Overview
overview
6Static
static
SWZ-2.03/�...d9.dll
windows7-x64
1SWZ-2.03/�...d9.dll
windows10-2004-x64
3SWZ-2.03/�...an.dll
windows7-x64
1SWZ-2.03/�...an.dll
windows10-2004-x64
1SWZ-2.03/�...er.exe
windows7-x64
6SWZ-2.03/�...er.exe
windows10-2004-x64
6SWZ-2.03/�...en.exe
windows7-x64
SWZ-2.03/�...en.exe
windows10-2004-x64
数码资源网.url
windows7-x64
1数码资源网.url
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 05:13
Static task
static1
Behavioral task
behavioral1
Sample
SWZ-2.03/【520传奇】守望者加速2.03/GWH_d3d9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SWZ-2.03/【520传奇】守望者加速2.03/GWH_d3d9.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
SWZ-2.03/【520传奇】守望者加速2.03/GWHookMan.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
SWZ-2.03/【520传奇】守望者加速2.03/GWHookMan.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
SWZ-2.03/【520传奇】守望者加速2.03/GameWatcher.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
SWZ-2.03/【520传奇】守望者加速2.03/GameWatcher.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
SWZ-2.03/【520传奇】守望者加速2.03/Gwken.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
SWZ-2.03/【520传奇】守望者加速2.03/Gwken.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
数码资源网.url
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
数码资源网.url
Resource
win10v2004-20221111-en
General
-
Target
SWZ-2.03/【520传奇】守望者加速2.03/GWH_d3d9.dll
-
Size
125KB
-
MD5
dbc0315bce54b4f4a6dd0b2527be1e92
-
SHA1
3747fbc12557ae456e0a5ab1367d368766befc5c
-
SHA256
c7b80c2adfcf778923fb8c91e749162f0bd948ea48c291130b2e9576181dd3f0
-
SHA512
4ba29478fa9dbb3802a3e5fe7a4517960bc586923ccf8a1bbac0308a92117c61f4ee9bea6d39fa3690a77d209217dee5967eafe0a8da8061a3ab229f2d9c3762
-
SSDEEP
1536:yfTuFJmuEHFRAg0JaQTvlw4LZM/T68ANKCRnC3g/Y6Z/+54arPiHu3y:yfTuFJmlc3iJCRCQ/PQ54aD
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4724 3312 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2072 wrote to memory of 3312 2072 rundll32.exe rundll32.exe PID 2072 wrote to memory of 3312 2072 rundll32.exe rundll32.exe PID 2072 wrote to memory of 3312 2072 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SWZ-2.03\【520传奇】守望者加速2.03\GWH_d3d9.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SWZ-2.03\【520传奇】守望者加速2.03\GWH_d3d9.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 7563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3312 -ip 33121⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3312-132-0x0000000000000000-mapping.dmp