Overview
overview
10Static
static
3033307fec0...a7.exe
windows7-x64
10033307fec0...a7.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3SetCursor.dll
windows7-x64
3SetCursor.dll
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 19:16
Static task
static1
Behavioral task
behavioral1
Sample
033307fec0c703420af6995ba321da2c23d2d91ffe2acb6e4697e0b5846030a7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
033307fec0c703420af6995ba321da2c23d2d91ffe2acb6e4697e0b5846030a7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
SetCursor.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SetCursor.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/nsDialogs.dll
-
Size
9KB
-
MD5
e75ae7cfe06ff9692d98a934f6aa2d3c
-
SHA1
d5fd4a59a39630c4693ce656bbbc0a55ede0a500
-
SHA256
1f861aeb145ebbb9a2628414e6dca6b06d0bfb252f2de624b86814cfec8097d0
-
SHA512
ab4998f8f6bbb60321d0c2aa941d4e85319901960297059bf0832cf84b18dfbb120c3aa71963b46d3be3b7c9602434cb23f9a961c00de02403b3f266b294d41b
-
SSDEEP
96:3np41CMj95rKhkfL5RkEdKkcxM2DjDf3GEEE9v5E9av+Yx40ndY7ndS27gA:3nujesS4HREEK5MYxtdqn420
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 772 1768 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1768 2348 rundll32.exe 30 PID 2348 wrote to memory of 1768 2348 rundll32.exe 30 PID 2348 wrote to memory of 1768 2348 rundll32.exe 30 PID 2348 wrote to memory of 1768 2348 rundll32.exe 30 PID 2348 wrote to memory of 1768 2348 rundll32.exe 30 PID 2348 wrote to memory of 1768 2348 rundll32.exe 30 PID 2348 wrote to memory of 1768 2348 rundll32.exe 30 PID 1768 wrote to memory of 772 1768 rundll32.exe 31 PID 1768 wrote to memory of 772 1768 rundll32.exe 31 PID 1768 wrote to memory of 772 1768 rundll32.exe 31 PID 1768 wrote to memory of 772 1768 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsDialogs.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsDialogs.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 2443⤵
- Program crash
PID:772
-
-