Overview
overview
7Static
static
3GWHookMan.dll
windows7-x64
3GWHookMan.dll
windows10-2004-x64
3Gwh_d3d8.dll
windows7-x64
3Gwh_d3d8.dll
windows10-2004-x64
3Gwh_d3d9.dll
windows7-x64
3Gwh_d3d9.dll
windows10-2004-x64
3douya.exe
windows7-x64
6douya.exe
windows10-2004-x64
6《情義�...��.exe
windows7-x64
3《情義�...��.exe
windows10-2004-x64
7Analysis
-
max time kernel
131s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
GWHookMan.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
GWHookMan.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Gwh_d3d8.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Gwh_d3d8.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Gwh_d3d9.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Gwh_d3d9.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
douya.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
douya.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
《情義巅峰》CF辅助.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
《情義巅峰》CF辅助.exe
Resource
win10v2004-20240802-en
General
-
Target
Gwh_d3d8.dll
-
Size
387KB
-
MD5
3d19dcb78d916dbd255bf82a2b815e46
-
SHA1
74e0334d53065fb358b5836f564d63047f6007c0
-
SHA256
22a19500727dcc82242932eda212732331c9d1d47a5d224fe882664a30d9e982
-
SHA512
9e57758a89c90ba05de2d19cc12de5e4cc8b302413240fe09de42a169aee94c35cb7be0bc956451d6626fc4ed2d528ba820aecc66dc3bfbb7e6b76c8ba045c4e
-
SSDEEP
6144:ZkU7cunMofvbeUGRxxHZU+c2YQeewQeeuQeesQeeNJQeefQeeHMhrnaT2/qAOWL0:ZkUIuMAvMxXU+EhuTX5+
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3352 3040 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1348 wrote to memory of 3040 1348 rundll32.exe 84 PID 1348 wrote to memory of 3040 1348 rundll32.exe 84 PID 1348 wrote to memory of 3040 1348 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Gwh_d3d8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Gwh_d3d8.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 7883⤵
- Program crash
PID:3352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3040 -ip 30401⤵PID:4436