Overview
overview
8Static
static
81433_hack4...st.exe
windows7-x64
81433_hack4...st.exe
windows10-2004-x64
11433_hack4...��.exe
windows7-x64
81433_hack4...��.exe
windows10-2004-x64
81433_hack4...er.exe
windows7-x64
1433_hack4...er.exe
windows10-2004-x64
1433_hack4...me.swf
windows7-x64
31433_hack4...me.swf
windows10-2004-x64
31433_hack4...in.url
windows7-x64
61433_hack4...in.url
windows10-2004-x64
1433_hack4...��.url
windows7-x64
11433_hack4...��.url
windows10-2004-x64
11433_hack4...��.url
windows7-x64
11433_hack4...��.url
windows10-2004-x64
11433_hack4...13.exe
windows7-x64
11433_hack4...13.exe
windows10-2004-x64
11433_hack4...14.exe
windows7-x64
11433_hack4...14.exe
windows10-2004-x64
11433_hack4...��.exe
windows7-x64
81433_hack4...��.exe
windows10-2004-x64
81433_hack4....5.exe
windows7-x64
81433_hack4....5.exe
windows10-2004-x64
81433_hack4...nH.dll
windows7-x64
81433_hack4...nH.dll
windows10-2004-x64
1433_hack4...��.exe
windows7-x64
11433_hack4...��.exe
windows10-2004-x64
11433_hack4...fs.exe
windows7-x64
61433_hack4...fs.exe
windows10-2004-x64
1433_hack4...ex.hta
windows7-x64
11433_hack4...ex.hta
windows10-2004-x64
11433_hack4...SD.exe
windows7-x64
31433_hack4...SD.exe
windows10-2004-x64
3Analysis
-
max time kernel
130s -
max time network
248s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 18:02
Behavioral task
behavioral1
Sample
1433_hack44.cn/12-18/Gh0st.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1433_hack44.cn/12-18/Gh0st.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
1433_hack44.cn/12-18/MD5修改器.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
1433_hack44.cn/12-18/MD5修改器.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
1433_hack44.cn/12-18/update/Server.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
1433_hack44.cn/12-18/update/Server.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
1433_hack44.cn/12-18/update/look me.swf
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
1433_hack44.cn/12-18/update/look me.swf
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
1433_hack44.cn/12-18/update/skin.url
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
1433_hack44.cn/12-18/update/skin.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
1433_hack44.cn/12-18/update/使用方法.url
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
1433_hack44.cn/12-18/update/使用方法.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
1433_hack44.cn/12-18/update/华中帝国收集整理.url
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
1433_hack44.cn/12-18/update/华中帝国收集整理.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
1433_hack44.cn/FTP2013.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
1433_hack44.cn/FTP2013.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
1433_hack44.cn/NB12-18/2014.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
1433_hack44.cn/NB12-18/2014.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
1433_hack44.cn/NB12-18/MD5修改器.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
1433_hack44.cn/NB12-18/MD5修改器.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
1433_hack44.cn/NB12-18/NetBot5.5.exe
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
1433_hack44.cn/NB12-18/NetBot5.5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
1433_hack44.cn/NB12-18/SkinH.dll
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
1433_hack44.cn/NB12-18/SkinH.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
1433_hack44.cn/NB12-18/免杀审核.exe
Resource
win7-20221111-en
Behavioral task
behavioral26
Sample
1433_hack44.cn/NB12-18/免杀审核.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
1433_hack44.cn/hfs2_3b285/hfs.exe
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
1433_hack44.cn/hfs2_3b285/hfs.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/Hex.hta
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/Hex.hta
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/KSD.exe
Resource
win7-20220901-en
Behavioral task
behavioral32
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/KSD.exe
Resource
win10v2004-20220812-en
General
-
Target
1433_hack44.cn/NB12-18/NetBot5.5.exe
-
Size
544KB
-
MD5
6379c36c3bb6e0c758a73251ab663810
-
SHA1
8bf4731742a1f74914b06706f851d4854172fc92
-
SHA256
4ba463bf00edf0327909d1b5e9f7e6b193f907716dff57fc3f7330249dcc116d
-
SHA512
379a5c7b563105fdcd71761ba61093fb788b961a1e3d9d6956f35c199dc11bf9d6fe42a3cfde65552f5eab8f884af797611d081f475eccb8f7b95b3299aaca17
-
SSDEEP
12288:N+ZF8GCbzHgpjzbgepgC5O6hxZo57oDPzVy3vJaZV:YyfgRjp35O2xqC83vcL
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral22/memory/4908-138-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-140-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-141-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-142-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-143-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-145-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-147-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-149-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-151-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-153-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-155-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-157-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-159-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-161-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-163-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-166-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-168-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-170-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-172-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-174-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-176-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-178-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-180-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-182-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-184-0x0000000002450000-0x000000000248D000-memory.dmp upx behavioral22/memory/4908-187-0x0000000002450000-0x000000000248D000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
NetBot5.5.exepid process 4908 NetBot5.5.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 228 4908 WerFault.exe NetBot5.5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
NetBot5.5.exepid process 4908 NetBot5.5.exe 4908 NetBot5.5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1433_hack44.cn\NB12-18\NetBot5.5.exe"C:\Users\Admin\AppData\Local\Temp\1433_hack44.cn\NB12-18\NetBot5.5.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 6562⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4908 -ip 49081⤵PID:2124