Analysis

  • max time kernel
    259s
  • max time network
    354s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 22:05

General

  • Target

    4399洛克王国东哥辅助v6.3/洛克王国.exe

  • Size

    2.1MB

  • MD5

    8ab0b7e54c5aa0674a18f16888a306c1

  • SHA1

    5115484309463172d7dec935b5837b8c21f8d10f

  • SHA256

    2681f978a4f13d6b1f008a884870c3c31273d342dd1fce101a2f6071af30048a

  • SHA512

    3c2963b08d386abaef7877a88b81045dfa1646589293e8096c30094d474dd17b8b6a2acbb0e64f0e3433d131d4b6c99489172e0c781da242d0b39fc329b7bad1

  • SSDEEP

    49152:8huWMIeqinlXyhnqFZKd/vODDDDDDDDDvxr:NVIeLn1yhqzKtODDDDDDDDDvxr

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4399洛克王国东哥辅助v6.3\洛克王国.exe
    "C:\Users\Admin\AppData\Local\Temp\4399洛克王国东哥辅助v6.3\洛克王国.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Users\Admin\AppData\Local\Temp\CFjd.exe
      C:\Users\Admin\AppData\Local\Temp\CFjd.exe
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1688
    • C:\Users\Admin\AppData\Local\Temp\e9zy.exe
      C:\Users\Admin\AppData\Local\Temp\e9zy.exe
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer start page
      • Suspicious use of SetWindowsHookEx
      PID:276

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
    Filesize

    1KB

    MD5

    8c2f9c20e46006b10b072708705bcc7d

    SHA1

    6ddcf722b89d55b75388a5cb15a7a68c2822930e

    SHA256

    9eb87ea48ddebebb267e87556a7362210b4656a384f64eaa0238172b6547e190

    SHA512

    97be4d8344148decd44f80206cc1b3c3bd65b848038030fd8c46471da34a09f5492ce18044142a6c9a6d242be36a5e452a447dfba301b797f546f8bfe4f56fc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B
    Filesize

    1KB

    MD5

    52cdaa4a13ac94a38a19bcf350ee1dad

    SHA1

    10fbf12f537257d923e586f6832da46a8d788eb1

    SHA256

    42ff02a94c0ee2bb6b5b3e868458566b988616b9b881a67b472869c3aaeefbb7

    SHA512

    9ab6ec2d308e61b52d8b45671dd93e3df9e5fdcd52673e773fea3179d64b499dd53fba08b075521aa7a6bf7bf6889bf0b63b2e6b17043b06cc1da8ca4c254d75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3
    Filesize

    1KB

    MD5

    59ce1c0c313f55c5d7484c4414f75045

    SHA1

    7df24320c7cbd0f0634b7aa6b84c1dad511e1c31

    SHA256

    399c631a4a8bdb0e680a1bf655764afc5c152e40b73c74afd9449e7d23ae514b

    SHA512

    d982cf336a6ea6c62e85fdf40ad52228b430123454c6c8e572b4f7c85fed461775299faf66fd935eceab61562258a1d525c0d00b65c8e7bd0a9a3472c134b55a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
    Filesize

    508B

    MD5

    03b759d7378e43022f403d162006f6a7

    SHA1

    a5a713af5a4f7cef9f94cb8b4179e4353e187c08

    SHA256

    72553732239ead4ecedaa984cfeadb911817611d222a757a9a3e47ee2ed4ee7d

    SHA512

    b6878b97db8efdb4b2401eb717f28ec7ea469c1a0ca0e15bf1081f919a2526e3c40f96cf71d20f44baa2d392293cb1a56f8dc47777bc61fd6ebd42e541da73f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
    Filesize

    508B

    MD5

    03b759d7378e43022f403d162006f6a7

    SHA1

    a5a713af5a4f7cef9f94cb8b4179e4353e187c08

    SHA256

    72553732239ead4ecedaa984cfeadb911817611d222a757a9a3e47ee2ed4ee7d

    SHA512

    b6878b97db8efdb4b2401eb717f28ec7ea469c1a0ca0e15bf1081f919a2526e3c40f96cf71d20f44baa2d392293cb1a56f8dc47777bc61fd6ebd42e541da73f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B
    Filesize

    532B

    MD5

    efa5af0682896321560d549efae8830c

    SHA1

    e0365ed84f3e8d3e96264e4041a9eabfe94f2241

    SHA256

    ccfed39095d277fe5e23c5e5f6e34a4ae33d9ed634e64b76b6a69ebf1d190d35

    SHA512

    73f62ab37b082a4bae3c6f5b5300bed801962e895b0e90de237a126877cc6746d083244d2926f24ccd4f67c5b1acf1c10ed9f0e8bc2387261d1b79c887d44fda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    8b36e36f9da477339a493b2d5223011f

    SHA1

    f82a7333fbd219a8d1df00946db862995cc50801

    SHA256

    8d31a6a1814b1bfb57afdafe35d835b911f74c8cffb2e98e04c44083626871b5

    SHA512

    b787c2cf12bbc9ad625b07fefe596bcb13675fc24b6951af675fbf4b9d4bee709b88230a8dae1f2320077ad3396c383c8a6f3b0d45abc25667493ed856034d43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3
    Filesize

    506B

    MD5

    430078df0ae2e4fd1726c89d2e9d09fa

    SHA1

    1e2c4e428c4d3dde82cc2a0d3f62acb8ae1f9c89

    SHA256

    de4054d8087d911575a2da83d3227befee0b797f305a84da4fc1ff0651ad84b7

    SHA512

    4c2f69eeabb977f20bc73c51ebab0de28071747ba4873b5bb98eebb74375ca0cab772a05e2b16aec5bc126ff16c0f355a8cd3e41203a2a02a3e388badbbdd103

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\AS1Z6PQ2\www.591314[1].xml
    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PFZC0YBM\scrolltop[1].png
    Filesize

    1KB

    MD5

    e619a381b11184c28e12b6c199d075d7

    SHA1

    934e3ace2c81b51f5c804143c2e1a124a6a9b77d

    SHA256

    c9a11fc108c17c57cc8196558ec7a9eba3833a0a7023717251bf2a0ed25244fb

    SHA512

    b1b40923539109a1281bb562c599dc1857fdd2fa7f56eddb778a88a51cfe438e7898d9d4d4adc8a8f5ce0cccd24a0f5bb78281d57bcca72e9b639639c85054e3

  • C:\Users\Admin\AppData\Local\Temp\CFjd.exe
    Filesize

    656KB

    MD5

    f3200ad3974e618a2667b60ea84ce541

    SHA1

    d8358fcd4e3762122e1934e6ec387d017e7abdb3

    SHA256

    24ba6aab4e3342a351a54280261b3d6d80406584c4a22972789fa262a6d71fa8

    SHA512

    a89ff829b378d99c8d7fb3528f63e849d90aa392809db8a121f9496dff846f17f571aedbbb287cd94f271090daa81d000c90ad8d7da0b1c00cabcf5daef63bcf

  • C:\Users\Admin\AppData\Local\Temp\CFjd.exe
    Filesize

    656KB

    MD5

    f3200ad3974e618a2667b60ea84ce541

    SHA1

    d8358fcd4e3762122e1934e6ec387d017e7abdb3

    SHA256

    24ba6aab4e3342a351a54280261b3d6d80406584c4a22972789fa262a6d71fa8

    SHA512

    a89ff829b378d99c8d7fb3528f63e849d90aa392809db8a121f9496dff846f17f571aedbbb287cd94f271090daa81d000c90ad8d7da0b1c00cabcf5daef63bcf

  • C:\Users\Admin\AppData\Local\Temp\e9zy.exe
    Filesize

    564KB

    MD5

    cef8021ac730c92751479a3f4ba0bd88

    SHA1

    25bafa5b4c21352d533b0edf3ea7f0c481813e81

    SHA256

    434810a10b7de06957638238a3c220a6e7f2e040e91eac4577f71ac1122ac539

    SHA512

    4cc779816242615ad05d84cd37d11f5e3f533e439b7c10b7b2c4ee4dc88332cdd988601ca69124d9b3c8440023c190376afbe8b11361521fd276964d28c7aabe

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\76MCRZZX.txt
    Filesize

    108B

    MD5

    fdb88db54494d3f5d9351bb56cb51806

    SHA1

    64c2f528e7150c39d8bd6becc23232f1f9363279

    SHA256

    898c6a9d6df0ceb63de209492bf9ee0da98bc1498381a46b9808243499eb552e

    SHA512

    22b2741ba75175f5077166a97b486a679add3ccb5c3b92d3e0d281e5783818a84316606d48760cb549b13ebe8c88a271a64805237395e689dffc292b2078e5d8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8Q5EYZ7H.txt
    Filesize

    290B

    MD5

    f455344e0d2ffa432e1370d5092949be

    SHA1

    c4c5235900a9bdb527a33ec3b0433d549be39ab2

    SHA256

    3ed1b7d20f5c99d29ead532291b1cce6f6a8fdfe35b7e8396842301404ec74f2

    SHA512

    b6350f2c3604e050311288b90352133075525352ae259d579ab6a56e2160f0d9dc6460ffa4082b3c5827055fd16234c79e6c8a27e64061017da1fe1f48f98e28

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LK69YHRK.txt
    Filesize

    93B

    MD5

    33900d758d2a031e87312b620b5dc024

    SHA1

    c8f3fa2aa2bb91f8a3131c5d32cdf5c9b0132b42

    SHA256

    3998dfb182e0b21eb2736e56fe4e400edf99601153e9b2f37223a8ac3514047c

    SHA512

    e37b387f204c965f299291bfa68c3a8f3fe6d0134965b639abd05dd43b2cc5e0aa889570f439a998935647e0b1b1860a7ebf99fe2ec927c601522737962f83a5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\O6VVU4LE.txt
    Filesize

    93B

    MD5

    16b8881b07e06b4af3a0fa27acc9368f

    SHA1

    4b3260a4ec840b577a5ad79ed1ddbff7acfa46f3

    SHA256

    31cad7dff9eab2a160f3625a680be184eb461395b5498ff14fdc82c6350c11b9

    SHA512

    712829aa8395ef3af537498ce9a2399443da41fa1564d44a98dcbe363c31787e987371f9285579b6b85490082435dfcc89b89c7cf4c89e85843c97114a1c1840

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OA59G3EO.txt
    Filesize

    109B

    MD5

    8c1de55fd1dd50d64d3d18f0e517ab5c

    SHA1

    51cebe1f24988eab292e64a66a8b0df755ca3051

    SHA256

    fa88753841082ad6b5779eb03b14cae3147979116c07347d6e9cd49609543e2f

    SHA512

    39851014c7ab3103590a13b4ea760d9975de3f477902dd5b55d08daf0a9cd896ce6eed3c28fd691f652824881e9a88053ba9aea3038d1fb80cc9f69c5df932e1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Q5ZTEI22.txt
    Filesize

    285B

    MD5

    dfc08644d9d30d01c1f029bcc2e30a41

    SHA1

    c4dd8e4cbc5def703c5c0ebe343394fd64c3a86e

    SHA256

    f170e513cdb11a2ec81fd088da3c4dcf03fe1d2c98cc0c5aed955d7612049f02

    SHA512

    0ec6c950c73eb0296960de767bdb263a9d221338300e742bc08ece7f796ba55288e321a2d4305181c2148c69fbd82bf34817a59d1e0d0572d62d144b6852a64f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Y2VX8R6G.txt
    Filesize

    291B

    MD5

    af9974be29761ffb77009526dd601031

    SHA1

    84e657ce2ffbe96484e27ba866ce4da3b4433b72

    SHA256

    6c979e170f32aebfba97e7e90444d18aa11e3ed1d090c6dedf354e0bc0125266

    SHA512

    7e15d0cbf4fcc3f230609b8e33fd12b5ff5282d3f3f90d1d953b6267266d7b1b2f14acbd80d0f82dda34d49a1b523668f9f4f40708dc41f9eadeda207e9639d5

  • \Users\Admin\AppData\Local\Temp\CFjd.exe
    Filesize

    656KB

    MD5

    f3200ad3974e618a2667b60ea84ce541

    SHA1

    d8358fcd4e3762122e1934e6ec387d017e7abdb3

    SHA256

    24ba6aab4e3342a351a54280261b3d6d80406584c4a22972789fa262a6d71fa8

    SHA512

    a89ff829b378d99c8d7fb3528f63e849d90aa392809db8a121f9496dff846f17f571aedbbb287cd94f271090daa81d000c90ad8d7da0b1c00cabcf5daef63bcf

  • \Users\Admin\AppData\Local\Temp\CFjd.exe
    Filesize

    656KB

    MD5

    f3200ad3974e618a2667b60ea84ce541

    SHA1

    d8358fcd4e3762122e1934e6ec387d017e7abdb3

    SHA256

    24ba6aab4e3342a351a54280261b3d6d80406584c4a22972789fa262a6d71fa8

    SHA512

    a89ff829b378d99c8d7fb3528f63e849d90aa392809db8a121f9496dff846f17f571aedbbb287cd94f271090daa81d000c90ad8d7da0b1c00cabcf5daef63bcf

  • \Users\Admin\AppData\Local\Temp\e9zy.exe
    Filesize

    564KB

    MD5

    cef8021ac730c92751479a3f4ba0bd88

    SHA1

    25bafa5b4c21352d533b0edf3ea7f0c481813e81

    SHA256

    434810a10b7de06957638238a3c220a6e7f2e040e91eac4577f71ac1122ac539

    SHA512

    4cc779816242615ad05d84cd37d11f5e3f533e439b7c10b7b2c4ee4dc88332cdd988601ca69124d9b3c8440023c190376afbe8b11361521fd276964d28c7aabe

  • \Users\Admin\AppData\Local\Temp\e9zy.exe
    Filesize

    564KB

    MD5

    cef8021ac730c92751479a3f4ba0bd88

    SHA1

    25bafa5b4c21352d533b0edf3ea7f0c481813e81

    SHA256

    434810a10b7de06957638238a3c220a6e7f2e040e91eac4577f71ac1122ac539

    SHA512

    4cc779816242615ad05d84cd37d11f5e3f533e439b7c10b7b2c4ee4dc88332cdd988601ca69124d9b3c8440023c190376afbe8b11361521fd276964d28c7aabe

  • memory/276-82-0x0000000000000000-mapping.dmp
  • memory/1120-54-0x0000000074FA1000-0x0000000074FA3000-memory.dmp
    Filesize

    8KB

  • memory/1688-57-0x0000000000000000-mapping.dmp