Overview
overview
8Static
static
8傳奇守�...ss.dll
windows7-x64
3傳奇守�...ss.dll
windows10-2004-x64
3傳奇守�...ly.exe
windows7-x64
1傳奇守�...ly.exe
windows10-2004-x64
1傳奇守�...Ws.dll
windows7-x64
3傳奇守�...Ws.dll
windows10-2004-x64
3傳奇守�...pk.exe
windows7-x64
1傳奇守�...pk.exe
windows10-2004-x64
1傳奇守�...ty.dll
windows7-x64
8傳奇守�...ty.dll
windows10-2004-x64
8傳奇守�...ck.dll
windows7-x64
1傳奇守�...ck.dll
windows10-2004-x64
1傳奇守�...jx.exe
windows7-x64
1傳奇守�...jx.exe
windows10-2004-x64
3傳奇守�...yx.exe
windows7-x64
1傳奇守�...yx.exe
windows10-2004-x64
1傳奇守�...ty.exe
windows7-x64
8傳奇守�...ty.exe
windows10-2004-x64
8傳奇守�...ty.exe
windows7-x64
8傳奇守�...ty.exe
windows10-2004-x64
8傳奇守�...ws.exe
windows7-x64
1傳奇守�...ws.exe
windows10-2004-x64
3傳奇守�...ip.dll
windows7-x64
1傳奇守�...ip.dll
windows10-2004-x64
3傳奇守�...om.url
windows7-x64
1傳奇守�...om.url
windows10-2004-x64
1傳奇守�....0.exe
windows7-x64
8傳奇守�....0.exe
windows10-2004-x64
8傳奇守�...��.exe
windows7-x64
6傳奇守�...��.exe
windows10-2004-x64
6傳奇守�....9.exe
windows7-x64
8傳奇守�....9.exe
windows10-2004-x64
8Analysis
-
max time kernel
386s -
max time network
530s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 21:22
Behavioral task
behavioral1
Sample
傳奇守護者免费版1.8.9/detection/boss.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
傳奇守護者免费版1.8.9/detection/boss.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
傳奇守護者免费版1.8.9/detection/ly.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
傳奇守護者免费版1.8.9/detection/ly.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
傳奇守護者免费版1.8.9/detection/passWs.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
傳奇守護者免费版1.8.9/detection/passWs.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
傳奇守護者免费版1.8.9/detection/passpk.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
傳奇守護者免费版1.8.9/detection/passpk.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
傳奇守護者免费版1.8.9/detection/passty.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
傳奇守護者免费版1.8.9/detection/passty.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
傳奇守護者免费版1.8.9/detection/tempj/InjDuck.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
傳奇守護者免费版1.8.9/detection/tempj/InjDuck.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
傳奇守護者免费版1.8.9/detection/tempj/jx.exe
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
傳奇守護者免费版1.8.9/detection/tempj/jx.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
傳奇守護者免费版1.8.9/detection/tempj/yx.exe
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
傳奇守護者免费版1.8.9/detection/tempj/yx.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
傳奇守護者免费版1.8.9/detection/ty.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
傳奇守護者免费版1.8.9/detection/ty.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
傳奇守護者免费版1.8.9/detection/ty.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
傳奇守護者免费版1.8.9/detection/ty.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
傳奇守護者免费版1.8.9/detection/ws.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
傳奇守護者免费版1.8.9/detection/ws.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral23
Sample
傳奇守護者免费版1.8.9/zip.dll
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
傳奇守護者免费版1.8.9/zip.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
傳奇守護者免费版1.8.9/传奇守护者官网:184pk.com.url
Resource
win7-20221111-en
Behavioral task
behavioral26
Sample
傳奇守護者免费版1.8.9/传奇守护者官网:184pk.com.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
傳奇守護者免费版1.8.9/传奇通用变速器4.0.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
傳奇守護者免费版1.8.9/传奇通用变速器4.0.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral29
Sample
傳奇守護者免费版1.8.9/傲雪残影.exe
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
傳奇守護者免费版1.8.9/傲雪残影.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
傳奇守護者免费版1.8.9/傳奇守護者免费版1.8.9.exe
Resource
win7-20221111-en
Behavioral task
behavioral32
Sample
傳奇守護者免费版1.8.9/傳奇守護者免费版1.8.9.exe
Resource
win10v2004-20220812-en
General
-
Target
傳奇守護者免费版1.8.9/傳奇守護者免费版1.8.9.exe
-
Size
6.7MB
-
MD5
0d073c6b672cf3766da08c87393cacfd
-
SHA1
749c4680d1312f3961e732774a8117f539b6ffb1
-
SHA256
60873b32e91f5934705d3b514ca94a781906f82f460fb3e57db669fe1b1be8b5
-
SHA512
f06d16c0b377a64544dd6c8e32c8330174a3b2aba15736884998e123a2c9086ca3dd4ca22b29bc5e072ffbbcaccf06b81b44d7c38b2db4e87a5c5aa625ab94b7
-
SSDEEP
98304:cqZS0XIHS1YvYSu88ZHACE63R8TORhSr/llZBu44BYNkNHBI94HvXaEay9cAGrE:we95Su8846aIylAxYNH94HvTay9
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral31/memory/584-55-0x0000000000070000-0x0000000000DF4000-memory.dmp vmprotect behavioral31/memory/584-57-0x0000000000070000-0x0000000000DF4000-memory.dmp vmprotect behavioral31/memory/584-58-0x0000000000070000-0x0000000000DF4000-memory.dmp vmprotect -
Drops file in System32 directory 4 IoCs
Processes:
傳奇守護者免费版1.8.9.exedescription ioc process File created C:\Windows\SysWOW64\67385d0WX.sys 傳奇守護者免费版1.8.9.exe File opened for modification C:\Windows\SysWOW64\67385d0WX.sys 傳奇守護者免费版1.8.9.exe File opened for modification C:\Windows\SysWOW64\67385d0WX.systmp 傳奇守護者免费版1.8.9.exe File created C:\Windows\SysWOW64\MakeAttManage.sys 傳奇守護者免费版1.8.9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC98E241-6D62-11ED-A15A-6A950B37D0A0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
傳奇守護者免费版1.8.9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://24cq.458277.com" 傳奇守護者免费版1.8.9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
傳奇守護者免费版1.8.9.exepid process 584 傳奇守護者免费版1.8.9.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 468 468 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1208 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
傳奇守護者免费版1.8.9.exeiexplore.exeIEXPLORE.EXEpid process 584 傳奇守護者免费版1.8.9.exe 584 傳奇守護者免费版1.8.9.exe 584 傳奇守護者免费版1.8.9.exe 584 傳奇守護者免费版1.8.9.exe 584 傳奇守護者免费版1.8.9.exe 584 傳奇守護者免费版1.8.9.exe 1208 iexplore.exe 1208 iexplore.exe 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
傳奇守護者免费版1.8.9.exeiexplore.exedescription pid process target process PID 584 wrote to memory of 1208 584 傳奇守護者免费版1.8.9.exe iexplore.exe PID 584 wrote to memory of 1208 584 傳奇守護者免费版1.8.9.exe iexplore.exe PID 584 wrote to memory of 1208 584 傳奇守護者免费版1.8.9.exe iexplore.exe PID 584 wrote to memory of 1208 584 傳奇守護者免费版1.8.9.exe iexplore.exe PID 1208 wrote to memory of 1764 1208 iexplore.exe IEXPLORE.EXE PID 1208 wrote to memory of 1764 1208 iexplore.exe IEXPLORE.EXE PID 1208 wrote to memory of 1764 1208 iexplore.exe IEXPLORE.EXE PID 1208 wrote to memory of 1764 1208 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\傳奇守護者免费版1.8.9\傳奇守護者免费版1.8.9.exe"C:\Users\Admin\AppData\Local\Temp\傳奇守護者免费版1.8.9\傳奇守護者免费版1.8.9.exe"1⤵
- Drops file in System32 directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.184pk.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1208 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1764