Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 00:27

General

  • Target

    Burst Royale 0.9/DirectX/dsetup32.dll

  • Size

    1.7MB

  • MD5

    0f58ccd58a29827b5d406874360e4c08

  • SHA1

    ba804292580be6186774e7f92e6dfb104e46bf25

  • SHA256

    642d9e7db6d4fc15129f011dce2ea087bf7f7fb015aececf82bf84ff6634a6fb

  • SHA512

    3e3d4f2de5dc5addc86765a2f888487ea0c9ee0208fac60187ddaa9a2bfd73cfd7734836d32805fa43222470c8f6cb9a10e2a099aef72c67ad7c789096e57ce4

  • SSDEEP

    49152:MjnIXtNeOOOOOOOOOOOOOOOOOiWeXiWeXiWeXiWeXiWeXiWeXiWeXiWeXiWeXiWq:YIjma

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Burst Royale 0.9\DirectX\dsetup32.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Burst Royale 0.9\DirectX\dsetup32.dll",#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:3012
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2320
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003A4" "0000000000000594"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Logs\DXError.log

    Filesize

    238B

    MD5

    b3308870eca57de40bd914b4231ba60e

    SHA1

    3ab8ac70da3d4e949a43fe44e121888e52cd78a3

    SHA256

    8a01e3eab1e7eb7734361ec0ca297f800e3b7d1a5ac7c0c7274e408a679879eb

    SHA512

    b041df27231936696c067cabbebb1c99279cced90a71ae9b6131765b2324c7a5886e0992130c4e8bd9c68681ee79b920640fedc59342f124220f1fe723fbb99c

  • C:\Windows\Logs\DirectX.log

    Filesize

    515B

    MD5

    e467013b25a608f63c81352818e3dad9

    SHA1

    ec0deab22468582024341c561428fd03ee51cb05

    SHA256

    27ec1fff6a73a54ff34b4aab9dfd3bbed0f49bbc6b570e10ae56660c9fbec703

    SHA512

    40fc26cdb033086cc2679ec1866cc992cf9747b91fa33697e685002074a5bd63850d09f69d00ff4b60616975a5ae09f551c5531b94b8f2631f39caa1a9404ced