Analysis
-
max time kernel
62s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 06:23
Behavioral task
behavioral1
Sample
魔力神器_大家来找茬辅助.exe
Resource
win7-20220812-en
General
-
Target
魔力神器_大家来找茬辅助.exe
-
Size
7.3MB
-
MD5
da4cde808ac871693085975bbcc6e93c
-
SHA1
b5d2425aa42cb3049b114098df02c1c127da91c3
-
SHA256
99e702537ff66615fa465eda520d7f9c7a0124bf41bfe3bfa62d581b7d0507db
-
SHA512
1c810489148aa4fe753c15ba291da1977043e82b1c17acbac63db2be9e38e25f1821112bf7a6121e16192ee03eb72b35cf6d5437df650bc8ed1fc79b9ec69167
-
SSDEEP
98304:ZFFwSxN/XZqzgZpr67nEkIUrX0qOczRHhAYlrgy6gqzJjpN8Nhv+u4NvxIsx:ZvxLqTbEkIW0Zwhn6bdCNhGfJIsx
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1344-59-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-61-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-60-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-63-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-65-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-67-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-69-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-71-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-73-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-75-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-77-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-79-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-81-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-83-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-87-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-85-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-89-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-91-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-93-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-95-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-99-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-97-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-102-0x00000000035B0000-0x00000000035EE000-memory.dmp upx behavioral1/memory/1344-105-0x00000000035B0000-0x00000000035EE000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/1344-54-0x0000000000400000-0x00000000012F2000-memory.dmp vmprotect behavioral1/memory/1344-56-0x0000000000400000-0x00000000012F2000-memory.dmp vmprotect behavioral1/memory/1344-58-0x0000000000400000-0x00000000012F2000-memory.dmp vmprotect behavioral1/memory/1344-103-0x0000000000400000-0x00000000012F2000-memory.dmp vmprotect behavioral1/memory/1344-104-0x0000000000400000-0x00000000012F2000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
魔力神器_大家来找茬辅助.exepid process 1344 魔力神器_大家来找茬辅助.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
魔力神器_大家来找茬辅助.exedescription pid process Token: SeDebugPrivilege 1344 魔力神器_大家来找茬辅助.exe Token: SeDebugPrivilege 1344 魔力神器_大家来找茬辅助.exe Token: 33 1344 魔力神器_大家来找茬辅助.exe Token: SeIncBasePriorityPrivilege 1344 魔力神器_大家来找茬辅助.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
魔力神器_大家来找茬辅助.exepid process 1344 魔力神器_大家来找茬辅助.exe 1344 魔力神器_大家来找茬辅助.exe 1344 魔力神器_大家来找茬辅助.exe 1344 魔力神器_大家来找茬辅助.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1344-54-0x0000000000400000-0x00000000012F2000-memory.dmpFilesize
14.9MB
-
memory/1344-55-0x0000000074F41000-0x0000000074F43000-memory.dmpFilesize
8KB
-
memory/1344-56-0x0000000000400000-0x00000000012F2000-memory.dmpFilesize
14.9MB
-
memory/1344-58-0x0000000000400000-0x00000000012F2000-memory.dmpFilesize
14.9MB
-
memory/1344-59-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-61-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-60-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-63-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-65-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-67-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-69-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-71-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-73-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-75-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-77-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-79-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-81-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-83-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-87-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-85-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-89-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-91-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-93-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-95-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-99-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-97-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-102-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB
-
memory/1344-103-0x0000000000400000-0x00000000012F2000-memory.dmpFilesize
14.9MB
-
memory/1344-104-0x0000000000400000-0x00000000012F2000-memory.dmpFilesize
14.9MB
-
memory/1344-105-0x00000000035B0000-0x00000000035EE000-memory.dmpFilesize
248KB