Analysis
-
max time kernel
158s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 22:09
Static task
static1
Behavioral task
behavioral1
Sample
造梦西游3死神辅助 1 1绿色版/更多软件下载.url
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
造梦西游3死神辅助 1 1绿色版/更多软件下载.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
造梦西游3死神辅助 1 1绿色版/造梦西游3死神辅助1.1.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
造梦西游3死神辅助 1 1绿色版/造梦西游3死神辅助1.1.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
造梦西游3死神辅助 1 1绿色版/飘荡软件.url
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
造梦西游3死神辅助 1 1绿色版/飘荡软件.url
Resource
win10v2004-20220812-en
General
-
Target
造梦西游3死神辅助 1 1绿色版/造梦西游3死神辅助1.1.exe
-
Size
2.7MB
-
MD5
5d1bd24c0db63dcfb5e3c3e883e43a7c
-
SHA1
1b15c35a884603ad6ec27bcba3f40a63964b5c75
-
SHA256
9cb805b6b3ac0831a36f89a745d1215a8e29c5113daaf5213ab9d1733d8278c2
-
SHA512
fec59f8703399fde2a57b3b955f36ab98383a856280f229cd058fa8d4b7bb20df8cd4a85fdfa7502a27a0d7b83a203e4e2335fab0f8c23dcf08547ef5a5f6c44
-
SSDEEP
49152:Cfleq3epnQU8HBTrRD+s8KuqGaX0ToIBAUZLYI:y0ppQUayJBAUZLP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
services_c_3003.exepid process 4368 services_c_3003.exe -
Processes:
resource yara_rule behavioral4/memory/4108-132-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-133-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-136-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-138-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-140-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-142-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-144-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-146-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-148-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-150-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-152-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-154-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-156-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-158-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-162-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-164-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-160-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-166-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-168-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-170-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-172-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-174-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral4/memory/4108-175-0x0000000002530000-0x000000000256E000-memory.dmp upx behavioral4/memory/4108-176-0x0000000002530000-0x000000000256E000-memory.dmp upx behavioral4/memory/4108-177-0x0000000002530000-0x000000000256E000-memory.dmp upx behavioral4/memory/4108-179-0x0000000002530000-0x000000000256E000-memory.dmp upx behavioral4/memory/4108-181-0x0000000002530000-0x000000000256E000-memory.dmp upx behavioral4/memory/4108-183-0x0000000002530000-0x000000000256E000-memory.dmp upx behavioral4/memory/4108-185-0x0000000002530000-0x000000000256E000-memory.dmp upx behavioral4/memory/4108-187-0x0000000002530000-0x000000000256E000-memory.dmp upx behavioral4/memory/4108-189-0x0000000002530000-0x000000000256E000-memory.dmp upx behavioral4/memory/4108-191-0x0000000002530000-0x000000000256E000-memory.dmp upx behavioral4/memory/4108-193-0x0000000002530000-0x000000000256E000-memory.dmp upx behavioral4/memory/4108-195-0x0000000002530000-0x000000000256E000-memory.dmp upx behavioral4/memory/4108-218-0x0000000002530000-0x000000000256E000-memory.dmp upx behavioral4/memory/4108-219-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
services_c_3003.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation services_c_3003.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
services_c_3003.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SQ Platform = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services_c_3003.exe ?(?3?)? ?,??????" services_c_3003.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
services_c_3003.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ services_c_3003.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
services_c_3003.exepid process 4368 services_c_3003.exe 4368 services_c_3003.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
造梦西游3死神辅助1.1.exeservices_c_3003.exepid process 4108 造梦西游3死神辅助1.1.exe 4368 services_c_3003.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
造梦西游3死神辅助1.1.exeservices_c_3003.exepid process 4108 造梦西游3死神辅助1.1.exe 4368 services_c_3003.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
造梦西游3死神辅助1.1.exepid process 4108 造梦西游3死神辅助1.1.exe 4108 造梦西游3死神辅助1.1.exe 4108 造梦西游3死神辅助1.1.exe 4108 造梦西游3死神辅助1.1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
造梦西游3死神辅助1.1.exedescription pid process target process PID 4108 wrote to memory of 4368 4108 造梦西游3死神辅助1.1.exe services_c_3003.exe PID 4108 wrote to memory of 4368 4108 造梦西游3死神辅助1.1.exe services_c_3003.exe PID 4108 wrote to memory of 4368 4108 造梦西游3死神辅助1.1.exe services_c_3003.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\造梦西游3死神辅助 1 1绿色版\造梦西游3死神辅助1.1.exe"C:\Users\Admin\AppData\Local\Temp\造梦西游3死神辅助 1 1绿色版\造梦西游3死神辅助1.1.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\services_c_3003.exeC:\Users\Admin\AppData\Local\Temp\services_c_3003.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4368
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5a53ab32dc79d4cf6ee4392e8687d0029
SHA1a80da7b53d1e29cb3f4005cd72699e23bebdf4ae
SHA256355f405f84858049601a2245ced390405773240d70ec7216573b24c122a1850d
SHA5120bd8d95992b0a3100400c0d7af75729c4ed8b823cc4fc7d2f83736a34f47c898b230ed66531e2cd4825d11f332e677281d077e2bb75d0c0cdf663d358a626244
-
Filesize
248KB
MD5a53ab32dc79d4cf6ee4392e8687d0029
SHA1a80da7b53d1e29cb3f4005cd72699e23bebdf4ae
SHA256355f405f84858049601a2245ced390405773240d70ec7216573b24c122a1850d
SHA5120bd8d95992b0a3100400c0d7af75729c4ed8b823cc4fc7d2f83736a34f47c898b230ed66531e2cd4825d11f332e677281d077e2bb75d0c0cdf663d358a626244