Overview
overview
10Static
static
10real shit/...ty.dll
windows10-2004-x64
3real shit/...al.exe
windows10-2004-x64
10real shit/...-0.dll
windows10-2004-x64
3real shit/...-0.dll
windows10-2004-x64
3real shit/...-0.dll
windows10-2004-x64
3real shit/...-0.dll
windows10-2004-x64
3real shit/...-0.dll
windows10-2004-x64
3real shit/...-0.dll
windows10-2004-x64
3real shit/...-0.dll
windows10-2004-x64
3real shit/...-0.dll
windows10-2004-x64
3Analysis
-
max time kernel
96s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2025, 15:48 UTC
Behavioral task
behavioral1
Sample
real shit/Accessibility.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
real shit/SamsungCommisionExternal.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
real shit/api-ms-win-core-heap-l1-1-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
real shit/api-ms-win-core-interlocked-l1-1-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
real shit/api-ms-win-core-libraryloader-l1-1-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
real shit/api-ms-win-core-localization-l1-2-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
real shit/api-ms-win-core-memory-l1-1-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
real shit/api-ms-win-core-namedpipe-l1-1-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
real shit/api-ms-win-core-processenvironment-l1-1-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
real shit/api-ms-win-core-processthreads-l1-1-0.dll
Resource
win10v2004-20241007-en
General
-
Target
real shit/api-ms-win-core-processthreads-l1-1-0.dll
-
Size
13KB
-
MD5
1641a8027af5a754dd164d6044917014
-
SHA1
5577d0be9d5d3874448e9f2c77286870c05f6d1d
-
SHA256
f8c0711a512059c648e83bef2f5b23119a454f457496e1dfead71d6942298863
-
SHA512
dded04a5211fe7762952afe39d51fa3540c0d7025c19468d2b5218f58bdd88043977f9eff99aa33decb6599bb3a4dd2a326cf9fc4fd7f6c4f3d38ef18e77d339
-
SSDEEP
384:1Hk1JzBcKcIpWphW8wGyaGECifl/zdbQD:1+cKc1/tzO
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2024 2032 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2032 1404 rundll32.exe 83 PID 1404 wrote to memory of 2032 1404 rundll32.exe 83 PID 1404 wrote to memory of 2032 1404 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\real shit\api-ms-win-core-processthreads-l1-1-0.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\real shit\api-ms-win-core-processthreads-l1-1-0.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 6003⤵
- Program crash
PID:2024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2032 -ip 20321⤵PID:4980
Network
-
Remote address:8.8.8.8:53Request210.156.23.2.in-addr.arpaIN PTRResponse210.156.23.2.in-addr.arpaIN PTRa2-23-156-210deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request69.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request3.108.50.23.in-addr.arpaIN PTRResponse3.108.50.23.in-addr.arpaIN PTRa23-50-108-3deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request197.87.175.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request130.118.77.104.in-addr.arpaIN PTRResponse130.118.77.104.in-addr.arpaIN PTRa104-77-118-130deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request98.250.22.2.in-addr.arpaIN PTRResponse98.250.22.2.in-addr.arpaIN PTRa2-22-250-98deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
71 B 135 B 1 1
DNS Request
210.156.23.2.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
69.31.126.40.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
3.108.50.23.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
197.87.175.4.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
130.118.77.104.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
98.250.22.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa