Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
零度万能搜索神器 v5.0/plug/万能网盘解析V2.3.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
零度万能搜索神器 v5.0/plug/万能网盘解析V2.3.dll
Resource
win10v2004-20240802-en
General
-
Target
零度万能搜索神器 v5.0/plug/万能网盘解析V2.3.dll
-
Size
836KB
-
MD5
af212d13ebf6374d46c7c134c745eb57
-
SHA1
0df6e6ac156d0969c87786357ef537f69331a211
-
SHA256
d2b3832d6e70de5bde1d90d9ff6bd9b6ccf900db1fab2c9f590f95bdcd4afa98
-
SHA512
224ba9b05d912e08295d3edc6cb9af7a77e7d2854848bb16e6e88dd1410276b589b4be86ea3751703b59f08ad15d91731f63abc6bd2644d5fad0d271ab8c47e9
-
SSDEEP
12288:LAQ2Zl+iMwSb8oL9lEiz+X753tW2bsE4KmVq:LAtZMixSQoHEC+XBPgRVq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1800 rundll32.exe 1800 rundll32.exe 1800 rundll32.exe 1800 rundll32.exe 1800 rundll32.exe 1800 rundll32.exe 1800 rundll32.exe 1800 rundll32.exe 1800 rundll32.exe 1800 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1800 1192 rundll32.exe 30 PID 1192 wrote to memory of 1800 1192 rundll32.exe 30 PID 1192 wrote to memory of 1800 1192 rundll32.exe 30 PID 1192 wrote to memory of 1800 1192 rundll32.exe 30 PID 1192 wrote to memory of 1800 1192 rundll32.exe 30 PID 1192 wrote to memory of 1800 1192 rundll32.exe 30 PID 1192 wrote to memory of 1800 1192 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\零度万能搜索神器 v5.0\plug\万能网盘解析V2.3.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\零度万能搜索神器 v5.0\plug\万能网盘解析V2.3.dll",#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1800
-