Overview
overview
10Static
static
3Engine.js
windows7-x64
3Engine.js
windows10-2004-x64
3Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10bin/UbuilderB.exe
windows7-x64
1bin/UbuilderB.exe
windows10-2004-x64
7bin/scv.jar
windows7-x64
1bin/scv.jar
windows10-2004-x64
1cutline.ppt
windows7-x64
1cutline.ppt
windows10-2004-x64
1d3dx9_43.dll
windows7-x64
1d3dx9_43.dll
windows10-2004-x64
1packages/D...1].exe
windows7-x64
1packages/D...1].exe
windows10-2004-x64
1xNet.dll
windows7-x64
1xNet.dll
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
Engine.js
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Engine.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
bin/UbuilderB.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
bin/UbuilderB.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
bin/scv.jar
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
bin/scv.jar
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
cutline.ppt
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
cutline.ppt
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
d3dx9_43.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
d3dx9_43.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
packages/DirectoryMonitor_[1MB]_[1].exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
packages/DirectoryMonitor_[1MB]_[1].exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
xNet.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
xNet.dll
Resource
win10v2004-20240508-en
General
-
Target
packages/DirectoryMonitor_[1MB]_[1].exe
-
Size
1.9MB
-
MD5
76067380db217854920c9652e6276ae1
-
SHA1
10442a38db18218953418b84bb8684a3fa399312
-
SHA256
d74373f86c366409db3392258b552e35477ffd47d968d094abad170663193fc6
-
SHA512
91a42d2196b42515132ccdbc40dec46396995d80da5a44eded2d16fe4350c50a68a2556a80acdccef823bc233b4fa5a88a6423748e9fea2e23795339795857f9
-
SSDEEP
12288:hc6VJx4LOQyQLkoCPs+b4H4APA60jEcflSIQZXDVrZLpYHT:hhJxPQySCod3c8pZzhnYHT
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
DirectoryMonitor_[1MB]_[1].exedescription pid process target process PID 1988 wrote to memory of 1592 1988 DirectoryMonitor_[1MB]_[1].exe WerFault.exe PID 1988 wrote to memory of 1592 1988 DirectoryMonitor_[1MB]_[1].exe WerFault.exe PID 1988 wrote to memory of 1592 1988 DirectoryMonitor_[1MB]_[1].exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\packages\DirectoryMonitor_[1MB]_[1].exe"C:\Users\Admin\AppData\Local\Temp\packages\DirectoryMonitor_[1MB]_[1].exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1988 -s 5322⤵