Overview
overview
9Static
static
9momicAlar_...��.cmd
windows7-x64
1momicAlar_...��.cmd
windows10-2004-x64
7momicAlar_...��.cmd
windows7-x64
1momicAlar_...��.cmd
windows10-2004-x64
7momicAlar_...��.url
windows7-x64
1momicAlar_...��.url
windows10-2004-x64
1momicAlar_...er.dll
windows7-x64
1momicAlar_...er.dll
windows10-2004-x64
1momicAlar_...ta.dll
windows7-x64
8momicAlar_...ta.dll
windows10-2004-x64
8momicAlar_...��.exe
windows7-x64
8momicAlar_...��.exe
windows10-2004-x64
8momicAlar_...��.exe
windows7-x64
9momicAlar_...��.exe
windows10-2004-x64
9momicAlar_...��.url
windows7-x64
1momicAlar_...��.url
windows10-2004-x64
1momicAlar_...��.url
windows7-x64
1momicAlar_...��.url
windows10-2004-x64
1Analysis
-
max time kernel
58s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 22:03
Behavioral task
behavioral1
Sample
momicAlar_gpxz/!)支持我们的网站.cmd
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
momicAlar_gpxz/!)支持我们的网站.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
momicAlar_gpxz/@使用帮助.cmd
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
momicAlar_gpxz/@使用帮助.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/BaiDu_谷普下载.url
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/BaiDu_谷普下载.url
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/ConfigCenter.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/ConfigCenter.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/jedata.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/jedata.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/米乐营销 - 旺旺状态检测 测试版.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/米乐营销 - 旺旺状态检测 测试版.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/补丁.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/补丁.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
momicAlar_gpxz/哥乖.url
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
momicAlar_gpxz/哥乖.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
momicAlar_gpxz/在线游戏.url
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
momicAlar_gpxz/在线游戏.url
Resource
win10v2004-20220812-en
General
-
Target
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/jedata.dll
-
Size
86KB
-
MD5
114054313070472cd1a6d7d28f7c5002
-
SHA1
9a044986e6101df1a126035da7326a50c3fe9a23
-
SHA256
e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1
-
SHA512
a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522
-
SSDEEP
1536:0OYdF5pkapU0uz96DjsVgsIm65HPdOMpFQEMqUktZcNqLODRv7zFpl91nouy8jg:0HDp7pRuKjsir5HZFQGrsUwF7hplPouG
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral9/memory/1960-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1960-58-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 876 1960 WerFault.exe rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 1960 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 868 wrote to memory of 1960 868 rundll32.exe rundll32.exe PID 868 wrote to memory of 1960 868 rundll32.exe rundll32.exe PID 868 wrote to memory of 1960 868 rundll32.exe rundll32.exe PID 868 wrote to memory of 1960 868 rundll32.exe rundll32.exe PID 868 wrote to memory of 1960 868 rundll32.exe rundll32.exe PID 868 wrote to memory of 1960 868 rundll32.exe rundll32.exe PID 868 wrote to memory of 1960 868 rundll32.exe rundll32.exe PID 1960 wrote to memory of 876 1960 rundll32.exe WerFault.exe PID 1960 wrote to memory of 876 1960 rundll32.exe WerFault.exe PID 1960 wrote to memory of 876 1960 rundll32.exe WerFault.exe PID 1960 wrote to memory of 876 1960 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\momicAlar_gpxz\momicAlar_gpxz\momicAlar\momicAlar\jedata.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\momicAlar_gpxz\momicAlar_gpxz\momicAlar\momicAlar\jedata.dll,#12⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 2523⤵
- Program crash
PID:876
-
-