Overview
overview
10Static
static
10搞机工�...pi.dll
windows7-x64
3搞机工�...pi.dll
windows10-2004-x64
3搞机工�...pi.dll
windows7-x64
3搞机工�...pi.dll
windows10-2004-x64
3搞机工�...in.dll
windows7-x64
1搞机工�...in.dll
windows10-2004-x64
1搞机工�...st.bat
windows7-x64
1搞机工�...st.bat
windows10-2004-x64
1搞机工�...db.exe
windows7-x64
3搞机工�...db.exe
windows10-2004-x64
3搞机工�...ot.exe
windows7-x64
3搞机工�...ot.exe
windows10-2004-x64
3搞机工�...01.exe
windows7-x64
3搞机工�...01.exe
windows10-2004-x64
Analysis
-
max time kernel
94s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 17:20
Behavioral task
behavioral1
Sample
搞机工具箱V9.01/AdbWinApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
搞机工具箱V9.01/AdbWinApi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
搞机工具箱V9.01/AdbWinUsbApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
搞机工具箱V9.01/AdbWinUsbApi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
搞机工具箱V9.01/MaterialSkin.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
搞机工具箱V9.01/MaterialSkin.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
搞机工具箱V9.01/Script/test.bat
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
搞机工具箱V9.01/Script/test.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
搞机工具箱V9.01/adb.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
搞机工具箱V9.01/adb.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
搞机工具箱V9.01/fastboot.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
搞机工具箱V9.01/fastboot.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
搞机工具箱V9.01/搞机工具箱v9.01.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
搞机工具箱V9.01/搞机工具箱v9.01.exe
Resource
win10v2004-20240802-en
General
-
Target
搞机工具箱V9.01/AdbWinApi.dll
-
Size
95KB
-
MD5
ed5a809dc0024d83cbab4fb9933d598d
-
SHA1
0bc5a82327f8641d9287101e4cc7041af20bad57
-
SHA256
d60103a5e99bc9888f786ee916f5d6e45493c3247972cb053833803de7e95cf9
-
SHA512
1fdb74ee5912fbdd2c0cba501e998349fecfbef5f4f743c7978c38996aa7e1f38e8ac750f2dc8f84b8094de3dd6fa3f983a29f290b3fa2cdbdaed691748baf17
-
SSDEEP
1536:Jwqdq+3pvspmLh8SCykrpTG7kfGHuNezq02XJqo+iFi1yCP:JwqD3L8Tezq0et+ui1y
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2892 1488 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1488 1812 rundll32.exe 82 PID 1812 wrote to memory of 1488 1812 rundll32.exe 82 PID 1812 wrote to memory of 1488 1812 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\搞机工具箱V9.01\AdbWinApi.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\搞机工具箱V9.01\AdbWinApi.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 6163⤵
- Program crash
PID:2892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1488 -ip 14881⤵PID:3612