Overview
overview
8Static
static
81433_hack4...st.exe
windows7-x64
81433_hack4...st.exe
windows10-2004-x64
11433_hack4...��.exe
windows7-x64
81433_hack4...��.exe
windows10-2004-x64
81433_hack4...er.exe
windows7-x64
1433_hack4...er.exe
windows10-2004-x64
1433_hack4...me.swf
windows7-x64
31433_hack4...me.swf
windows10-2004-x64
31433_hack4...in.url
windows7-x64
61433_hack4...in.url
windows10-2004-x64
1433_hack4...��.url
windows7-x64
11433_hack4...��.url
windows10-2004-x64
11433_hack4...��.url
windows7-x64
11433_hack4...��.url
windows10-2004-x64
11433_hack4...13.exe
windows7-x64
11433_hack4...13.exe
windows10-2004-x64
11433_hack4...14.exe
windows7-x64
11433_hack4...14.exe
windows10-2004-x64
11433_hack4...��.exe
windows7-x64
81433_hack4...��.exe
windows10-2004-x64
81433_hack4....5.exe
windows7-x64
81433_hack4....5.exe
windows10-2004-x64
81433_hack4...nH.dll
windows7-x64
81433_hack4...nH.dll
windows10-2004-x64
1433_hack4...��.exe
windows7-x64
11433_hack4...��.exe
windows10-2004-x64
11433_hack4...fs.exe
windows7-x64
61433_hack4...fs.exe
windows10-2004-x64
1433_hack4...ex.hta
windows7-x64
11433_hack4...ex.hta
windows10-2004-x64
11433_hack4...SD.exe
windows7-x64
31433_hack4...SD.exe
windows10-2004-x64
3Analysis
-
max time kernel
115s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 18:02
Behavioral task
behavioral1
Sample
1433_hack44.cn/12-18/Gh0st.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1433_hack44.cn/12-18/Gh0st.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
1433_hack44.cn/12-18/MD5修改器.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
1433_hack44.cn/12-18/MD5修改器.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
1433_hack44.cn/12-18/update/Server.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
1433_hack44.cn/12-18/update/Server.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
1433_hack44.cn/12-18/update/look me.swf
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
1433_hack44.cn/12-18/update/look me.swf
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
1433_hack44.cn/12-18/update/skin.url
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
1433_hack44.cn/12-18/update/skin.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
1433_hack44.cn/12-18/update/使用方法.url
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
1433_hack44.cn/12-18/update/使用方法.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
1433_hack44.cn/12-18/update/华中帝国收集整理.url
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
1433_hack44.cn/12-18/update/华中帝国收集整理.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
1433_hack44.cn/FTP2013.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
1433_hack44.cn/FTP2013.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
1433_hack44.cn/NB12-18/2014.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
1433_hack44.cn/NB12-18/2014.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
1433_hack44.cn/NB12-18/MD5修改器.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
1433_hack44.cn/NB12-18/MD5修改器.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
1433_hack44.cn/NB12-18/NetBot5.5.exe
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
1433_hack44.cn/NB12-18/NetBot5.5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
1433_hack44.cn/NB12-18/SkinH.dll
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
1433_hack44.cn/NB12-18/SkinH.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
1433_hack44.cn/NB12-18/免杀审核.exe
Resource
win7-20221111-en
Behavioral task
behavioral26
Sample
1433_hack44.cn/NB12-18/免杀审核.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
1433_hack44.cn/hfs2_3b285/hfs.exe
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
1433_hack44.cn/hfs2_3b285/hfs.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/Hex.hta
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/Hex.hta
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/KSD.exe
Resource
win7-20220901-en
Behavioral task
behavioral32
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/KSD.exe
Resource
win10v2004-20220812-en
General
-
Target
1433_hack44.cn/NB12-18/NetBot5.5.exe
-
Size
544KB
-
MD5
6379c36c3bb6e0c758a73251ab663810
-
SHA1
8bf4731742a1f74914b06706f851d4854172fc92
-
SHA256
4ba463bf00edf0327909d1b5e9f7e6b193f907716dff57fc3f7330249dcc116d
-
SHA512
379a5c7b563105fdcd71761ba61093fb788b961a1e3d9d6956f35c199dc11bf9d6fe42a3cfde65552f5eab8f884af797611d081f475eccb8f7b95b3299aaca17
-
SSDEEP
12288:N+ZF8GCbzHgpjzbgepgC5O6hxZo57oDPzVy3vJaZV:YyfgRjp35O2xqC83vcL
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral21/memory/1120-61-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-64-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-63-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-66-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-68-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-65-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-72-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-70-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-74-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-76-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-78-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-80-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-82-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-84-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-88-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-86-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-92-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-94-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-90-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-96-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-100-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-98-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-102-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-106-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-104-0x0000000000510000-0x000000000054D000-memory.dmp upx behavioral21/memory/1120-108-0x0000000000510000-0x000000000054D000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
NetBot5.5.exepid process 1120 NetBot5.5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
NetBot5.5.exepid process 1120 NetBot5.5.exe 1120 NetBot5.5.exe 1120 NetBot5.5.exe 1120 NetBot5.5.exe