Overview
overview
10Static
static
10133Devbloc...31.exe
windows7-x64
10133Devbloc...31.exe
windows10-2004-x64
10133Devbloc...ME.dll
windows7-x64
1133Devbloc...ME.dll
windows10-2004-x64
1133Devbloc...v2.dll
windows7-x64
1133Devbloc...v2.dll
windows10-2004-x64
1133Devbloc...3s.dll
windows7-x64
3133Devbloc...3s.dll
windows10-2004-x64
3Analysis
-
max time kernel
91s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 16:17
Behavioral task
behavioral1
Sample
133Devblock cheat/Extreme Injector v2 by master131.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
133Devblock cheat/Extreme Injector v2 by master131.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
133Devblock cheat/UInjectIME.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
133Devblock cheat/UInjectIME.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
133Devblock cheat/UnityLoaderv2.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
133Devblock cheat/UnityLoaderv2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
133Devblock cheat/hax3s.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
133Devblock cheat/hax3s.dll
Resource
win10v2004-20241007-en
General
-
Target
133Devblock cheat/hax3s.dll
-
Size
21KB
-
MD5
46b133e356e74a9d447f49f2b63f4877
-
SHA1
e2fdae3d3d271b80dc83546b64c25912da62fe1f
-
SHA256
caeba4c26e102a3603525119875ee22d864b6089f5b6435d3d37faaf0876763a
-
SHA512
5c5669f703e1be37858c01f759631ffd0e9f1aad8bbf59461504927c3dcf0acb31b52b39a0d470058d2b721cf4add3ad4a3e2ddf25b89ad3054e2cc6cc0d041c
-
SSDEEP
384:Vhw0IFa1zu+zOkcf09ksd9i4+GOh0EiUNNlVGejhiG93dBxCBuH:VhwJY1zuuc1sd9D+/piWNR3oQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 2304 wrote to memory of 3424 2304 rundll32.exe 85 PID 2304 wrote to memory of 3424 2304 rundll32.exe 85 PID 2304 wrote to memory of 3424 2304 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\133Devblock cheat\hax3s.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\133Devblock cheat\hax3s.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:3424
-