Overview
overview
10Static
static
3Request fo...22.exe
windows7-x64
10Request fo...22.exe
windows10-2004-x64
7$PLUGINSDIR/Math.dll
windows7-x64
3$PLUGINSDIR/Math.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Sheaveman/...7.html
windows7-x64
3Sheaveman/...7.html
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 21:06
Static task
static1
Behavioral task
behavioral1
Sample
Request for Quote (Waseda University) 29- 08-2022.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Request for Quote (Waseda University) 29- 08-2022.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Math.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Math.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Sheaveman/Preinquisition/english37.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Sheaveman/Preinquisition/english37.html
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/Math.dll
-
Size
67KB
-
MD5
9d6394107e64698376114b0f51a86489
-
SHA1
0321c9408d5a3f95520860732cd3906a506daabe
-
SHA256
b818f87c127d6319aafd6b0826c809bcc4e0e1fdcc41c9aa0d1cc003246c6b48
-
SHA512
b6f6a99a9dcb78c1410d1b351a5df2e4eb4d43499f8d12639e5acc516c5416d268ca0fa64b0d191b6918ed12b461c68a8b58bc0a85237f3914d75f0198719b52
-
SSDEEP
1536:5UZ9QC7V7IGMp2ZmtSX5p9IeJXlSM2t3:+97WSth5lwt
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2376 3464 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 744 wrote to memory of 3464 744 rundll32.exe 83 PID 744 wrote to memory of 3464 744 rundll32.exe 83 PID 744 wrote to memory of 3464 744 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Math.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Math.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 6003⤵
- Program crash
PID:2376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3464 -ip 34641⤵PID:860