Overview
overview
10Static
static
3c2c6e13f08...80.exe
windows7-x64
10c2c6e13f08...80.exe
windows10-2004-x64
10$PLUGINSDI...1A.dll
windows7-x64
3$PLUGINSDI...1A.dll
windows10-2004-x64
3$TEMP/Ordurous.exe
windows7-x64
10$TEMP/Ordurous.exe
windows10-2004-x64
10$TEMP/eng.exe
windows7-x64
10$TEMP/eng.exe
windows10-2004-x64
10Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/11/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
c2c6e13f08cd8b5bf721576ca1372b72cdf0c33d8aafac2e529f3aa3c73a6a80.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c2c6e13f08cd8b5bf721576ca1372b72cdf0c33d8aafac2e529f3aa3c73a6a80.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/7OUH1A.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/7OUH1A.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/Ordurous.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$TEMP/Ordurous.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$TEMP/eng.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$TEMP/eng.exe
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/7OUH1A.dll
-
Size
6KB
-
MD5
293165db1e46070410b4209519e67494
-
SHA1
777b96a4f74b6c34d43a4e7c7e656757d1c97f01
-
SHA256
49b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a
-
SHA512
97012139f2da5868fe8731c0b0bcb3cfda29ed10c2e6e2336b504480c9cd9fb8f4728cca23f1e0bd577d75daa542e59f94d1d341f4e8aaeebc7134bf61288c19
-
SSDEEP
96:4BNbUVOFvfcxEAxxxJzxLp+eELeoMEskzYzeHd0+uoyVeNSsX4:EUVOFvf9ABJFHE+FkEad0PLVeN
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2860 2856 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2856 2980 rundll32.exe 31 PID 2980 wrote to memory of 2856 2980 rundll32.exe 31 PID 2980 wrote to memory of 2856 2980 rundll32.exe 31 PID 2980 wrote to memory of 2856 2980 rundll32.exe 31 PID 2980 wrote to memory of 2856 2980 rundll32.exe 31 PID 2980 wrote to memory of 2856 2980 rundll32.exe 31 PID 2980 wrote to memory of 2856 2980 rundll32.exe 31 PID 2856 wrote to memory of 2860 2856 rundll32.exe 32 PID 2856 wrote to memory of 2860 2856 rundll32.exe 32 PID 2856 wrote to memory of 2860 2856 rundll32.exe 32 PID 2856 wrote to memory of 2860 2856 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\7OUH1A.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\7OUH1A.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 2203⤵
- Program crash
PID:2860
-
-