Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 22:20
Behavioral task
behavioral1
Sample
WB/libcurl.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WB/libcurl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
WB/茧火虫用户端 V1.0.2.exe
Resource
win7-20240903-en
General
-
Target
WB/libcurl.dll
-
Size
730KB
-
MD5
21c76027249d2797f7c525826443dff9
-
SHA1
dce966f85251255d1ced14641583d14f6c94d889
-
SHA256
b886350941b3d0c5832e6e03b1b88e562f7b27d7a81cf36895387ab319f682e9
-
SHA512
dba30e2c765445f2c7b56f07450b336df3ba696b51b2c3e6be88bb8698bfefb122b13406facb5a677c38b0580a7753dd28cc794f7da6aca850de6adae4d0d625
-
SSDEEP
12288:oeeQvbf7tRlvGt0v1SROTElo+fnpwsN18RHON2l0q8hdJvV66M/wNpkR:o8nPv15GZfqsX0HON2lCL+/INW
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2264-3-0x0000000010000000-0x0000000010212000-memory.dmp vmprotect behavioral1/memory/2264-2-0x0000000010000000-0x0000000010212000-memory.dmp vmprotect behavioral1/memory/2264-1-0x0000000010000000-0x0000000010212000-memory.dmp vmprotect behavioral1/memory/2264-0-0x0000000010000000-0x0000000010212000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2264 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\libcurl.dll rundll32.exe File created C:\Windows\libcurl.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2264 2980 rundll32.exe 30 PID 2980 wrote to memory of 2264 2980 rundll32.exe 30 PID 2980 wrote to memory of 2264 2980 rundll32.exe 30 PID 2980 wrote to memory of 2264 2980 rundll32.exe 30 PID 2980 wrote to memory of 2264 2980 rundll32.exe 30 PID 2980 wrote to memory of 2264 2980 rundll32.exe 30 PID 2980 wrote to memory of 2264 2980 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\WB\libcurl.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\WB\libcurl.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2264
-