Analysis
-
max time kernel
428s -
max time network
429s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 13:09
Static task
static1
Behavioral task
behavioral1
Sample
IK_Multimedia_Keygen.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
$TEMP/BASSMOD.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/R2RIKM2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
$TEMP/keygen.exe
Resource
win10v2004-20241007-en
General
-
Target
$TEMP/R2RIKM2.dll
-
Size
6KB
-
MD5
d186f4a30faa060aa2c4e0ff630f78a2
-
SHA1
345f36820ecb5e4c8d05fc6e93acb36ba6b53dbc
-
SHA256
235d3850ee4764f6b52fc81645f5498cd8b8c6311358a71ac91739131c2e7d09
-
SHA512
6a1855b1a713a05feea8da2343837a48b3ccd94d8f22594c2da57644f69a239e450acecb801feb3edb7d0f1fec53595281d7fccea65336a9d1da7923eaceac74
-
SSDEEP
96:JshDnlUhwugewuJMlBIzcXnk9RzMBJnHI3CKhLvC65pMnqL2:KDA2kJSBbk9RzAHIvhLvDIQ
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 964 4988 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2068 wrote to memory of 4988 2068 rundll32.exe 83 PID 2068 wrote to memory of 4988 2068 rundll32.exe 83 PID 2068 wrote to memory of 4988 2068 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\R2RIKM2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\R2RIKM2.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 6123⤵
- Program crash
PID:964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4988 -ip 49881⤵PID:2156