Overview
overview
8Static
static
douzhanshe...00.dll
windows7-x64
3douzhanshe...00.dll
windows10-2004-x64
3douzhanshe...00.dll
windows7-x64
3douzhanshe...00.dll
windows10-2004-x64
3douzhanshe...��.exe
windows7-x64
8douzhanshe...��.exe
windows10-2004-x64
8douzhanshe....url
windows7-x64
1douzhanshe....url
windows10-2004-x64
1Analysis
-
max time kernel
152s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
douzhanshenxiaoliang/msvcp100.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
douzhanshenxiaoliang/msvcp100.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
douzhanshenxiaoliang/msvcr100.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
douzhanshenxiaoliang/msvcr100.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
douzhanshenxiaoliang/սС.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
douzhanshenxiaoliang/սС.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
douzhanshenxiaoliang/.url
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
douzhanshenxiaoliang/.url
Resource
win10v2004-20220812-en
General
-
Target
douzhanshenxiaoliang/սС.exe
-
Size
852KB
-
MD5
f1ee198197adbf6fddbe29f522f58c8c
-
SHA1
4bec5815b55690a5c69f5af5894566c36cfed581
-
SHA256
03bf584dca3d676a2044a3f7062e2a69b6233c2368ac8de7c806c7d70d6e5876
-
SHA512
2a0a19efedc9186c2be1932889622871d3f218e56fcdce3b9252e66941078470337b73e268fcb46a6a6937aa536c1295069f23173fba25695c3050321b9af2b9
-
SSDEEP
12288:3aniS1QChHr051P3Demxv1A8+wizXa/JX20SdfaP5E1/SMZoSrF5KG9i:ZDvxNAJwizX1dfamQM/T4
Malware Config
Signatures
-
resource yara_rule behavioral6/memory/4676-132-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-133-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-134-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-136-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-138-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-140-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-142-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-144-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-146-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-148-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-150-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-152-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-154-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-156-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-158-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-160-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-162-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-164-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-166-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-168-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-170-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-172-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-174-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral6/memory/4676-175-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4676 սС.exe 4676 սС.exe 4676 սС.exe 4676 սС.exe 4676 սС.exe