Overview
overview
10Static
static
10搞机工�...pi.dll
windows7-x64
3搞机工�...pi.dll
windows10-2004-x64
3搞机工�...pi.dll
windows7-x64
3搞机工�...pi.dll
windows10-2004-x64
3搞机工�...in.dll
windows7-x64
1搞机工�...in.dll
windows10-2004-x64
1搞机工�...st.bat
windows7-x64
1搞机工�...st.bat
windows10-2004-x64
1搞机工�...db.exe
windows7-x64
3搞机工�...db.exe
windows10-2004-x64
3搞机工�...ot.exe
windows7-x64
3搞机工�...ot.exe
windows10-2004-x64
3搞机工�...01.exe
windows7-x64
3搞机工�...01.exe
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 13:37
Behavioral task
behavioral1
Sample
搞机工具箱V9.01/AdbWinApi.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
搞机工具箱V9.01/AdbWinApi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
搞机工具箱V9.01/AdbWinUsbApi.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
搞机工具箱V9.01/AdbWinUsbApi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
搞机工具箱V9.01/MaterialSkin.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
搞机工具箱V9.01/MaterialSkin.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
搞机工具箱V9.01/Script/test.bat
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
搞机工具箱V9.01/Script/test.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
搞机工具箱V9.01/adb.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
搞机工具箱V9.01/adb.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
搞机工具箱V9.01/fastboot.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
搞机工具箱V9.01/fastboot.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
搞机工具箱V9.01/搞机工具箱v9.01.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
搞机工具箱V9.01/搞机工具箱v9.01.exe
Resource
win10v2004-20240802-en
General
-
Target
搞机工具箱V9.01/AdbWinUsbApi.dll
-
Size
61KB
-
MD5
0e24119daf1909e398fa1850b6112077
-
SHA1
293eedadb3172e756a421790d551e407457e0a8c
-
SHA256
25207c506d29c4e8dceb61b4bd50e8669ba26012988a43fbf26a890b1e60fc97
-
SHA512
9cbb26e555ab40b019a446337db58770b9a0c9c08316ff1e1909c4b6d99c00bd33522d05890870a91b4b581e20c7dce87488ab0d22fc3c4bbdd7e9b38f164b43
-
SSDEEP
1536:l72doFmOiHizFbPlspcsbj5ZsP+YeTs1p:lSSfN9+YeTs1p
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2780 2736 rundll32.exe 30 PID 2736 wrote to memory of 2780 2736 rundll32.exe 30 PID 2736 wrote to memory of 2780 2736 rundll32.exe 30 PID 2736 wrote to memory of 2780 2736 rundll32.exe 30 PID 2736 wrote to memory of 2780 2736 rundll32.exe 30 PID 2736 wrote to memory of 2780 2736 rundll32.exe 30 PID 2736 wrote to memory of 2780 2736 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\搞机工具箱V9.01\AdbWinUsbApi.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\搞机工具箱V9.01\AdbWinUsbApi.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2780
-