Overview
overview
10Static
static
10EasyHook.dll
windows11-21h2-x64
1EasyHook32.dll
windows11-21h2-x64
3EasyHook32Svc.exe
windows11-21h2-x64
3EasyHook64.dll
windows11-21h2-x64
1EasyHook64Svc.exe
windows11-21h2-x64
1EasyHookSvc.exe
windows11-21h2-x64
3Ionic.Zip.Reduced.dll
windows11-21h2-x64
1Jint.dll
windows11-21h2-x64
1NAudio.dll
windows11-21h2-x64
1Newtonsoft.Json.dll
windows11-21h2-x64
1Nucleus.Gaming.dll
windows11-21h2-x64
1Nucleus.Hook32.dll
windows11-21h2-x64
3Nucleus.Hook64.dll
windows11-21h2-x64
1Nucleus.IJx64.exe
windows11-21h2-x64
1Nucleus.IJx86.exe
windows11-21h2-x64
3Nucleus.SHook32.dll
windows11-21h2-x64
3Nucleus.SHook64.dll
windows11-21h2-x64
1NucleusCoop.exe
windows11-21h2-x64
3ProtoInputHooks32.dll
windows11-21h2-x64
3ProtoInputHooks64.dll
windows11-21h2-x64
1ProtoInputHost.exe
windows11-21h2-x64
3ProtoInputIJ32.exe
windows11-21h2-x64
3ProtoInputIJ64.exe
windows11-21h2-x64
1ProtoInputIJP32.dll
windows11-21h2-x64
3ProtoInputIJP64.dll
windows11-21h2-x64
1ProtoInput...32.dll
windows11-21h2-x64
3ProtoInput...64.dll
windows11-21h2-x64
1ProtoInput...32.dll
windows11-21h2-x64
3ProtoInput...64.dll
windows11-21h2-x64
1SharpDX.Di...ut.dll
windows11-21h2-x64
1SharpDX.XInput.dll
windows11-21h2-x64
1utils/x360..._3.dll
windows11-21h2-x64
3Resubmissions
09-08-2024 06:22
240809-g5c3zs1ejc 10Analysis
-
max time kernel
1367s -
max time network
1164s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-08-2024 06:22
Behavioral task
behavioral1
Sample
EasyHook.dll
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
EasyHook32.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
EasyHook32Svc.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
EasyHook64.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
EasyHook64Svc.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
EasyHookSvc.exe
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Ionic.Zip.Reduced.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
Jint.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
NAudio.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
Newtonsoft.Json.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
Nucleus.Gaming.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
Nucleus.Hook32.dll
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
Nucleus.Hook64.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
Nucleus.IJx64.exe
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
Nucleus.IJx86.exe
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
Nucleus.SHook32.dll
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
Nucleus.SHook64.dll
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
NucleusCoop.exe
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
ProtoInputHooks32.dll
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
ProtoInputHooks64.dll
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
ProtoInputHost.exe
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
ProtoInputIJ32.exe
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
ProtoInputIJ64.exe
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
ProtoInputIJP32.dll
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
ProtoInputIJP64.dll
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
ProtoInputLoader32.dll
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
ProtoInputLoader64.dll
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
ProtoInputUtilDynamic32.dll
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
ProtoInputUtilDynamic64.dll
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
SharpDX.DirectInput.dll
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
SharpDX.XInput.dll
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
utils/x360ce/xinput1_3.dll
Resource
win11-20240802-en
General
-
Target
ProtoInputHooks32.dll
-
Size
1.1MB
-
MD5
2afe7a51d0a8031b3a2b9953a70bc14d
-
SHA1
f77a63e675c420bf941c2f2922dd6370d063a9ee
-
SHA256
2938114ffa2cac3312c9f6a5c45772575edbdca9daad25aff3b457712566f987
-
SHA512
9e7e408e7480a3e5e4e81ab6efedf2586c459350e4df5e787abe8cb337ff4ec0eedfc7c570809be1db8d017c0970f3cdf243aa2e65b0cdc4153ae93c5d5bf1e6
-
SSDEEP
24576:5im+MezkNgHjNEI79SgqyfzVMjcEuAnb53H6t:UMeoNo79SgXfBEb53H6t
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4364 4060 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid Process 4060 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 3276 wrote to memory of 4060 3276 rundll32.exe 82 PID 3276 wrote to memory of 4060 3276 rundll32.exe 82 PID 3276 wrote to memory of 4060 3276 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ProtoInputHooks32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ProtoInputHooks32.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 6603⤵
- Program crash
PID:4364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4060 -ip 40601⤵PID:3904