Analysis

  • max time kernel
    147s
  • max time network
    203s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 07:08

General

  • Target

    大飞破解版/一键启动.exe

  • Size

    3.9MB

  • MD5

    6f5d22c868cb66606b78926f3d0969b1

  • SHA1

    1457dea770fa3038f76a8d161582f0ff29c7be0e

  • SHA256

    67a8097b6b2754334e667d69e381e79f4cab5a25cd708679c58bcd50754f8de2

  • SHA512

    6c4aad38b3cdc3741fd8e18828b90156ee1f65e9fa59d679bc84d84020d0bcf0001bc6daf413dff65272f5ca3372b024bb5945a6c2f8929a9c98f9fcba04ab29

  • SSDEEP

    98304:NBVZB/g2p6FYskEhipqdwkLQHHhsSYt8d7+94qoa+N/:336+skCfsKSOo+93G

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\大飞破解版\一键启动.exe
    "C:\Users\Admin\AppData\Local\Temp\大飞破解版\一键启动.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe "http://bbs.yxlm.la/forum.php"
      2⤵
        PID:1308
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:872
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://bbs.yxlm.la/forum.php
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:580
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:580 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1552

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\06FSG51N.txt

      Filesize

      608B

      MD5

      220561dc45eb5f09ce504d0b56085b6d

      SHA1

      c6f303a46cb6ee947d85507e0b91edc5673d481c

      SHA256

      32e5dd9a20205eb32ba8ace37686270948af6d4eeebe7e2c363c1058733bc35d

      SHA512

      0008b8c29ffc54ece42d2caae673e79800229e026c7669ea854c53f8572554336660f24ce660c9a8e83debeec0432f79654971225312dc4f69540b6ff96ca890

    • memory/848-54-0x00000000766F1000-0x00000000766F3000-memory.dmp

      Filesize

      8KB

    • memory/872-58-0x000007FEFC4E1000-0x000007FEFC4E3000-memory.dmp

      Filesize

      8KB

    • memory/1308-55-0x0000000000000000-mapping.dmp

    • memory/1308-57-0x00000000740E1000-0x00000000740E3000-memory.dmp

      Filesize

      8KB