Overview
overview
6Static
static
3winthruste...32.dll
windows7-x64
1winthruste...32.dll
windows10-2004-x64
6winthruste...mm.dll
windows7-x64
1winthruste...mm.dll
windows10-2004-x64
1winthruste...21.exe
windows7-x64
4winthruste...21.exe
windows10-2004-x64
4更多下载.html
windows7-x64
1更多下载.html
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2023 14:29
Static task
static1
Behavioral task
behavioral1
Sample
winthrusterpropj/HookDLL/H_Hayat_x32.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
winthrusterpropj/HookDLL/H_Hayat_x32.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
winthrusterpropj/HookDLL/winmm.dll
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
winthrusterpropj/HookDLL/winmm.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
winthrusterpropj/Setup_WinThruster_2021.exe
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
winthrusterpropj/Setup_WinThruster_2021.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
更多下载.html
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
更多下载.html
Resource
win10v2004-20230703-en
General
-
Target
winthrusterpropj/HookDLL/H_Hayat_x32.dll
-
Size
15KB
-
MD5
fb6220758edfa39039e72a39ca14f66e
-
SHA1
d129c107e6eef34dc9ee45ead2a9266a9d9f5c0a
-
SHA256
567559749b615f54722897814baa4ab7e5c51caef0704805cc04aa1bc89f99eb
-
SHA512
d759b5692cfc5efdfdc167ee1747726a7082c71b43dccab650f8096fff9b2fcb2ac824f0c9353c0acfdcdbb83deef32696a0ae5fdd04a2ceb4047c659f315524
-
SSDEEP
384:gVeKO4bBl0324W1MeHwy3prDcquLaKUAqgT5TprWG:oeKO442X5DcquLaKU3gW
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\N: rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3800 wrote to memory of 2976 3800 rundll32.exe rundll32.exe PID 3800 wrote to memory of 2976 3800 rundll32.exe rundll32.exe PID 3800 wrote to memory of 2976 3800 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\winthrusterpropj\HookDLL\H_Hayat_x32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\winthrusterpropj\HookDLL\H_Hayat_x32.dll,#12⤵
- Enumerates connected drives
PID:2976
-