Overview
overview
10Static
static
3SnSetup1.7.exe
windows7-x64
7SnSetup1.7.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Data/regis...US.htm
windows7-x64
3Data/regis...US.htm
windows10-2004-x64
3Data/regis...CN.htm
windows7-x64
3Data/regis...CN.htm
windows10-2004-x64
3Data/regis...TW.htm
windows7-x64
3Data/regis...TW.htm
windows10-2004-x64
3SerialNull.exe
windows7-x64
10SerialNull.exe
windows10-2004-x64
10SnBus.sys
windows7-x64
1SnBus.sys
windows10-2004-x64
1SnSerial.sys
windows7-x64
1SnSerial.sys
windows10-2004-x64
1install.exe
windows7-x64
5install.exe
windows10-2004-x64
5ȿ˶.url
windows7-x64
1ȿ˶.url
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 00:09
Static task
static1
Behavioral task
behavioral1
Sample
SnSetup1.7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SnSetup1.7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Data/register-en-US.htm
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Data/register-en-US.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Data/register-zh-CN.htm
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Data/register-zh-CN.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Data/register-zh-TW.htm
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Data/register-zh-TW.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
SerialNull.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
SerialNull.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
SnBus.sys
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
SnBus.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
SnSerial.sys
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
SnSerial.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
install.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
install.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
ȿ˶.url
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ȿ˶.url
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/LangDLL.dll
-
Size
5KB
-
MD5
83c5a8e90cd10cb31a9215eb4421341f
-
SHA1
52ddbbfa955936f87516c52b2bb679a6b4363e22
-
SHA256
da006773e11871b8834036c30acab8fabcce2c9e9f52bb2b425f947bdf33f7c6
-
SHA512
46c20fd762a643028f3c4287ed3dbd762bc1cd17ee5ad1d90cbad23f15901fbab14b726d7f3e45eeb370fb6a2ee5268a2e9ebaae7ab6067c855361d24fc806a4
-
SSDEEP
48:SHGGPtcWCeM7etAo1UurdGl4A0h2TpXHWFv+wewzpv1XP3GhaEJOof2ynh1:E1cWxfzrrh2cFvWwFtSh
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4720 4404 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3132 wrote to memory of 4404 3132 rundll32.exe 82 PID 3132 wrote to memory of 4404 3132 rundll32.exe 82 PID 3132 wrote to memory of 4404 3132 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\LangDLL.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 6003⤵
- Program crash
PID:4720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4404 -ip 44041⤵PID:872