Overview
overview
10Static
static
3stage3.zip
windows10-2004-x64
10BugSplat.dll
windows10-2004-x64
3Drieb.ba
windows10-2004-x64
3Drouncloobthoub.odo
windows10-2004-x64
3MonitoData.exe
windows10-2004-x64
10ThreadCore.dll
windows10-2004-x64
3ios_manager.dll
windows10-2004-x64
3itunes_manager.dll
windows10-2004-x64
3libcurl.dll
windows10-2004-x64
3msvcp140.dll
windows10-2004-x64
3ts_base.dll
windows10-2004-x64
3ts_client.dll
windows10-2004-x64
3ts_sqlite3.dll
windows10-2004-x64
3vcruntime140.dll
windows10-2004-x64
3Analysis
-
max time kernel
103s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250502-en -
resource tags
arch:x64arch:x86image:win10v2004-20250502-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2025, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
stage3.zip
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
BugSplat.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral3
Sample
Drieb.ba
Resource
win10v2004-20250502-en
Behavioral task
behavioral4
Sample
Drouncloobthoub.odo
Resource
win10v2004-20250502-en
Behavioral task
behavioral5
Sample
MonitoData.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral6
Sample
ThreadCore.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral7
Sample
ios_manager.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral8
Sample
itunes_manager.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral9
Sample
libcurl.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral10
Sample
msvcp140.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral11
Sample
ts_base.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral12
Sample
ts_client.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral13
Sample
ts_sqlite3.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral14
Sample
vcruntime140.dll
Resource
win10v2004-20250502-en
General
-
Target
ts_sqlite3.dll
-
Size
632KB
-
MD5
05ab4a7d1e1fbc90b36a9d26458ff47b
-
SHA1
b99910a28acddd6f5119e05dd3054618c93cfd63
-
SHA256
561582c390c62da5ca8a5a22f81340c619ec1663ad7a8bd2aa2f81f71397f953
-
SHA512
cc3bd7a09010969a655c60101e49ad19cd0132676a4b99982f7cbd9a9ae7fae7bca4e2d74d018311424c2fc6d18f50f032366ca83c4f30f8d85edca8ac83de2d
-
SSDEEP
12288:NHFXEYA4KKYRQsAWOlKFJlJISYuaw1FwoZF3RcIGkAS2EEYXeg91QjAWT:NlXEYADpRxAfsZ0uajs3cIGkr1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4172 wrote to memory of 2532 4172 rundll32.exe 87 PID 4172 wrote to memory of 2532 4172 rundll32.exe 87 PID 4172 wrote to memory of 2532 4172 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ts_sqlite3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ts_sqlite3.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2532
-