Overview
overview
10Static
static
10EasyHook.dll
windows11-21h2-x64
1EasyHook32.dll
windows11-21h2-x64
3EasyHook32Svc.exe
windows11-21h2-x64
3EasyHook64.dll
windows11-21h2-x64
1EasyHook64Svc.exe
windows11-21h2-x64
1EasyHookSvc.exe
windows11-21h2-x64
3Ionic.Zip.Reduced.dll
windows11-21h2-x64
1Jint.dll
windows11-21h2-x64
1NAudio.dll
windows11-21h2-x64
1Newtonsoft.Json.dll
windows11-21h2-x64
1Nucleus.Gaming.dll
windows11-21h2-x64
1Nucleus.Hook32.dll
windows11-21h2-x64
3Nucleus.Hook64.dll
windows11-21h2-x64
1Nucleus.IJx64.exe
windows11-21h2-x64
1Nucleus.IJx86.exe
windows11-21h2-x64
3Nucleus.SHook32.dll
windows11-21h2-x64
3Nucleus.SHook64.dll
windows11-21h2-x64
1NucleusCoop.exe
windows11-21h2-x64
3ProtoInputHooks32.dll
windows11-21h2-x64
3ProtoInputHooks64.dll
windows11-21h2-x64
1ProtoInputHost.exe
windows11-21h2-x64
3ProtoInputIJ32.exe
windows11-21h2-x64
3ProtoInputIJ64.exe
windows11-21h2-x64
1ProtoInputIJP32.dll
windows11-21h2-x64
3ProtoInputIJP64.dll
windows11-21h2-x64
1ProtoInput...32.dll
windows11-21h2-x64
3ProtoInput...64.dll
windows11-21h2-x64
1ProtoInput...32.dll
windows11-21h2-x64
3ProtoInput...64.dll
windows11-21h2-x64
1SharpDX.Di...ut.dll
windows11-21h2-x64
1SharpDX.XInput.dll
windows11-21h2-x64
1utils/x360..._3.dll
windows11-21h2-x64
3Resubmissions
09-08-2024 06:22
240809-g5c3zs1ejc 10Analysis
-
max time kernel
1469s -
max time network
1478s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-08-2024 06:22
Behavioral task
behavioral1
Sample
EasyHook.dll
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
EasyHook32.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
EasyHook32Svc.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
EasyHook64.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
EasyHook64Svc.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
EasyHookSvc.exe
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Ionic.Zip.Reduced.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
Jint.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
NAudio.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
Newtonsoft.Json.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
Nucleus.Gaming.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
Nucleus.Hook32.dll
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
Nucleus.Hook64.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
Nucleus.IJx64.exe
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
Nucleus.IJx86.exe
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
Nucleus.SHook32.dll
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
Nucleus.SHook64.dll
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
NucleusCoop.exe
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
ProtoInputHooks32.dll
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
ProtoInputHooks64.dll
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
ProtoInputHost.exe
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
ProtoInputIJ32.exe
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
ProtoInputIJ64.exe
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
ProtoInputIJP32.dll
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
ProtoInputIJP64.dll
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
ProtoInputLoader32.dll
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
ProtoInputLoader64.dll
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
ProtoInputUtilDynamic32.dll
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
ProtoInputUtilDynamic64.dll
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
SharpDX.DirectInput.dll
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
SharpDX.XInput.dll
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
utils/x360ce/xinput1_3.dll
Resource
win11-20240802-en
General
-
Target
Nucleus.Hook32.dll
-
Size
204KB
-
MD5
60cf4a67d7b291f96deb0c25abc45136
-
SHA1
a7cd4d1bc767dcc365e311d9a0b2012ba40f83df
-
SHA256
4b8fc9cd0679a3a61bd8adca793e23d2caa60fa0663091afd9846f32f247e622
-
SHA512
b87742ae95e77ba0fad844f4c868e3031d834ccad00e9e555103c71bf0a4de707d0a121958aa088ae547020adef9f1b99dfd4dedabf43c07d5ab6f16f4dfbf86
-
SSDEEP
3072:U/2dVVPsB3Q9/xokMRuCfn94nPFYRiXGJmZB5tBnnqOqrkZAg0Fuj0JYBK4:UubV1FxoL1nGPFY4XiE5tBHAO7K4
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 5056 1572 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid Process 1572 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 4700 wrote to memory of 1572 4700 rundll32.exe 81 PID 4700 wrote to memory of 1572 4700 rundll32.exe 81 PID 4700 wrote to memory of 1572 4700 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Nucleus.Hook32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Nucleus.Hook32.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 5483⤵
- Program crash
PID:5056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1572 -ip 15721⤵PID:4724