Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 19:07

General

  • Target

    redist/directx5/dsetup32.dll

  • Size

    41KB

  • MD5

    3d98c98e3a859bb26aca297b6fff3cde

  • SHA1

    e3c0fc9afd704e22e12e5698ec076d634895b0fa

  • SHA256

    cdfeaf5ff77f4f0fa7460614e4fa6e74ab201694570f92fd7c20d3b155093895

  • SHA512

    adda54154a5c165d62bf76a1deced663abed061ffe58137a9dd47dca0fe49db9e6766806f88841c87806427c15dfdf24e3440474b8712415c0922a8baff19888

  • SSDEEP

    768:CXIWGknr/2BPOCPEG4RMKHSzdwnuJvkQrz:CX5Gcr+5XKAwnuJMQr

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\redist\directx5\dsetup32.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\redist\directx5\dsetup32.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3060
  • C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe
    "C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2388
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x16c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2388-0-0x0000000000210000-0x0000000000211000-memory.dmp

    Filesize

    4KB

  • memory/2388-5-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/2388-4-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/2388-3-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/2388-2-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/2388-1-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/2388-6-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/2388-7-0x0000000002020000-0x000000000202A000-memory.dmp

    Filesize

    40KB

  • memory/2388-12-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/2388-11-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/2388-10-0x0000000002020000-0x000000000202A000-memory.dmp

    Filesize

    40KB

  • memory/2388-9-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/2388-8-0x0000000000210000-0x0000000000211000-memory.dmp

    Filesize

    4KB

  • memory/2388-29-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/2388-31-0x00000000005A0000-0x00000000006A0000-memory.dmp

    Filesize

    1024KB

  • memory/2388-30-0x0000000009060000-0x0000000009860000-memory.dmp

    Filesize

    8.0MB

  • memory/2388-33-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/2388-32-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/2388-37-0x000007FEF606B000-0x000007FEF6080000-memory.dmp

    Filesize

    84KB

  • memory/2388-38-0x0000000002020000-0x000000000202A000-memory.dmp

    Filesize

    40KB

  • memory/2388-39-0x0000000002020000-0x000000000202A000-memory.dmp

    Filesize

    40KB

  • memory/2388-47-0x0000000000280000-0x0000000000284000-memory.dmp

    Filesize

    16KB