Analysis
-
max time kernel
131s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 22:09
Static task
static1
Behavioral task
behavioral1
Sample
造梦西游3死神辅助 1 1绿色版/更多软件下载.url
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
造梦西游3死神辅助 1 1绿色版/更多软件下载.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
造梦西游3死神辅助 1 1绿色版/造梦西游3死神辅助1.1.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
造梦西游3死神辅助 1 1绿色版/造梦西游3死神辅助1.1.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
造梦西游3死神辅助 1 1绿色版/飘荡软件.url
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
造梦西游3死神辅助 1 1绿色版/飘荡软件.url
Resource
win10v2004-20220812-en
General
-
Target
造梦西游3死神辅助 1 1绿色版/造梦西游3死神辅助1.1.exe
-
Size
2.7MB
-
MD5
5d1bd24c0db63dcfb5e3c3e883e43a7c
-
SHA1
1b15c35a884603ad6ec27bcba3f40a63964b5c75
-
SHA256
9cb805b6b3ac0831a36f89a745d1215a8e29c5113daaf5213ab9d1733d8278c2
-
SHA512
fec59f8703399fde2a57b3b955f36ab98383a856280f229cd058fa8d4b7bb20df8cd4a85fdfa7502a27a0d7b83a203e4e2335fab0f8c23dcf08547ef5a5f6c44
-
SSDEEP
49152:Cfleq3epnQU8HBTrRD+s8KuqGaX0ToIBAUZLYI:y0ppQUayJBAUZLP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
services_c_3003.exepid process 1432 services_c_3003.exe -
Processes:
resource yara_rule behavioral3/memory/1708-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-69-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-71-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-73-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-75-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-77-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-79-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-85-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-83-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-87-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-91-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-93-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-95-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-89-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-81-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1708-98-0x00000000008B0000-0x00000000008EE000-memory.dmp upx behavioral3/memory/1708-100-0x00000000008B0000-0x00000000008EE000-memory.dmp upx behavioral3/memory/1708-99-0x00000000008B0000-0x00000000008EE000-memory.dmp upx behavioral3/memory/1708-102-0x00000000008B0000-0x00000000008EE000-memory.dmp upx behavioral3/memory/1708-106-0x00000000008B0000-0x00000000008EE000-memory.dmp upx behavioral3/memory/1708-108-0x00000000008B0000-0x00000000008EE000-memory.dmp upx behavioral3/memory/1708-110-0x00000000008B0000-0x00000000008EE000-memory.dmp upx behavioral3/memory/1708-112-0x00000000008B0000-0x00000000008EE000-memory.dmp upx behavioral3/memory/1708-116-0x00000000008B0000-0x00000000008EE000-memory.dmp upx behavioral3/memory/1708-114-0x00000000008B0000-0x00000000008EE000-memory.dmp upx behavioral3/memory/1708-104-0x00000000008B0000-0x00000000008EE000-memory.dmp upx behavioral3/memory/1708-141-0x00000000008B0000-0x00000000008EE000-memory.dmp upx behavioral3/memory/1708-142-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Loads dropped DLL 3 IoCs
Processes:
造梦西游3死神辅助1.1.exeservices_c_3003.exepid process 1708 造梦西游3死神辅助1.1.exe 1432 services_c_3003.exe 1432 services_c_3003.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
services_c_3003.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SQ Platform = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services_c_3003.exe ?(?3?)? ?,??????" services_c_3003.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
services_c_3003.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\Local Settings services_c_3003.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache services_c_3003.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
services_c_3003.exepid process 1432 services_c_3003.exe 1432 services_c_3003.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
造梦西游3死神辅助1.1.exeservices_c_3003.exepid process 1708 造梦西游3死神辅助1.1.exe 1432 services_c_3003.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
造梦西游3死神辅助1.1.exeservices_c_3003.exepid process 1708 造梦西游3死神辅助1.1.exe 1432 services_c_3003.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
造梦西游3死神辅助1.1.exepid process 1708 造梦西游3死神辅助1.1.exe 1708 造梦西游3死神辅助1.1.exe 1708 造梦西游3死神辅助1.1.exe 1708 造梦西游3死神辅助1.1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
造梦西游3死神辅助1.1.exedescription pid process target process PID 1708 wrote to memory of 1432 1708 造梦西游3死神辅助1.1.exe services_c_3003.exe PID 1708 wrote to memory of 1432 1708 造梦西游3死神辅助1.1.exe services_c_3003.exe PID 1708 wrote to memory of 1432 1708 造梦西游3死神辅助1.1.exe services_c_3003.exe PID 1708 wrote to memory of 1432 1708 造梦西游3死神辅助1.1.exe services_c_3003.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\造梦西游3死神辅助 1 1绿色版\造梦西游3死神辅助1.1.exe"C:\Users\Admin\AppData\Local\Temp\造梦西游3死神辅助 1 1绿色版\造梦西游3死神辅助1.1.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\services_c_3003.exeC:\Users\Admin\AppData\Local\Temp\services_c_3003.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1432
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5a53ab32dc79d4cf6ee4392e8687d0029
SHA1a80da7b53d1e29cb3f4005cd72699e23bebdf4ae
SHA256355f405f84858049601a2245ced390405773240d70ec7216573b24c122a1850d
SHA5120bd8d95992b0a3100400c0d7af75729c4ed8b823cc4fc7d2f83736a34f47c898b230ed66531e2cd4825d11f332e677281d077e2bb75d0c0cdf663d358a626244
-
Filesize
248KB
MD5a53ab32dc79d4cf6ee4392e8687d0029
SHA1a80da7b53d1e29cb3f4005cd72699e23bebdf4ae
SHA256355f405f84858049601a2245ced390405773240d70ec7216573b24c122a1850d
SHA5120bd8d95992b0a3100400c0d7af75729c4ed8b823cc4fc7d2f83736a34f47c898b230ed66531e2cd4825d11f332e677281d077e2bb75d0c0cdf663d358a626244
-
Filesize
248KB
MD5a53ab32dc79d4cf6ee4392e8687d0029
SHA1a80da7b53d1e29cb3f4005cd72699e23bebdf4ae
SHA256355f405f84858049601a2245ced390405773240d70ec7216573b24c122a1850d
SHA5120bd8d95992b0a3100400c0d7af75729c4ed8b823cc4fc7d2f83736a34f47c898b230ed66531e2cd4825d11f332e677281d077e2bb75d0c0cdf663d358a626244
-
Filesize
248KB
MD5a53ab32dc79d4cf6ee4392e8687d0029
SHA1a80da7b53d1e29cb3f4005cd72699e23bebdf4ae
SHA256355f405f84858049601a2245ced390405773240d70ec7216573b24c122a1850d
SHA5120bd8d95992b0a3100400c0d7af75729c4ed8b823cc4fc7d2f83736a34f47c898b230ed66531e2cd4825d11f332e677281d077e2bb75d0c0cdf663d358a626244
-
Filesize
248KB
MD5a53ab32dc79d4cf6ee4392e8687d0029
SHA1a80da7b53d1e29cb3f4005cd72699e23bebdf4ae
SHA256355f405f84858049601a2245ced390405773240d70ec7216573b24c122a1850d
SHA5120bd8d95992b0a3100400c0d7af75729c4ed8b823cc4fc7d2f83736a34f47c898b230ed66531e2cd4825d11f332e677281d077e2bb75d0c0cdf663d358a626244