e615e4c1be3334244b40c272811692754327913

C:\Users\Admin\AppData\Local\Temp\nsc7F47.tmp

MD5 e2fecc970546c3418917879fe354826c
SHA1 63f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256 ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA512 3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

C:\Users\Admin\AppData\Local\Temp\nsc7F47.tmp

MD5 67cfa7364c4cf265b047d87ff2e673ae
SHA1 56e27889277981a9b63fcf5b218744a125bbc2fa
SHA256 639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA512 17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

C:\Users\Admin\AppData\Local\Temp\nsc7F47.tmp

MD5 3ad35e1651d29fa2f6dcd7722f5ca36f
SHA1 fb94d43c8fec12db5ea14f5af04c1c4e657202d9
SHA256 ba19c5bc80f1f84e8bddbae4185dfd07c997855b22f9ecffe37f96e4bf0d7517
SHA512 84bf1fc1454252d9fcbf350ddfa041f8656b1d91bb4975b04ba8f2c36294f51e597dedfdd689bca711ea338df4b60826c3339aac3ae611dcb591c3d4e71fcd58

C:\Users\Admin\AppData\Local\Temp\nsc7F47.tmp

MD5 afe962068d1f3cd6e1990619caa66942
SHA1 458b9ac1a98263f766c0c4196e5f72c7bd67f3dd
SHA256 0fd0d0a43f85e7a58c444088e1171a596104472a032902b267f31e7d75de3b85
SHA512 daf359229cd641fa82c4e69bb826b4da909e3919dfbc521633573cf79c03ae6ebb16bd389e6b4052d7669f8489eac3647cc3f7624d0acecd62f7affb313038df

C:\Users\Admin\AppData\Local\Temp\nsc7F47.tmp

MD5 34403ce6f59bae514d55090e8e6478ac
SHA1 f5e4f954af5de278e6cae8e6715ebadb9857aa85
SHA256 f773b6be4198314a85e1e78849f73b701f4ae25739aee97f7b6b5fd76d94bf44
SHA512 f0d575650db491b99c980c3b72cddb100c98889ec17fd5d5e9d9c5cb76622903f63092b536b1e753f3203582e9ac7535db738394adc6030d5853f587bf7c896d

C:\Users\Admin\AppData\Local\Temp\nss7FF4.tmp

MD5 51363b8d2e5583ff2bfea0ad020f8ac0
SHA1 bf73704dedd0ed2a6c383f9370d7ce27e19d79ed
SHA256 939fb56ca6afb8ec7f034eb2c92880425c966e10a113c87a979130de27701210
SHA512 b0217d6ed0dcf3f677cc0e3a890c837968ec33ea5e2c4ba3f324305a8cb5a07d898b9742d7c37d4c3590e0306348af8e07f24fb5b6f68193a5bcd390b7ddd3b5

C:\Users\Admin\AppData\Local\Temp\nss7FF4.tmp

MD5 f15bfdebb2df02d02c8491bde1b4e9bd
SHA1 93bd46f57c3316c27cad2605ddf81d6c0bde9301
SHA256 c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043
SHA512 1757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1

memory/4452-567-0x0000000004A10000-0x000000000772C000-memory.dmp

memory/4452-568-0x0000000076F41000-0x0000000077061000-memory.dmp

memory/4452-569-0x0000000004A10000-0x000000000772C000-memory.dmp

memory/4452-570-0x0000000010004000-0x0000000010005000-memory.dmp

memory/4452-571-0x0000000004A10000-0x000000000772C000-memory.dmp

memory/4696-572-0x00000000016E0000-0x00000000043FC000-memory.dmp

memory/4696-573-0x0000000000480000-0x00000000016D4000-memory.dmp

memory/4696-574-0x0000000000480000-0x00000000004C8000-memory.dmp

memory/4696-575-0x0000000036CE0000-0x0000000037284000-memory.dmp

memory/4696-576-0x0000000036C10000-0x0000000036CAC000-memory.dmp

memory/4696-578-0x00000000016E0000-0x00000000043FC000-memory.dmp

memory/4696-579-0x0000000037A30000-0x0000000037BF2000-memory.dmp

memory/4696-580-0x0000000037C10000-0x0000000037C60000-memory.dmp

memory/4696-582-0x0000000037CE0000-0x0000000037D72000-memory.dmp

memory/4696-583-0x0000000037DD0000-0x0000000037DDA000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-11-05 04:18

Reported

2024-11-05 04:21

Platform

win7-20241010-en

Max time kernel

118s

Max time network

119s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 224

Network

N/A

Files

N/A