Overview
overview
8Static
static
8EThread.dll
windows7-x64
1EThread.dll
windows10-2004-x64
1HtmlView.dll
windows7-x64
1HtmlView.dll
windows10-2004-x64
1dp1.dll
windows7-x64
1dp1.dll
windows10-2004-x64
3eAPI.dll
windows7-x64
1eAPI.dll
windows10-2004-x64
1iext.dll
windows7-x64
1iext.dll
windows10-2004-x64
1internet.dll
windows7-x64
1internet.dll
windows10-2004-x64
1krnln.dll
windows7-x64
1krnln.dll
windows10-2004-x64
1shellEx.dll
windows7-x64
1shellEx.dll
windows10-2004-x64
1sock.dll
windows7-x64
1sock.dll
windows10-2004-x64
1spec.dll
windows7-x64
1spec.dll
windows10-2004-x64
1下载王�...om.url
windows7-x64
1下载王�...om.url
windows10-2004-x64
1酷奇自�...��.exe
windows7-x64
8酷奇自�...��.exe
windows10-2004-x64
8Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 04:44
Behavioral task
behavioral1
Sample
EThread.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
EThread.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
HtmlView.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
HtmlView.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
dp1.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
dp1.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
eAPI.dll
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
eAPI.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
iext.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
iext.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
internet.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
internet.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
krnln.dll
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
krnln.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
shellEx.dll
Resource
win7-20220901-en
Behavioral task
behavioral16
Sample
shellEx.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
sock.dll
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
sock.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
spec.dll
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
spec.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
下载王绿色软件站- xzking.com.url
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
下载王绿色软件站- xzking.com.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
酷奇自动qq消息软件V1.2破解版.exe
Resource
win7-20221111-en
General
-
Target
酷奇自动qq消息软件V1.2破解版.exe
-
Size
1.4MB
-
MD5
deff14023eb246e1cb0ca4c49e7925e2
-
SHA1
fdfc8aa85224fa5f35ce12a473a319ee05ef8056
-
SHA256
ddc2bdeba010849db93a76d042db74d311c2863e3887b0522c31af5246f01826
-
SHA512
2f65fd79491a209d5ee8bca91460913b165d71ecd38934aa309310366d4c067e2afe69c2e3de7273fcd0291ed4cd115a762ff9f09c4e792931ee537502419c02
-
SSDEEP
24576:oUjatLwHgHmB2dDsh0PNLgesaMDzSlKYdxDNXGR/IZcKk7X7Or8jQaH:oGbIdDtNLgesr3mKCxxXQIZkZ
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral23/memory/956-60-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-65-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-64-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-66-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-67-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-69-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-71-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-73-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-75-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-77-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-79-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-81-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-83-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-85-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-87-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-89-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-91-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-93-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-95-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-97-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-99-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-101-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-103-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-105-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx behavioral23/memory/956-107-0x0000000003FA0000-0x0000000003FE0000-memory.dmp upx -
Processes:
resource yara_rule behavioral23/memory/956-59-0x0000000000400000-0x00000000006C5000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
酷奇自动qq消息软件V1.2破解版.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 酷奇自动qq消息软件V1.2破解版.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main 酷奇自动qq消息软件V1.2破解版.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 酷奇自动qq消息软件V1.2破解版.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 1696 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1696 AUDIODG.EXE Token: 33 1696 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1696 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
酷奇自动qq消息软件V1.2破解版.exepid process 956 酷奇自动qq消息软件V1.2破解版.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
酷奇自动qq消息软件V1.2破解版.exepid process 956 酷奇自动qq消息软件V1.2破解版.exe -
Suspicious use of SetWindowsHookEx 58 IoCs
Processes:
酷奇自动qq消息软件V1.2破解版.exepid process 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe 956 酷奇自动qq消息软件V1.2破解版.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\酷奇自动qq消息软件V1.2破解版.exe"C:\Users\Admin\AppData\Local\Temp\酷奇自动qq消息软件V1.2破解版.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:956
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1696