Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 07:43
Behavioral task
behavioral1
Sample
CF_sqrjyjhql_jb51/2013年最新CF刷枪软件.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
CF_sqrjyjhql_jb51/2013年最新CF刷枪软件.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
CF_sqrjyjhql_jb51/SkinH_EL.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
CF_sqrjyjhql_jb51/SkinH_EL.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
CF_sqrjyjhql_jb51/去脚本之家看看.url
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
CF_sqrjyjhql_jb51/去脚本之家看看.url
Resource
win10v2004-20220812-en
General
-
Target
CF_sqrjyjhql_jb51/2013年最新CF刷枪软件.exe
-
Size
1.6MB
-
MD5
390f7b3a71a35a5a8c1dcb07917e8a2d
-
SHA1
d5c3e3375a12f125f389dddae9e88783f1e22edd
-
SHA256
b4995a42f913c93412364b5413084964f4791b11a853e260e594f8678e8f145c
-
SHA512
b0f131ac5f8b22149c967a199c7d3748b2bf4887d886504547d451d51e2d778fd3d6b1018d5382e61b5fd771594242a9a0a163fac4556992f0e5899a3c1dd71c
-
SSDEEP
49152:PuypTq5TkaTZaqdwk0c05HGigchXiB9dH:GgTqZkaYqdwkLcHHU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1512-55-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
2013年最新CF刷枪软件.exepid process 1512 2013年最新CF刷枪软件.exe 1512 2013年最新CF刷枪软件.exe 1512 2013年最新CF刷枪软件.exe