Overview
overview
9Static
static
9momicAlar_...��.cmd
windows7-x64
1momicAlar_...��.cmd
windows10-2004-x64
7momicAlar_...��.cmd
windows7-x64
1momicAlar_...��.cmd
windows10-2004-x64
7momicAlar_...��.url
windows7-x64
1momicAlar_...��.url
windows10-2004-x64
1momicAlar_...er.dll
windows7-x64
1momicAlar_...er.dll
windows10-2004-x64
1momicAlar_...ta.dll
windows7-x64
8momicAlar_...ta.dll
windows10-2004-x64
8momicAlar_...��.exe
windows7-x64
8momicAlar_...��.exe
windows10-2004-x64
8momicAlar_...��.exe
windows7-x64
9momicAlar_...��.exe
windows10-2004-x64
9momicAlar_...��.url
windows7-x64
1momicAlar_...��.url
windows10-2004-x64
1momicAlar_...��.url
windows7-x64
1momicAlar_...��.url
windows10-2004-x64
1Analysis
-
max time kernel
82s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 22:03
Behavioral task
behavioral1
Sample
momicAlar_gpxz/!)支持我们的网站.cmd
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
momicAlar_gpxz/!)支持我们的网站.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
momicAlar_gpxz/@使用帮助.cmd
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
momicAlar_gpxz/@使用帮助.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/BaiDu_谷普下载.url
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/BaiDu_谷普下载.url
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/ConfigCenter.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/ConfigCenter.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/jedata.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/jedata.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/米乐营销 - 旺旺状态检测 测试版.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/米乐营销 - 旺旺状态检测 测试版.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/补丁.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/补丁.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
momicAlar_gpxz/哥乖.url
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
momicAlar_gpxz/哥乖.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
momicAlar_gpxz/在线游戏.url
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
momicAlar_gpxz/在线游戏.url
Resource
win10v2004-20220812-en
General
-
Target
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/jedata.dll
-
Size
86KB
-
MD5
114054313070472cd1a6d7d28f7c5002
-
SHA1
9a044986e6101df1a126035da7326a50c3fe9a23
-
SHA256
e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1
-
SHA512
a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522
-
SSDEEP
1536:0OYdF5pkapU0uz96DjsVgsIm65HPdOMpFQEMqUktZcNqLODRv7zFpl91nouy8jg:0HDp7pRuKjsir5HZFQGrsUwF7hplPouG
Malware Config
Signatures
-
resource yara_rule behavioral10/memory/4100-133-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3932 4100 WerFault.exe 79 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4100 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3248 wrote to memory of 4100 3248 rundll32.exe 79 PID 3248 wrote to memory of 4100 3248 rundll32.exe 79 PID 3248 wrote to memory of 4100 3248 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\momicAlar_gpxz\momicAlar_gpxz\momicAlar\momicAlar\jedata.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\momicAlar_gpxz\momicAlar_gpxz\momicAlar\momicAlar\jedata.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 6523⤵
- Program crash
PID:3932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4100 -ip 41001⤵PID:3680