Overview
overview
9Static
static
8三国魂�...00.exe
windows7-x64
1三国魂�...00.exe
windows10-2004-x64
1三国魂�...ar.dll
windows7-x64
3三国魂�...ar.dll
windows10-2004-x64
3三国魂�...te.exe
windows7-x64
8三国魂�...te.exe
windows10-2004-x64
8三国魂�....2.exe
windows7-x64
6三国魂�....2.exe
windows10-2004-x64
6三国魂�...��.exe
windows7-x64
8三国魂�...��.exe
windows10-2004-x64
9三国魂�...ml.url
windows7-x64
1三国魂�...ml.url
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 06:12
Behavioral task
behavioral1
Sample
三国魂战魂/basedb/查ID所在的文件000.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
三国魂战魂/basedb/查ID所在的文件000.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
三国魂战魂/unrar.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
三国魂战魂/unrar.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
三国魂战魂/update.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
三国魂战魂/update.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
三国魂战魂/三国魂_战魂_V 1.7.2.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
三国魂战魂/三国魂_战魂_V 1.7.2.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
三国魂战魂/主控台.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
三国魂战魂/主控台.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
三国魂战魂/会员卡密购买.html.url
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
三国魂战魂/会员卡密购买.html.url
Resource
win10v2004-20220901-en
General
-
Target
三国魂战魂/主控台.exe
-
Size
2.7MB
-
MD5
bbaa354b0de6d6168e09a8a49b25bbf5
-
SHA1
b44422d49a992b8caff25dddfd0d8fdad56fc596
-
SHA256
e61a5b44008c8f4fd0d02b7ac6e8bcd055f0144fa8d253b20b602a89960a5557
-
SHA512
3dc4640c7da488996c64c426eeb8e9364404e3c78d31d445c8fddaa899394cb8a88ed74e1a9b1426f35defa2b58b729a56749e866d55acc64b08fa1a4445a7d7
-
SSDEEP
49152:LDGb1EspZ38TVtrLuNMQJ38YUtUwgwvP+3kX/KXpMZMP6Rja9hTFrgfE4kTsJNL6:CCZFjEofoIfN/dBAKaZ/pJrP
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Windows\jedata.dll acprotect -
Processes:
resource yara_rule C:\Windows\jedata.dll upx behavioral10/memory/376-137-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
主控台.exepid process 376 主控台.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
主控台.exepid process 376 主控台.exe 376 主控台.exe 376 主控台.exe -
Drops file in Windows directory 2 IoCs
Processes:
主控台.exedescription ioc process File created C:\Windows\jedata.dll 主控台.exe File created C:\Windows\win8.she 主控台.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4852 376 WerFault.exe 主控台.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
主控台.exepid process 376 主控台.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
主控台.exepid process 376 主控台.exe 376 主控台.exe 376 主控台.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\三国魂战魂\主控台.exe"C:\Users\Admin\AppData\Local\Temp\三国魂战魂\主控台.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 2882⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 376 -ip 3761⤵PID:1304
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5114054313070472cd1a6d7d28f7c5002
SHA19a044986e6101df1a126035da7326a50c3fe9a23
SHA256e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1
SHA512a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522