Overview
overview
7Static
static
7tm2008prev...hs.exe
windows7-x64
7tm2008prev...hs.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
7$PLUGINSDI...ll.dll
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1ATL80.dll
windows7-x64
1ATL80.dll
windows10-2004-x64
1InstAsm.exe
windows7-x64
1InstAsm.exe
windows10-2004-x64
1新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 01:54
Behavioral task
behavioral1
Sample
tm2008preview4_chs.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
tm2008preview4_chs.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ProcDll.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ProcDll.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/QQUIHelper.dll
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/QQUIHelper.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/SysVer.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/SysVer.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
ATL80.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
ATL80.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
InstAsm.exe
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
InstAsm.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
新云软件.url
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
新云软件.url
Resource
win10v2004-20240508-en
General
-
Target
$PLUGINSDIR/ProcDll.dll
-
Size
19KB
-
MD5
62d2f0a425fab6799db0b7b4eb939696
-
SHA1
0a4487159fcec57d63d172559c51e75a184ae559
-
SHA256
7adc45f2e2b5f5fdeaa7ff5a83bac63fef729979702f4997ecb0a8b6a1a0f785
-
SHA512
cbebe63ab2797bb7f8d1d3fa96b8e6839148e20c56b326682d8aff55ef28b16b75c9bfab6b0011847945f0842a30d5bd8faa038b8fe38b356941863d62b7992f
-
SSDEEP
384:yovD5PJ+3KrgkUb5EwtiIxwTXKfK0ma6mUY00/NaKEs3:DdPY3KrkdtiIAkl6m5jxE
Malware Config
Signatures
-
resource yara_rule behavioral7/memory/1208-0-0x0000000010000000-0x0000000010013000-memory.dmp upx behavioral7/memory/1208-1-0x0000000010000000-0x0000000010013000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3052 1208 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1208 2052 rundll32.exe 28 PID 2052 wrote to memory of 1208 2052 rundll32.exe 28 PID 2052 wrote to memory of 1208 2052 rundll32.exe 28 PID 2052 wrote to memory of 1208 2052 rundll32.exe 28 PID 2052 wrote to memory of 1208 2052 rundll32.exe 28 PID 2052 wrote to memory of 1208 2052 rundll32.exe 28 PID 2052 wrote to memory of 1208 2052 rundll32.exe 28 PID 1208 wrote to memory of 3052 1208 rundll32.exe 29 PID 1208 wrote to memory of 3052 1208 rundll32.exe 29 PID 1208 wrote to memory of 3052 1208 rundll32.exe 29 PID 1208 wrote to memory of 3052 1208 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ProcDll.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ProcDll.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 2323⤵
- Program crash
PID:3052
-
-