Overview
overview
10Static
static
3stage3.zip
windows10-2004-x64
10BugSplat.dll
windows10-2004-x64
3Drieb.ba
windows10-2004-x64
3Drouncloobthoub.odo
windows10-2004-x64
3MonitoData.exe
windows10-2004-x64
10ThreadCore.dll
windows10-2004-x64
3ios_manager.dll
windows10-2004-x64
3itunes_manager.dll
windows10-2004-x64
3libcurl.dll
windows10-2004-x64
3msvcp140.dll
windows10-2004-x64
3ts_base.dll
windows10-2004-x64
3ts_client.dll
windows10-2004-x64
3ts_sqlite3.dll
windows10-2004-x64
3vcruntime140.dll
windows10-2004-x64
3Analysis
-
max time kernel
104s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250502-en -
resource tags
arch:x64arch:x86image:win10v2004-20250502-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2025, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
stage3.zip
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
BugSplat.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral3
Sample
Drieb.ba
Resource
win10v2004-20250502-en
Behavioral task
behavioral4
Sample
Drouncloobthoub.odo
Resource
win10v2004-20250502-en
Behavioral task
behavioral5
Sample
MonitoData.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral6
Sample
ThreadCore.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral7
Sample
ios_manager.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral8
Sample
itunes_manager.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral9
Sample
libcurl.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral10
Sample
msvcp140.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral11
Sample
ts_base.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral12
Sample
ts_client.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral13
Sample
ts_sqlite3.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral14
Sample
vcruntime140.dll
Resource
win10v2004-20250502-en
General
-
Target
ThreadCore.dll
-
Size
77KB
-
MD5
f6e668ebcc5deb4b652f6568378a4c2f
-
SHA1
05b98ae780648a567340d97414f7ccfc85181c85
-
SHA256
8b21474dec836da8ae8cbe705d7b244b88a062b6f465128bb782a9429330fa8e
-
SHA512
1d1ff708ddcb47f69375f521d83fe901055b529d215f52c7e3acb9dbec30b3190c03fad2b7db4d79cbcf0777bdfb1733f26495da31ccce5922c1966e73c3dbd8
-
SSDEEP
1536:4jInhBLrTsBZ4KHU8c5AmYORoM7HxbBnJ7Ztxk:48nP4z0DlRoM5hJdw
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2728 2112 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 6036 wrote to memory of 2112 6036 rundll32.exe 87 PID 6036 wrote to memory of 2112 6036 rundll32.exe 87 PID 6036 wrote to memory of 2112 6036 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ThreadCore.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:6036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ThreadCore.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 6003⤵
- Program crash
PID:2728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2112 -ip 21121⤵PID:5880