Overview
overview
8Static
static
1HRSword x6...rd.exe
windows7-x64
1HRSword x6...rd.exe
windows10-2004-x64
1HRSword x6...on.dll
windows7-x64
1HRSword x6...on.dll
windows10-2004-x64
3HRSword x6...rv.sys
windows7-x64
1HRSword x6...rv.sys
windows10-2004-x64
1HRSword x6...cs.dll
windows7-x64
1HRSword x6...cs.dll
windows10-2004-x64
1HRSword x6...se.dll
windows7-x64
1HRSword x6...se.dll
windows10-2004-x64
1HRSword x6...ot.dll
windows7-x64
1HRSword x6...ot.dll
windows10-2004-x64
1HRSword x6...ag.sys
windows7-x64
1HRSword x6...ag.sys
windows10-2004-x64
1HRSword x6...on.dll
windows7-x64
1HRSword x6...on.dll
windows10-2004-x64
1HRSword x6...ag.dll
windows7-x64
1HRSword x6...ag.dll
windows10-2004-x64
1HRSword x6...ag.exe
windows7-x64
1HRSword x6...ag.exe
windows10-2004-x64
1HRSword x6...��.bat
windows7-x64
8HRSword x6...��.bat
windows10-2004-x64
8Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 16:58
Static task
static1
Behavioral task
behavioral1
Sample
HRSword x64/HRSword.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HRSword x64/HRSword.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
HRSword x64/daemon.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
HRSword x64/daemon.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
HRSword x64/hrwfpdrv.sys
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
HRSword x64/hrwfpdrv.sys
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
HRSword x64/libcodecs.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
HRSword x64/libcodecs.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
HRSword x64/libxsse.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
HRSword x64/libxsse.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
HRSword x64/selfprot.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
HRSword x64/selfprot.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
HRSword x64/sysdiag.sys
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
HRSword x64/sysdiag.sys
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
HRSword x64/uactmon.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
HRSword x64/uactmon.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
HRSword x64/usysdiag.dll
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
HRSword x64/usysdiag.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
HRSword x64/usysdiag.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
HRSword x64/usysdiag.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
HRSword x64/ע.bat
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
HRSword x64/ע.bat
Resource
win10v2004-20240226-en
General
-
Target
HRSword x64/daemon.dll
-
Size
411KB
-
MD5
0a5953205c4d824cca92870707e568e9
-
SHA1
109afdffb6e4f6ebd5549ae36ffc4c91ab1429a8
-
SHA256
ac9eda0ff6dbe0d5868afa0a14dcb9a10379eb042f5b09749c4dcfb36c4dc0ba
-
SHA512
47f2c7532b5c4f5aa25c28da7bef32bff031e655ea75dfc6555b2c4585704cdcf1d3db29f543d8437906cfea722af0ee56767f27dd213d230da95997f2f1d051
-
SSDEEP
12288:C4jNg/cV4lMXjcRszkOAnKu3/kPCd3WnmlVnmSiRlTMve5n3sFoWQA:C4jNg/cVWMXIyoOKWnmlVnmSulTMhFoI
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3572 5092 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1876 wrote to memory of 5092 1876 rundll32.exe 88 PID 1876 wrote to memory of 5092 1876 rundll32.exe 88 PID 1876 wrote to memory of 5092 1876 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\HRSword x64\daemon.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\HRSword x64\daemon.dll",#12⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 6443⤵
- Program crash
PID:3572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5092 -ip 50921⤵PID:1932