Overview
overview
7Static
static
7v/9PbHH.dll
windows7-x64
7v/9PbHH.dll
windows10-2004-x64
7v/Skin.dll
windows7-x64
5v/Skin.dll
windows10-2004-x64
5v/VEzOD.dll
windows7-x64
7v/VEzOD.dll
windows10-2004-x64
7v/War3Shout.exe
windows7-x64
5v/War3Shout.exe
windows10-2004-x64
5v/pe.dll
windows7-x64
5v/pe.dll
windows10-2004-x64
5v/v.exe
windows7-x64
7v/v.exe
windows10-2004-x64
3启动VK.exe
windows7-x64
7启动VK.exe
windows10-2004-x64
7Analysis
-
max time kernel
11s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 09:33
Behavioral task
behavioral1
Sample
v/9PbHH.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
v/9PbHH.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
v/Skin.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
v/Skin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
v/VEzOD.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
v/VEzOD.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
v/War3Shout.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
v/War3Shout.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
v/pe.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
v/pe.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
v/v.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
v/v.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
启动VK.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
启动VK.exe
Resource
win10v2004-20241007-en
General
-
Target
v/9PbHH.dll
-
Size
2.2MB
-
MD5
137a8d46464c7b6647f72c5eb45419fa
-
SHA1
14f7f6ec079b54a227d68917b5de07996358a41b
-
SHA256
7ccb8b5d3941127c59395e1cba959f9c063d5fd61b75b4e2e7fd293627b196e7
-
SHA512
aac6f38ce21989c4fdad0a29b4669d442ae6856f36bc045efa9dc82e9054bfa562cc71ab4bf3854dccd3655c67fc0f50ed72f6bc6306fe3f96c0da6e1eaac095
-
SSDEEP
49152:F6QzGPQauBHygDa3/B3MXfN8Z3liQFuD8gD9zVpU0JUVY6m4em3AC:UIGIacuB8XF8B49zwsUVhm4e
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2124-1-0x0000000010000000-0x0000000010462000-memory.dmp vmprotect behavioral1/memory/2124-2-0x0000000010000000-0x0000000010462000-memory.dmp vmprotect behavioral1/memory/2124-3-0x0000000010000000-0x0000000010462000-memory.dmp vmprotect behavioral1/memory/2124-4-0x0000000010000000-0x0000000010462000-memory.dmp vmprotect -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xilogha.txt rundll32.exe File opened for modification C:\Windows\SysWOW64\vv1234.txt rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2124 2792 rundll32.exe 29 PID 2792 wrote to memory of 2124 2792 rundll32.exe 29 PID 2792 wrote to memory of 2124 2792 rundll32.exe 29 PID 2792 wrote to memory of 2124 2792 rundll32.exe 29 PID 2792 wrote to memory of 2124 2792 rundll32.exe 29 PID 2792 wrote to memory of 2124 2792 rundll32.exe 29 PID 2792 wrote to memory of 2124 2792 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\v\9PbHH.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\v\9PbHH.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2124
-