Overview
overview
10Static
static
3UpdaterSoft.exe
windows7-x64
1UpdaterSoft.exe
windows10-2004-x64
10locales/wi...01.exe
windows7-x64
5locales/wi...01.exe
windows10-2004-x64
1python3.dll
windows7-x64
1python3.dll
windows10-2004-x64
1python312.dll
windows7-x64
3python312.dll
windows10-2004-x64
3updater/py...64.exe
windows7-x64
7updater/py...64.exe
windows10-2004-x64
7vcruntime140.dll
windows7-x64
3vcruntime140.dll
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
UpdaterSoft.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
UpdaterSoft.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
locales/winrar-x64-701.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
locales/winrar-x64-701.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
python3.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
python3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
python312.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
python312.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
updater/python-3.13.1-amd64.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
updater/python-3.13.1-amd64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
vcruntime140.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
vcruntime140.dll
Resource
win10v2004-20241007-en
General
-
Target
vcruntime140.dll
-
Size
87KB
-
MD5
656ffcbfe10e81b64a59f7bfc86581ea
-
SHA1
765fe7b0bd404cb6fabb1b16372f2e41889f087b
-
SHA256
e72cb60bc3afaed6f38fa28d7111938067a9e4bed38a36f7a1ac6b9c1f16d0e2
-
SHA512
c5dfc2991cc382d5f9a03219f3e58c3c51b1baa77972d97548fa89b2c5a37d3eb80b1c7e2dae3e3336d02b755a53d78751f49d60250c4cb6ebcaa7a7756e1a18
-
SSDEEP
1536:FcOjHc3U7aHQcT6rCUNgBhR2kBGCGmzWbGfaecbGKOa4dmzgZxIz:qGHchcWzhRqRmWKfaecbGlv0V
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2184 2552 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2552 2960 rundll32.exe 30 PID 2960 wrote to memory of 2552 2960 rundll32.exe 30 PID 2960 wrote to memory of 2552 2960 rundll32.exe 30 PID 2960 wrote to memory of 2552 2960 rundll32.exe 30 PID 2960 wrote to memory of 2552 2960 rundll32.exe 30 PID 2960 wrote to memory of 2552 2960 rundll32.exe 30 PID 2960 wrote to memory of 2552 2960 rundll32.exe 30 PID 2552 wrote to memory of 2184 2552 rundll32.exe 31 PID 2552 wrote to memory of 2184 2552 rundll32.exe 31 PID 2552 wrote to memory of 2184 2552 rundll32.exe 31 PID 2552 wrote to memory of 2184 2552 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\vcruntime140.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\vcruntime140.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 2203⤵
- Program crash
PID:2184
-
-