Analysis

  • max time kernel
    204s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 23:34

General

  • Target

    鑫财手机协议全能王/91vpn/91vpn.exe

  • Size

    307KB

  • MD5

    22f0d122185b6b0120bcf611e45cd6d8

  • SHA1

    36c94eeebf1e792416cd6fef30115053dfb46d87

  • SHA256

    a74887579686843b0c9cbd41ae6d1b2ad184c7e6a81d4b9efb2f1864c70f2ba1

  • SHA512

    68a6ae62a801f5779431ff275ff5e7e9414875b94f4b9e6aa5937e470a90c4c20a19dba86cb3223326b13aeaf3c685000c43ab53b3d20371e2d5ddce6601935d

  • SSDEEP

    6144:kzmKnGDcrNkB5HG9QYQM87p+CC4azquuq54t5XPgNgQAAitfGFOyCuXwL5ceeLe6:ihnXeLHJYQNi4a2uuq54t5XoNgQAAito

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\鑫财手机协议全能王\91vpn\91vpn.exe
    "C:\Users\Admin\AppData\Local\Temp\鑫财手机协议全能王\91vpn\91vpn.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:5048

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DDBD.tmp

    Filesize

    887KB

    MD5

    e1deb8ac5a39ef8d80950908ac6a3cd7

    SHA1

    9b9a33c590bb280669dd9dc9eb3132a834bf1f3e

    SHA256

    68114dee6a5c4cedac279cebd22271fccd8678f8f01a4d2fa1a6cdfb4bb3f977

    SHA512

    da7e8c90d3b354bf778152fafd64ff3c87f41681eea4816c09ecf25e81ea638469bdbb17a5ce64c7e9d9f20b9cb7c298fe2f8b37ff26e476a1277e576ee10dc3

  • memory/5048-132-0x0000000010000000-0x00000000100BC000-memory.dmp

    Filesize

    752KB

  • memory/5048-134-0x0000000010000000-0x00000000100BC000-memory.dmp

    Filesize

    752KB