Overview
overview
10Static
static
3Adobe Prem...uK.exe
windows7-x64
10Adobe Prem...uK.exe
windows10-2004-x64
10dllhelper.dll
windows7-x64
3dllhelper.dll
windows10-2004-x64
3dllhelper64.dll
windows7-x64
1dllhelper64.dll
windows10-2004-x64
1AdobeIPCBroker.exe
windows7-x64
3AdobeIPCBroker.exe
windows10-2004-x64
3customhook...ok.exe
windows7-x64
3customhook...ok.exe
windows10-2004-x64
3AdobePIM.dll
windows7-x64
4AdobePIM.dll
windows10-2004-x64
4Core.dll
windows7-x64
3Core.dll
windows10-2004-x64
3resources/...IM.dll
windows7-x64
4resources/...IM.dll
windows10-2004-x64
4Analysis
-
max time kernel
92s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 18:59
Static task
static1
Behavioral task
behavioral1
Sample
Adobe Premiere Pro 2022 22.0.0.169 RePack by KpoJIuK.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Adobe Premiere Pro 2022 22.0.0.169 RePack by KpoJIuK.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
dllhelper.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
dllhelper.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
dllhelper64.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
dllhelper64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
AdobeIPCBroker.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
AdobeIPCBroker.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
customhook/AdobeIPCBrokerCustomHook.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
customhook/AdobeIPCBrokerCustomHook.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
AdobePIM.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
AdobePIM.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
resources/AdobePIM.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
resources/AdobePIM.dll
Resource
win10v2004-20241007-en
General
-
Target
dllhelper.dll
-
Size
153KB
-
MD5
1b13ac6572d32448c0e15bf00a04fb98
-
SHA1
b145d3e5b2649af1e6c680e8a7f0d5b6f7c962e4
-
SHA256
9eb3aabe31f6e0254ecbbb7fffa6f11428e8f85f785739c62fde88be09c81a78
-
SHA512
b754b8607d04fbd6165023b5ef1bf01f2af60ce9595ea3a2f7cf03b28355a92310f6d5cbb27247d9270debe62d9eb688778a065cb75ff0d4411d97db283c173b
-
SSDEEP
1536:B2ozr2yXFR9TEJYSCUWB1VBbM4mndJsBjUO6sZ9ynxj/6gfyU78uXBaiurkjPZjb:0ozrhjDSCJmuliYuRVokjBjEw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2624 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3932 wrote to memory of 2624 3932 rundll32.exe 83 PID 3932 wrote to memory of 2624 3932 rundll32.exe 83 PID 3932 wrote to memory of 2624 3932 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dllhelper.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dllhelper.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2624
-