Overview
overview
9Static
static
9�...PI.dll
windows7-x64
6�...PI.dll
windows10-2004-x64
6�...te.exe
windows7-x64
1�...te.exe
windows10-2004-x64
1�...th.dll
windows7-x64
8�...th.dll
windows10-2004-x64
8�...ts.exe
windows7-x64
8�...ts.exe
windows10-2004-x64
8�...ok.dll
windows7-x64
8�...ok.dll
windows10-2004-x64
8�...st.dll
windows7-x64
8�...st.dll
windows10-2004-x64
8�...��.exe
windows7-x64
9�...��.exe
windows10-2004-x64
9�...��.exe
windows7-x64
1�...��.exe
windows10-2004-x64
1�...��.bat
windows7-x64
1�...��.bat
windows10-2004-x64
1�...��.bat
windows7-x64
1�...��.bat
windows10-2004-x64
1Analysis
-
max time kernel
183s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 22:40
Behavioral task
behavioral1
Sample
ʹ֮/CrackCaptchaAPI.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ʹ֮/CrackCaptchaAPI.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
ʹ֮/Update.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
ʹ֮/Update.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
ʹ֮/VAuth.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
ʹ֮/VAuth.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
ʹ֮/dts.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
ʹ֮/dts.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
ʹ֮/hook.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
ʹ֮/hook.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
ʹ֮/test.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
ʹ֮/test.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
ʹ֮/ƶ.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
ʹ֮/ƶ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
ʹ֮/ƽⲹ.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
ʹ֮/ƽⲹ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
ʹ֮/ֶɾ.bat
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
ʹ֮/ֶɾ.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
ʹ֮/ֶע.bat
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
ʹ֮/ֶע.bat
Resource
win10v2004-20220812-en
General
-
Target
ʹ֮/hook.dll
-
Size
780KB
-
MD5
d689f4979d99dc5627c7b28c57c24a52
-
SHA1
70b153e20e1b21807b76a0af57e55a4c3ef4c688
-
SHA256
96305bd113673cab2dcc7180997b4500235bb509fb68c144535401c6510a8332
-
SHA512
95d20816fa0d21354c5c6303ebe246add92c9f8bb8628106f2c6099013a97451f5e9a0356cfc14332ebe53f94e06e77f4deabac8feb4677b5d8ebf02a885e24e
-
SSDEEP
6144:ipUM6WA/ODBnKApJuyvNmxBnutFatR5EVFMNjM6sF7/Ts/IzemYRX/9QvCKXxaPS:ipYWDBnKggI2QzKEFwj6Bo/Y3m96G3K
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exeflow pid process 15 2440 rundll32.exe 16 2440 rundll32.exe 17 2440 rundll32.exe 19 2440 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
rundll32.exepid process 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe 2440 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 2440 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 5064 wrote to memory of 2440 5064 rundll32.exe rundll32.exe PID 5064 wrote to memory of 2440 5064 rundll32.exe rundll32.exe PID 5064 wrote to memory of 2440 5064 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ʹ֮\hook.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ʹ֮\hook.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2440
-