Overview
overview
9Static
static
8三国魂�...00.exe
windows7-x64
1三国魂�...00.exe
windows10-2004-x64
三国魂�...ar.dll
windows7-x64
3三国魂�...ar.dll
windows10-2004-x64
3三国魂�...te.exe
windows7-x64
8三国魂�...te.exe
windows10-2004-x64
8三国魂�....3.exe
windows7-x64
6三国魂�....3.exe
windows10-2004-x64
三国魂�...��.exe
windows7-x64
8三国魂�...��.exe
windows10-2004-x64
9三国魂�...ml.url
windows7-x64
1三国魂�...ml.url
windows10-2004-x64
1Analysis
-
max time kernel
160s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 06:05
Behavioral task
behavioral1
Sample
三国魂战魂/basedb/查ID所在的文件000.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
三国魂战魂/basedb/查ID所在的文件000.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
三国魂战魂/unrar.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
三国魂战魂/unrar.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
三国魂战魂/update.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
三国魂战魂/update.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
三国魂战魂/三国魂_战魂_V 1.7.3.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
三国魂战魂/三国魂_战魂_V 1.7.3.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
三国魂战魂/主控台.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
三国魂战魂/主控台.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
三国魂战魂/会员卡密购买.html.url
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
三国魂战魂/会员卡密购买.html.url
Resource
win10v2004-20220812-en
General
-
Target
三国魂战魂/主控台.exe
-
Size
2.7MB
-
MD5
bbaa354b0de6d6168e09a8a49b25bbf5
-
SHA1
b44422d49a992b8caff25dddfd0d8fdad56fc596
-
SHA256
e61a5b44008c8f4fd0d02b7ac6e8bcd055f0144fa8d253b20b602a89960a5557
-
SHA512
3dc4640c7da488996c64c426eeb8e9364404e3c78d31d445c8fddaa899394cb8a88ed74e1a9b1426f35defa2b58b729a56749e866d55acc64b08fa1a4445a7d7
-
SSDEEP
49152:LDGb1EspZ38TVtrLuNMQJ38YUtUwgwvP+3kX/KXpMZMP6Rja9hTFrgfE4kTsJNL6:CCZFjEofoIfN/dBAKaZ/pJrP
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Windows\jedata.dll acprotect -
Processes:
resource yara_rule C:\Windows\jedata.dll upx behavioral10/memory/4936-136-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral10/memory/4936-138-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
主控台.exepid process 4936 主控台.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
主控台.exepid process 4936 主控台.exe 4936 主控台.exe 4936 主控台.exe -
Drops file in Windows directory 2 IoCs
Processes:
主控台.exedescription ioc process File created C:\Windows\jedata.dll 主控台.exe File created C:\Windows\win8.she 主控台.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
主控台.exepid process 4936 主控台.exe 4936 主控台.exe 4936 主控台.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\三国魂战魂\主控台.exe"C:\Users\Admin\AppData\Local\Temp\三国魂战魂\主控台.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4936 -ip 49361⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\jedata.dllFilesize
86KB
MD5114054313070472cd1a6d7d28f7c5002
SHA19a044986e6101df1a126035da7326a50c3fe9a23
SHA256e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1
SHA512a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522
-
memory/4936-132-0x0000000000400000-0x0000000000808000-memory.dmpFilesize
4.0MB
-
memory/4936-133-0x0000000000400000-0x0000000000808000-memory.dmpFilesize
4.0MB
-
memory/4936-134-0x0000000002550000-0x0000000002558000-memory.dmpFilesize
32KB
-
memory/4936-136-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/4936-137-0x0000000000400000-0x0000000000808000-memory.dmpFilesize
4.0MB
-
memory/4936-138-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB