Analysis
-
max time kernel
73s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 03:47
Behavioral task
behavioral1
Sample
镇魂勇士的信仰辅助二代V1 0/镇魂勇士的信仰辅助V1.6版本最新版.exe
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
General
-
Target
镇魂勇士的信仰辅助二代V1 0/镇魂勇士的信仰辅助V1.6版本最新版.exe
-
Size
4.3MB
-
MD5
d7e71e867ec10ae2e7c6998ab59dc2f6
-
SHA1
53ed40bb480eff2f003ec01b4852cb8beb70b569
-
SHA256
1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06
-
SHA512
47ff798782e758bad126aa1c757e31e8706d9adfe756bb261addb0dad1e828a17db319aaf11e619659802a6ac0ea6e914a7eb4032480f666af69b3cd0be980fb
-
SSDEEP
98304:1XPTAMPmUq0V0Rv5sq+AoWxHnjYL0OjyhZLIvRuvRiy:1fD+/w0Rhs4zYQOuzIvRuvRf
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1372-60-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-61-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-62-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-64-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-66-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-68-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-70-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-72-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-74-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-76-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-78-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-80-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-82-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-84-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-86-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-88-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-90-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-92-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-96-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-100-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-98-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-94-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-102-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1372-103-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/1372-55-0x0000000000400000-0x0000000000E57000-memory.dmp vmprotect behavioral1/memory/1372-59-0x0000000000400000-0x0000000000E57000-memory.dmp vmprotect behavioral1/memory/1372-104-0x0000000000400000-0x0000000000E57000-memory.dmp vmprotect -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
Processes:
镇魂勇士的信仰辅助V1.6版本最新版.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "www.2345.com/?k1902203" 镇魂勇士的信仰辅助V1.6版本最新版.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?k1835228435" 镇魂勇士的信仰辅助V1.6版本最新版.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
镇魂勇士的信仰辅助V1.6版本最新版.exepid process 1372 镇魂勇士的信仰辅助V1.6版本最新版.exe 1372 镇魂勇士的信仰辅助V1.6版本最新版.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
镇魂勇士的信仰辅助V1.6版本最新版.exepid process 1372 镇魂勇士的信仰辅助V1.6版本最新版.exe 1372 镇魂勇士的信仰辅助V1.6版本最新版.exe 1372 镇魂勇士的信仰辅助V1.6版本最新版.exe 1372 镇魂勇士的信仰辅助V1.6版本最新版.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1372-54-0x0000000075921000-0x0000000075923000-memory.dmpFilesize
8KB
-
memory/1372-55-0x0000000000400000-0x0000000000E57000-memory.dmpFilesize
10.3MB
-
memory/1372-57-0x00000000010AD000-0x00000000010B1000-memory.dmpFilesize
16KB
-
memory/1372-59-0x0000000000400000-0x0000000000E57000-memory.dmpFilesize
10.3MB
-
memory/1372-60-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-61-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-62-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-64-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-66-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-68-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-70-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-72-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-74-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-76-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-78-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-80-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-82-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-84-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-86-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-88-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-90-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-92-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-96-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-100-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-98-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-94-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-102-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-103-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/1372-104-0x0000000000400000-0x0000000000E57000-memory.dmpFilesize
10.3MB
-
memory/1372-114-0x00000000031FC000-0x0000000003202000-memory.dmpFilesize
24KB
-
memory/1372-115-0x00000000031FC000-0x0000000003202000-memory.dmpFilesize
24KB