Overview
overview
9Static
static
9hwid pack/...sk.exe
windows10-1703-x64
6hwid pack/...up.exe
windows10-1703-x64
3hwid pack/...RU.exe
windows10-1703-x64
3hwid pack/...ll.exe
windows10-1703-x64
3hwid pack/...rt.exe
windows10-1703-x64
5hwid pack/...64.exe
windows10-1703-x64
5hwid pack/...IN.exe
windows10-1703-x64
3hwid pack/...64.exe
windows10-1703-x64
1hwid pack/...16.exe
windows10-1703-x64
hwid pack/...IT.exe
windows10-1703-x64
1hwid pack/...LL.dll
windows10-1703-x64
3hwid pack/...YS.sys
windows10-1703-x64
1hwid pack/...64.sys
windows10-1703-x64
1hwid pack/...64.sys
windows10-1703-x64
1hwid pack/...lp.pdf
windows10-1703-x64
3hwid pack/...rt.exe
windows10-1703-x64
3hwid pack/...Un.exe
windows10-1703-x64
6hwid pack/...Un.exe
windows10-1703-x64
6hwid pack/...ew.chm
windows10-1703-x64
1hwid pack/...ew.exe
windows10-1703-x64
6Analysis
-
max time kernel
79s -
max time network
81s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
01-08-2024 21:16
Behavioral task
behavioral1
Sample
hwid pack/HardDisk.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
hwid pack/MacSetup.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
hwid pack/monitor serial/CRU.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
hwid pack/monitor serial/reset-all.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
hwid pack/monitor serial/restart.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
hwid pack/monitor serial/restart64.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
hwid pack/serial changer/AMIDEWIN.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
hwid pack/serial changer/AMIDEWINx64.exe
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
hwid pack/serial changer/DMI16.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
hwid pack/serial changer/DMIEDIT.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
hwid pack/serial changer/UCOREDLL.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
hwid pack/serial changer/UCORESYS.sys
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
hwid pack/serial changer/UCOREW64.sys
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
hwid pack/serial changer/amifldrv64.sys
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
hwid pack/uninstall/Revo Uninstaller Help.pdf
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
hwid pack/uninstall/RevoUPort.exe
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
hwid pack/uninstall/x64/RevoUn.exe
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
hwid pack/uninstall/x86/RevoUn.exe
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
hwid pack/usb device serial/USBDeview.chm
Resource
win10-20240611-en
Behavioral task
behavioral20
Sample
hwid pack/usb device serial/USBDeview.exe
Resource
win10-20240404-en
General
-
Target
hwid pack/serial changer/UCOREDLL.dll
-
Size
112KB
-
MD5
8370f3114924ed6c53741de7a253625a
-
SHA1
f7782d51e73526226a89229b4f3625c7ce43f3b3
-
SHA256
78a4d8e5e8c33793e5a2020325d3a49e92e4826167742e93179bdacbf167b409
-
SHA512
5a13c0fb787366869fac57139fa2ebbd0c34a1bfa76c05ac879da60e534cbac694385f2b6120fdb6c7cf0e62cf4948efbdfde96e695a9d377f44eedb2e1b1398
-
SSDEEP
1536:g+FKwswB29BLymvRwRvSpD0pQD61ShZT1Cw4cf0SbtsWFoYc0RkU:g8Vk9ymvyNMO4QqGeyqoLGL
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4348 1672 WerFault.exe 75 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4788 wrote to memory of 1672 4788 rundll32.exe 75 PID 4788 wrote to memory of 1672 4788 rundll32.exe 75 PID 4788 wrote to memory of 1672 4788 rundll32.exe 75
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\hwid pack\serial changer\UCOREDLL.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\hwid pack\serial changer\UCOREDLL.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 6243⤵
- Program crash
PID:4348
-
-