Overview
overview
3Static
static
3hydra-5.4-....8.dll
windows7-x64
3hydra-5.4-....8.dll
windows10-2004-x64
3hydra-5.4-....8.dll
windows7-x64
3hydra-5.4-....8.dll
windows10-2004-x64
3hydra-5.4-...n1.dll
windows7-x64
3hydra-5.4-...n1.dll
windows10-2004-x64
3hydra-5.4-...ra.exe
windows7-x64
1hydra-5.4-...ra.exe
windows10-2004-x64
3hydra-5.4-...or.exe
windows7-x64
1hydra-5.4-...or.exe
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 03:24
Static task
static1
Behavioral task
behavioral1
Sample
hydra-5.4-win/cygcrypto-0.9.8.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
hydra-5.4-win/cygcrypto-0.9.8.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
hydra-5.4-win/cygssl-0.9.8.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
hydra-5.4-win/cygssl-0.9.8.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
hydra-5.4-win/cygwin1.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
hydra-5.4-win/cygwin1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
hydra-5.4-win/hydra.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
hydra-5.4-win/hydra.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
hydra-5.4-win/pw-inspector.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
hydra-5.4-win/pw-inspector.exe
Resource
win10v2004-20240802-en
General
-
Target
hydra-5.4-win/cygssl-0.9.8.dll
-
Size
214KB
-
MD5
2714cce8b8a660118144f110b3686a3d
-
SHA1
4606236784c4a4d91fe30f1e4776aa325bb0d87d
-
SHA256
b7bcb26c8f2ad4ecc9b87be507389c4518956d7a3334b2e42e7f19f68d3a929f
-
SHA512
c9da0077382e4e0d364bc1aa06b4175c02204a39abc3a3f8a8e3740bbd75a52c9f1842be544765199c68af20c3e1608ca4850148c5e3c017b890a629c02d2b80
-
SSDEEP
3072:bXCAr65CA5UBet1LL0iw9SaQJRxWgSQmxXRjIqAopXcVB78tQQDccyd8kHMvqNUR:btW5YGL0ZsJigSlxMzbddHe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Cygnus Solutions\Cygwin rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Cygnus Solutions\Cygwin\mounts v2 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Cygnus Solutions rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4984 wrote to memory of 2668 4984 rundll32.exe 84 PID 4984 wrote to memory of 2668 4984 rundll32.exe 84 PID 4984 wrote to memory of 2668 4984 rundll32.exe 84 PID 2668 wrote to memory of 3920 2668 rundll32.exe 85 PID 2668 wrote to memory of 3920 2668 rundll32.exe 85 PID 2668 wrote to memory of 3920 2668 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\hydra-5.4-win\cygssl-0.9.8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\hydra-5.4-win\cygssl-0.9.8.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\hydra-5.4-win\cygssl-0.9.8.dll,#13⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3920
-
-