Overview
overview
5Static
static
3webplugin.exe
windows7-x64
4webplugin.exe
windows10-2004-x64
4DHSurveillanceDll.dll
windows7-x64
3DHSurveillanceDll.dll
windows10-2004-x64
3FileOperator.dll
windows7-x64
3FileOperator.dll
windows10-2004-x64
3VideoWindow.dll
windows7-x64
3VideoWindow.dll
windows10-2004-x64
3dhnetsdk.dll
windows7-x64
5dhnetsdk.dll
windows10-2004-x64
5dhplay.dll
windows7-x64
3dhplay.dll
windows10-2004-x64
3h264dec.dll
windows7-x64
3h264dec.dll
windows10-2004-x64
3mjpegdec.dll
windows7-x64
3mjpegdec.dll
windows10-2004-x64
3npPlugin.dll
windows7-x64
3npPlugin.dll
windows10-2004-x64
3postproc.dll
windows7-x64
3postproc.dll
windows10-2004-x64
3timeAxesDll.dll
windows7-x64
3timeAxesDll.dll
windows10-2004-x64
3webActiveX.exe
windows7-x64
3webActiveX.exe
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 12:03
Static task
static1
Behavioral task
behavioral1
Sample
webplugin.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
webplugin.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
DHSurveillanceDll.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
DHSurveillanceDll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
FileOperator.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
FileOperator.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
VideoWindow.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
VideoWindow.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
dhnetsdk.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
dhnetsdk.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
dhplay.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
dhplay.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
h264dec.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
h264dec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
mjpegdec.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
mjpegdec.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral17
Sample
npPlugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
npPlugin.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
postproc.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
postproc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
timeAxesDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
timeAxesDll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
webActiveX.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
webActiveX.exe
Resource
win10v2004-20240802-en
General
-
Target
VideoWindow.dll
-
Size
195KB
-
MD5
8758d56a5b3c4f04dec65c918d3aa2b1
-
SHA1
9c0e3f3faa0700c1232e78867cbebb74eb9ba879
-
SHA256
8732b9ba27a49b88f46f3c21d2ece8eeea68bd9006dc743e4ad57b7761d64a9a
-
SHA512
74f9d3e4c92a0766096c15da8de6d0a64f68ecef5350d7e8377603af896bbdd27a95fb05ae80b8ede803a508e92ea7fbab25e8fbb10c33948fed8e02380539b4
-
SSDEEP
3072:6J/eBe+eZhQaeJRRVdNuOwks/t6BO7VpbnOWL26ju6AdddqZ:UWohgaOBuss/UO7LbOWTKdrS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1048 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1048 2052 rundll32.exe 28 PID 2052 wrote to memory of 1048 2052 rundll32.exe 28 PID 2052 wrote to memory of 1048 2052 rundll32.exe 28 PID 2052 wrote to memory of 1048 2052 rundll32.exe 28 PID 2052 wrote to memory of 1048 2052 rundll32.exe 28 PID 2052 wrote to memory of 1048 2052 rundll32.exe 28 PID 2052 wrote to memory of 1048 2052 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\VideoWindow.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\VideoWindow.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1048
-