Overview
overview
10Static
static
3fa84aaca64...24.exe
windows7-x64
10fa84aaca64...24.exe
windows10-2004-x64
10$PLUGINSDI...og.dll
windows7-x64
3$PLUGINSDI...og.dll
windows10-2004-x64
30/Setup.exe
windows7-x64
30/Setup.exe
windows10-2004-x64
3039F3.dll
windows7-x64
1039F3.dll
windows10-2004-x64
1039F4.js
windows7-x64
3039F4.js
windows10-2004-x64
31/333.exe
windows7-x64
31/333.exe
windows10-2004-x64
32/babka.cmd
windows7-x64
62/babka.cmd
windows10-2004-x64
6Ionic.Zip.dll
windows7-x64
1Ionic.Zip.dll
windows10-2004-x64
1SibClr.dll
windows7-x64
3SibClr.dll
windows10-2004-x64
3Sibjs.exe
windows7-x64
3Sibjs.exe
windows10-2004-x64
3Sibuia.exe
windows7-x64
3Sibuia.exe
windows10-2004-x64
3Zip.dll
windows7-x64
1Zip.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 13:54
Static task
static1
Behavioral task
behavioral1
Sample
fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa84aaca643d68422484d8c78e900d06102d0fbff57598755e97705bfe419c24.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/siblog.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/siblog.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
0/Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
0/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
039F3.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
039F3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
039F4.js
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
039F4.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
1/333.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
1/333.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
2/babka.cmd
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
2/babka.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Ionic.Zip.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Ionic.Zip.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
SibClr.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
SibClr.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Sibjs.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Sibjs.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Sibuia.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
Sibuia.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Zip.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Zip.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/siblog.dll
-
Size
146KB
-
MD5
2fab606d750aad11fbf8e0a9060172db
-
SHA1
b2e40332e179f921a73c64ea09a54c0f2bf75959
-
SHA256
d3289b09fc9c37a80f0215b5c8c7990b9d3353e0c27cc4689e806d6026b6dda7
-
SHA512
1670ddfb2233c346a8cd5ee88700697c17123923da964e115c6ade238f77b421f51bf6459bf46bb3966f1de8fdeeeda774d7100b5c5dac46e53e738e8691ab1f
-
SSDEEP
3072:jK2xllPc8r1tFA7mJKDZ9KofLSMqtugBC7TlNK/574C:FxlyU3C6e97LnzO574C
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2248 1780 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1780 1916 rundll32.exe 31 PID 1916 wrote to memory of 1780 1916 rundll32.exe 31 PID 1916 wrote to memory of 1780 1916 rundll32.exe 31 PID 1916 wrote to memory of 1780 1916 rundll32.exe 31 PID 1916 wrote to memory of 1780 1916 rundll32.exe 31 PID 1916 wrote to memory of 1780 1916 rundll32.exe 31 PID 1916 wrote to memory of 1780 1916 rundll32.exe 31 PID 1780 wrote to memory of 2248 1780 rundll32.exe 32 PID 1780 wrote to memory of 2248 1780 rundll32.exe 32 PID 1780 wrote to memory of 2248 1780 rundll32.exe 32 PID 1780 wrote to memory of 2248 1780 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\siblog.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\siblog.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 2203⤵
- Program crash
PID:2248
-
-