Overview
overview
9Static
static
9Usp10.dll
windows7-x64
1Usp10.dll
windows10-2004-x64
8cf刷枪3.exe
windows7-x64
6cf刷枪3.exe
windows10-2004-x64
6iext.dll
windows7-x64
1iext.dll
windows10-2004-x64
1internet.dll
windows7-x64
1internet.dll
windows10-2004-x64
1krnln.dll
windows7-x64
1krnln.dll
windows10-2004-x64
1spec.dll
windows7-x64
1spec.dll
windows10-2004-x64
1xplib.dll
windows7-x64
1xplib.dll
windows10-2004-x64
1Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 16:09
Behavioral task
behavioral1
Sample
Usp10.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Usp10.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
cf刷枪3.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
cf刷枪3.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
iext.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
iext.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
internet.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
internet.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
krnln.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
krnln.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
spec.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
spec.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
xplib.dll
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
xplib.dll
Resource
win10v2004-20220901-en
General
-
Target
xplib.dll
-
Size
80KB
-
MD5
8f385e7c8cf1f8ebdae0448473977cc7
-
SHA1
942bf465e29a5e5f85580eb30aa9510b92f802d7
-
SHA256
d1a1c6bac6a498adccdafab9d600a372aa9d5b826a33cfa06aaa9f75357c5b23
-
SHA512
2372a8857591b829763cacbdfc0cf3d4884598c5f1c43f0815257cb7fb3b2c93b60b1027480e1d5a93bbc6eba054328d8d2b4997c7d81a5360811f8f1eecafa1
-
SSDEEP
768:25tYWNgMBrw1cbmKrvtt9AK+HSTGwBtL9hlkU8MiP+cTqp2DYGH+toh+z9:25tY2BEe/CSTGOfqqLSCoQ9
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4920 wrote to memory of 4844 4920 rundll32.exe rundll32.exe PID 4920 wrote to memory of 4844 4920 rundll32.exe rundll32.exe PID 4920 wrote to memory of 4844 4920 rundll32.exe rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4844-132-0x0000000000000000-mapping.dmp