Overview
overview
10Static
static
3Pepsico LL...on.exe
windows7-x64
10Pepsico LL...on.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Festucine/...er.exe
windows7-x64
3Festucine/...er.exe
windows10-2004-x64
3Sollar/Sys...ns.dll
windows7-x64
1Sollar/Sys...ns.dll
windows10-2004-x64
1Sollar/liboscar.dll
windows7-x64
3Sollar/liboscar.dll
windows10-2004-x64
3Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 08:11
Static task
static1
Behavioral task
behavioral1
Sample
Pepsico LLC RFQ Information.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Pepsico LLC RFQ Information.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Festucine/Blamer33/Othellokages/AutoConnectHelper.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Festucine/Blamer33/Othellokages/AutoConnectHelper.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Sollar/System.Runtime.Extensions.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Sollar/System.Runtime.Extensions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Sollar/liboscar.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Sollar/liboscar.dll
Resource
win10v2004-20241007-en
General
-
Target
Sollar/liboscar.dll
-
Size
308KB
-
MD5
c3478f9eef7cfabc6be55633be2ef30f
-
SHA1
6f4002bc71746290fb6a38bd38c205f22bd29bed
-
SHA256
71a27640a2b3ffa84c8d90c3621c9638c290d179ba996a004c13b4fa2f11067f
-
SHA512
24eea221f172119739f004079a65e8bca400b40f80e0e428ea7880614184aa806e3b979102cb3ece225232f8aec4948da80ac7157994c12d331e040897e1e87c
-
SSDEEP
6144:6cXM/De4unKXv4iqhUc/EfyCarKR6pNMx53dekMyap:6cXKDe2XLgEfSrwt/ap
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4452 wrote to memory of 4916 4452 rundll32.exe 83 PID 4452 wrote to memory of 4916 4452 rundll32.exe 83 PID 4452 wrote to memory of 4916 4452 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Sollar\liboscar.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Sollar\liboscar.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4916
-