Overview
overview
7Static
static
7SMBB4SJBZW...se.dll
windows7-x64
3SMBB4SJBZW...se.dll
windows10-2004-x64
3SMBB4SJBZW...sh.dll
windows7-x64
3SMBB4SJBZW...sh.dll
windows10-2004-x64
3SMBB4SJBZW...me.exe
windows7-x64
7SMBB4SJBZW...me.exe
windows10-2004-x64
7SMBB4SJBZW...ex.exe
windows7-x64
3SMBB4SJBZW...ex.exe
windows10-2004-x64
3SMBB4SJBZW...47.vbs
windows7-x64
1SMBB4SJBZW...47.vbs
windows10-2004-x64
1安装程序.exe
windows7-x64
7安装程序.exe
windows10-2004-x64
7Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 14:31
Behavioral task
behavioral1
Sample
SMBB4SJBZW/Chinese.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SMBB4SJBZW/Chinese.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
SMBB4SJBZW/English.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
SMBB4SJBZW/English.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
SMBB4SJBZW/PlayGame.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
SMBB4SJBZW/PlayGame.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
SMBB4SJBZW/VirtuaNESex.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SMBB4SJBZW/VirtuaNESex.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
SMBB4SJBZW/mapper_src/Mapper047.vbs
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
SMBB4SJBZW/mapper_src/Mapper047.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
安装程序.exe
Resource
win7-20240903-en
General
-
Target
SMBB4SJBZW/Chinese.dll
-
Size
76KB
-
MD5
ad664e75802d8512f8f01cfa796ec078
-
SHA1
29ab673ecb0767b27428673bc69484bcd8bb027d
-
SHA256
b5692681c05c8806befaa5d4f32af35fffdd56c498db47d0923a5cb505bf1669
-
SHA512
7ccbeff5b6e2ccea8391a19867fca93c15572f5d236c578dee4a49cf6c7c42365a6ebb1b4c3ce7dbc1c9fa1c7e0b5b196161720cc882557927f9b2adcde2db73
-
SSDEEP
768:K2T1WUf74R+AlJkdDXiQfzhEWLAvlWdygqvVykUzc1Y88rcqWDSJG:K2T1WUs+DXiwJel4ygqQkUQ2cXSJ
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4672 3104 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4368 wrote to memory of 3104 4368 rundll32.exe 82 PID 4368 wrote to memory of 3104 4368 rundll32.exe 82 PID 4368 wrote to memory of 3104 4368 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SMBB4SJBZW\Chinese.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SMBB4SJBZW\Chinese.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 6003⤵
- Program crash
PID:4672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 3104 -ip 31041⤵PID:4824