Overview
overview
10Static
static
7malware/1/Setup.exe
windows7-x64
10malware/1/Setup.exe
windows10-2004-x64
10malware/2/Setup.exe
windows7-x64
10malware/2/Setup.exe
windows10-2004-x64
10malware/3/...p_.exe
windows7-x64
7malware/3/...p_.exe
windows10-2004-x64
7malware/4/Setup.exe
windows7-x64
10malware/4/Setup.exe
windows10-2004-x64
10malware/5/...ls.dll
windows7-x64
1malware/5/...ls.dll
windows10-2004-x64
1malware/5/...ng.dll
windows7-x64
1malware/5/...ng.dll
windows10-2004-x64
1malware/5/...nt.dll
windows7-x64
1malware/5/...nt.dll
windows10-2004-x64
1malware/5/...pt.dll
windows7-x64
1malware/5/...pt.dll
windows10-2004-x64
1malware/5/...ib.dll
windows7-x64
1malware/5/...ib.dll
windows10-2004-x64
1malware/5/...ns.dll
windows7-x64
1malware/5/...ns.dll
windows10-2004-x64
1malware/5/...on.dll
windows7-x64
1malware/5/...on.dll
windows10-2004-x64
1malware/5/...op.dll
windows7-x64
3malware/5/...op.dll
windows10-2004-x64
3malware/5/...en.dll
windows7-x64
1malware/5/...en.dll
windows10-2004-x64
1malware/5/...te.dll
windows7-x64
1malware/5/...te.dll
windows10-2004-x64
1malware/5/...ty.dll
windows7-x64
1malware/5/...ty.dll
windows10-2004-x64
1malware/5/...api.js
windows7-x64
3malware/5/...api.js
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/12/2024, 13:48
Behavioral task
behavioral1
Sample
malware/1/Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
malware/1/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
malware/2/Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
malware/2/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
malware/3/free_sea_of_thieves_hacks_(esp_.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
malware/3/free_sea_of_thieves_hacks_(esp_.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
malware/4/Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
malware/4/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
malware/5/Data/Plug-ins/root/data/BIBUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
malware/5/Data/Plug-ins/root/data/BIBUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
malware/5/Data/Plug-ins/root/data/CITThreading.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
malware/5/Data/Plug-ins/root/data/CITThreading.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
malware/5/Data/Plug-ins/root/data/CRClient.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
malware/5/Data/Plug-ins/root/data/CRClient.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
malware/5/Data/Plug-ins/root/data/ExtendScript.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
malware/5/Data/Plug-ins/root/data/ExtendScript.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
malware/5/Data/Plug-ins/root/data/JP2KLib.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
malware/5/Data/Plug-ins/root/data/JP2KLib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
malware/5/Data/Plug-ins/root/data/Microsoft.Expression.Interactions.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
malware/5/Data/Plug-ins/root/data/Microsoft.Expression.Interactions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
malware/5/Data/Plug-ins/root/data/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
malware/5/Data/Plug-ins/root/data/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
malware/5/Data/Plug-ins/root/data/SQLite.Interop.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
malware/5/Data/Plug-ins/root/data/SQLite.Interop.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
malware/5/Data/Plug-ins/root/data/SharpRaven.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
malware/5/Data/Plug-ins/root/data/SharpRaven.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
malware/5/Data/Plug-ins/root/data/System.Data.SQLite.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
malware/5/Data/Plug-ins/root/data/System.Data.SQLite.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
malware/5/Data/Plug-ins/root/data/System.Windows.Interactivity.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
malware/5/Data/Plug-ins/root/data/System.Windows.Interactivity.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
malware/5/Data/Plug-ins/root/data/api.js
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
malware/5/Data/Plug-ins/root/data/api.js
Resource
win10v2004-20241007-en
General
-
Target
malware/5/Data/Plug-ins/root/data/SQLite.Interop.dll
-
Size
1.1MB
-
MD5
5e99e9d7b9629bc21074718c1f974215
-
SHA1
4466e57c7b7ebf8450022888376bddce8f694b54
-
SHA256
8de21caa05e042e9b88bccd4cbcaf4805c457616f5989a4a75aa3f8e10a6b2fe
-
SHA512
7e93bea5ff1029c854f5928b6cd0d6a94a2688f17838217ed02b12cef20839b915b4c28ee3ec10a2b42a3b4913b9eea4ab3c1e278d36499c9936803aeedf0aa1
-
SSDEEP
24576:k3/SHu5WhsKfScMiASYfqpaVfBLisPSVFvFevynqEqLT9oyO:kPSHuEOj/fqcBjPSPFev8gmy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2500 1680 rundll32.exe 30 PID 1680 wrote to memory of 2500 1680 rundll32.exe 30 PID 1680 wrote to memory of 2500 1680 rundll32.exe 30 PID 1680 wrote to memory of 2500 1680 rundll32.exe 30 PID 1680 wrote to memory of 2500 1680 rundll32.exe 30 PID 1680 wrote to memory of 2500 1680 rundll32.exe 30 PID 1680 wrote to memory of 2500 1680 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\malware\5\Data\Plug-ins\root\data\SQLite.Interop.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\malware\5\Data\Plug-ins\root\data\SQLite.Interop.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2500
-