Overview
overview
8Static
static
3CrackCaptchaAPI.dll
windows7-x64
3CrackCaptchaAPI.dll
windows10-2004-x64
3CrackCaptc...nt.dll
windows7-x64
6CrackCaptc...nt.dll
windows10-2004-x64
6FastVerCode.dll
windows7-x64
8FastVerCode.dll
windows10-2004-x64
3UUWisehelper.dll
windows7-x64
3UUWisehelper.dll
windows10-2004-x64
3dc.dll
windows7-x64
8dc.dll
windows10-2004-x64
8haoapi.dll
windows7-x64
3haoapi.dll
windows10-2004-x64
3windows200...��.bat
windows7-x64
1windows200...��.bat
windows10-2004-x64
1注册答�...��.bat
windows7-x64
1注册答�...��.bat
windows10-2004-x64
1腾讯QQ�...��.exe
windows7-x64
5腾讯QQ�...��.exe
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31/10/2024, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
CrackCaptchaAPI.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CrackCaptchaAPI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
CrackCaptchaClient.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
CrackCaptchaClient.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
FastVerCode.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
FastVerCode.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
UUWisehelper.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
UUWisehelper.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
dc.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
dc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
haoapi.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
haoapi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
windows2008 补丁.bat
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
windows2008 补丁.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
注册答题系统.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
注册答题系统.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
腾讯QQ资料查询管理.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
腾讯QQ资料查询管理.exe
Resource
win10v2004-20241007-en
General
-
Target
CrackCaptchaClient.dll
-
Size
280KB
-
MD5
10c6b2a888dae933f188f686d76ce5c2
-
SHA1
383a2b6097696305b000001cbded794187b7b916
-
SHA256
37180a512b8c2765437d720b0860f87029a68832dc85d7da5d620f1287024604
-
SHA512
f30d23ee8cdd646ba0cd6f18e54489df724bde1be59865166559c2590c520f6c4f9bc0e2cb1d15632b086bdc4948d349ac79e891f18391be7106fb87a5fb3d93
-
SSDEEP
3072:FqEKLbEzobFXPq7n1PE9tJjn9M3qL8oAyhYzLOs8ZljeLa0DDMsK3wglv6n8lEi:ghszwA8ju3p/yhYQRenDMTH6c9
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2204 2196 rundll32.exe 31 PID 2196 wrote to memory of 2204 2196 rundll32.exe 31 PID 2196 wrote to memory of 2204 2196 rundll32.exe 31 PID 2196 wrote to memory of 2204 2196 rundll32.exe 31 PID 2196 wrote to memory of 2204 2196 rundll32.exe 31 PID 2196 wrote to memory of 2204 2196 rundll32.exe 31 PID 2196 wrote to memory of 2204 2196 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\CrackCaptchaClient.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\CrackCaptchaClient.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2204
-