Overview
overview
6Static
static
SWZ-2.03/�...d9.dll
windows7-x64
1SWZ-2.03/�...d9.dll
windows10-2004-x64
3SWZ-2.03/�...an.dll
windows7-x64
1SWZ-2.03/�...an.dll
windows10-2004-x64
1SWZ-2.03/�...er.exe
windows7-x64
6SWZ-2.03/�...er.exe
windows10-2004-x64
6SWZ-2.03/�...en.exe
windows7-x64
SWZ-2.03/�...en.exe
windows10-2004-x64
数码资源网.url
windows7-x64
1数码资源网.url
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 05:13
Static task
static1
Behavioral task
behavioral1
Sample
SWZ-2.03/【520传奇】守望者加速2.03/GWH_d3d9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SWZ-2.03/【520传奇】守望者加速2.03/GWH_d3d9.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
SWZ-2.03/【520传奇】守望者加速2.03/GWHookMan.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
SWZ-2.03/【520传奇】守望者加速2.03/GWHookMan.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
SWZ-2.03/【520传奇】守望者加速2.03/GameWatcher.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
SWZ-2.03/【520传奇】守望者加速2.03/GameWatcher.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
SWZ-2.03/【520传奇】守望者加速2.03/Gwken.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
SWZ-2.03/【520传奇】守望者加速2.03/Gwken.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
数码资源网.url
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
数码资源网.url
Resource
win10v2004-20221111-en
General
-
Target
SWZ-2.03/【520传奇】守望者加速2.03/GWHookMan.dll
-
Size
221KB
-
MD5
2c888c17546bcb8d00f31708e4f2063b
-
SHA1
16eed93cf69c986d2f7d2086f83df8e69cc07497
-
SHA256
6b28948d9e4c4a3abf3e638d7f2dd58b2061936ef7667525855d76e5024e7839
-
SHA512
30e729196d51527b4e4a66ab492cf0eb21677329603421f994c2a13049d812e0785d8687a52507852a7f58646285f35f3d02161bf3e0a600b8ec6ea980ad895e
-
SSDEEP
3072:6+Uma3UstdxTRAZOP0EhfGIdoASnmEskq5/JbP:lUmSPyU0kezRfsk4
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 868 wrote to memory of 4768 868 rundll32.exe rundll32.exe PID 868 wrote to memory of 4768 868 rundll32.exe rundll32.exe PID 868 wrote to memory of 4768 868 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SWZ-2.03\【520传奇】守望者加速2.03\GWHookMan.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SWZ-2.03\【520传奇】守望者加速2.03\GWHookMan.dll,#12⤵PID:4768