Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
PatchMaker/Avenger plugin/PatchMaker.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PatchMaker/Avenger plugin/PatchMaker.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
PatchMaker/PatchMaker.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
PatchMaker/PatchMaker.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
安装说明.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
安装说明.url
Resource
win10v2004-20241007-en
General
-
Target
PatchMaker/Avenger plugin/PatchMaker.dll
-
Size
74KB
-
MD5
d843249e3d7841fc5720ad635d1ef1d6
-
SHA1
a08caa5dca864e5e06fe40c1c1ab635e78bade38
-
SHA256
7cd55a682559b7cc917bdb3f90c7f31a0458220734b5468b655df30c227f01df
-
SHA512
4c88fc706eb5995216e7d74de8566ef69fb972bc54c770ffc69efa198a0940f3722b393ce28cede450b065f055c0d2fb7111654a28febba1db396df9b51351ba
-
SSDEEP
1536:sI/ufw9kr7kWyY8E9dk6xCc5nETP/X4CCe+RESlMomanouy8L:7/u10WVT9dk6Uc5nIXX4CCeSXmCout
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2116 2108 rundll32.exe 30 PID 2108 wrote to memory of 2116 2108 rundll32.exe 30 PID 2108 wrote to memory of 2116 2108 rundll32.exe 30 PID 2108 wrote to memory of 2116 2108 rundll32.exe 30 PID 2108 wrote to memory of 2116 2108 rundll32.exe 30 PID 2108 wrote to memory of 2116 2108 rundll32.exe 30 PID 2108 wrote to memory of 2116 2108 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\PatchMaker\Avenger plugin\PatchMaker.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\PatchMaker\Avenger plugin\PatchMaker.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:2116
-