Analysis

  • max time kernel
    153s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 22:05

General

  • Target

    4399洛克王国东哥辅助v6.3/洛克王国.exe

  • Size

    2.1MB

  • MD5

    8ab0b7e54c5aa0674a18f16888a306c1

  • SHA1

    5115484309463172d7dec935b5837b8c21f8d10f

  • SHA256

    2681f978a4f13d6b1f008a884870c3c31273d342dd1fce101a2f6071af30048a

  • SHA512

    3c2963b08d386abaef7877a88b81045dfa1646589293e8096c30094d474dd17b8b6a2acbb0e64f0e3433d131d4b6c99489172e0c781da242d0b39fc329b7bad1

  • SSDEEP

    49152:8huWMIeqinlXyhnqFZKd/vODDDDDDDDDvxr:NVIeLn1yhqzKtODDDDDDDDDvxr

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4399洛克王国东哥辅助v6.3\洛克王国.exe
    "C:\Users\Admin\AppData\Local\Temp\4399洛克王国东哥辅助v6.3\洛克王国.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Users\Admin\AppData\Local\Temp\CFjd.exe
      C:\Users\Admin\AppData\Local\Temp\CFjd.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1300
    • C:\Users\Admin\AppData\Local\Temp\e9zy.exe
      C:\Users\Admin\AppData\Local\Temp\e9zy.exe
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer start page
      • Suspicious use of SetWindowsHookEx
      PID:3560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CFjd.exe
    Filesize

    656KB

    MD5

    f3200ad3974e618a2667b60ea84ce541

    SHA1

    d8358fcd4e3762122e1934e6ec387d017e7abdb3

    SHA256

    24ba6aab4e3342a351a54280261b3d6d80406584c4a22972789fa262a6d71fa8

    SHA512

    a89ff829b378d99c8d7fb3528f63e849d90aa392809db8a121f9496dff846f17f571aedbbb287cd94f271090daa81d000c90ad8d7da0b1c00cabcf5daef63bcf

  • C:\Users\Admin\AppData\Local\Temp\CFjd.exe
    Filesize

    656KB

    MD5

    f3200ad3974e618a2667b60ea84ce541

    SHA1

    d8358fcd4e3762122e1934e6ec387d017e7abdb3

    SHA256

    24ba6aab4e3342a351a54280261b3d6d80406584c4a22972789fa262a6d71fa8

    SHA512

    a89ff829b378d99c8d7fb3528f63e849d90aa392809db8a121f9496dff846f17f571aedbbb287cd94f271090daa81d000c90ad8d7da0b1c00cabcf5daef63bcf

  • C:\Users\Admin\AppData\Local\Temp\e9zy.exe
    Filesize

    564KB

    MD5

    cef8021ac730c92751479a3f4ba0bd88

    SHA1

    25bafa5b4c21352d533b0edf3ea7f0c481813e81

    SHA256

    434810a10b7de06957638238a3c220a6e7f2e040e91eac4577f71ac1122ac539

    SHA512

    4cc779816242615ad05d84cd37d11f5e3f533e439b7c10b7b2c4ee4dc88332cdd988601ca69124d9b3c8440023c190376afbe8b11361521fd276964d28c7aabe

  • C:\Users\Admin\AppData\Local\Temp\e9zy.exe
    Filesize

    564KB

    MD5

    cef8021ac730c92751479a3f4ba0bd88

    SHA1

    25bafa5b4c21352d533b0edf3ea7f0c481813e81

    SHA256

    434810a10b7de06957638238a3c220a6e7f2e040e91eac4577f71ac1122ac539

    SHA512

    4cc779816242615ad05d84cd37d11f5e3f533e439b7c10b7b2c4ee4dc88332cdd988601ca69124d9b3c8440023c190376afbe8b11361521fd276964d28c7aabe

  • memory/1300-132-0x0000000000000000-mapping.dmp
  • memory/3560-135-0x0000000000000000-mapping.dmp