Overview
overview
9Static
static
9�...PI.dll
windows7-x64
6�...PI.dll
windows10-2004-x64
6�...te.exe
windows7-x64
1�...te.exe
windows10-2004-x64
1�...th.dll
windows7-x64
8�...th.dll
windows10-2004-x64
8�...ts.exe
windows7-x64
8�...ts.exe
windows10-2004-x64
8�...ok.dll
windows7-x64
8�...ok.dll
windows10-2004-x64
8�...st.dll
windows7-x64
8�...st.dll
windows10-2004-x64
8�...��.exe
windows7-x64
9�...��.exe
windows10-2004-x64
9�...��.exe
windows7-x64
1�...��.exe
windows10-2004-x64
1�...��.bat
windows7-x64
1�...��.bat
windows10-2004-x64
1�...��.bat
windows7-x64
1�...��.bat
windows10-2004-x64
1Analysis
-
max time kernel
16s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 22:40
Behavioral task
behavioral1
Sample
ʹ֮/CrackCaptchaAPI.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ʹ֮/CrackCaptchaAPI.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
ʹ֮/Update.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
ʹ֮/Update.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
ʹ֮/VAuth.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
ʹ֮/VAuth.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
ʹ֮/dts.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
ʹ֮/dts.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
ʹ֮/hook.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
ʹ֮/hook.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
ʹ֮/test.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
ʹ֮/test.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
ʹ֮/ƶ.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
ʹ֮/ƶ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
ʹ֮/ƽⲹ.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
ʹ֮/ƽⲹ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
ʹ֮/ֶɾ.bat
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
ʹ֮/ֶɾ.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
ʹ֮/ֶע.bat
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
ʹ֮/ֶע.bat
Resource
win10v2004-20220812-en
General
-
Target
ʹ֮/CrackCaptchaAPI.dll
-
Size
1.3MB
-
MD5
6046edcc5db052bea9e7e6d2f2e869b1
-
SHA1
f9efa2ff06eb664a0a3e9f2c53bc1c538c59b590
-
SHA256
07b407b9344bc636a5595493f4bef9e66a3e0f14d6557c3a2a979a400670235c
-
SHA512
fc6340b7a795566126da4efe6228a19eb36ee22e35323ad892289a62481ed414f1486a64c770bcb53ad6d8967363d81da91839ddd2a11c1dfb1e72a51a9bd8a8
-
SSDEEP
24576:An6WrvFhoN0oXr2HbAR4rMuwKc3QC5fexfduH2FRNEpzvKdYu2TB3DEZ:APNet4PWQC5yluHQuzQYTTFIZ
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exedescription ioc process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1380 wrote to memory of 1400 1380 rundll32.exe rundll32.exe PID 1380 wrote to memory of 1400 1380 rundll32.exe rundll32.exe PID 1380 wrote to memory of 1400 1380 rundll32.exe rundll32.exe PID 1380 wrote to memory of 1400 1380 rundll32.exe rundll32.exe PID 1380 wrote to memory of 1400 1380 rundll32.exe rundll32.exe PID 1380 wrote to memory of 1400 1380 rundll32.exe rundll32.exe PID 1380 wrote to memory of 1400 1380 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ʹ֮\CrackCaptchaAPI.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ʹ֮\CrackCaptchaAPI.dll,#12⤵
- Writes to the Master Boot Record (MBR)
PID:1400
-