Overview
overview
9Static
static
83km2-20120...��.chm
windows7-x64
13km2-20120...��.chm
windows10-2004-x64
13km2-20120...cn.url
windows7-x64
13km2-20120...cn.url
windows10-2004-x64
13km2-20120...er.exe
windows7-x64
13km2-20120...er.exe
windows10-2004-x64
13km2-20120...er.exe
windows7-x64
13km2-20120...er.exe
windows10-2004-x64
13km2-20120...er.exe
windows7-x64
13km2-20120...er.exe
windows10-2004-x64
13km2-20120...te.exe
windows7-x64
13km2-20120...te.exe
windows10-2004-x64
13km2-20120...rv.exe
windows7-x64
83km2-20120...rv.exe
windows10-2004-x64
83km2-20120...al.dll
windows7-x64
13km2-20120...al.dll
windows10-2004-x64
13km2-20120...er.exe
windows7-x64
93km2-20120...er.exe
windows10-2004-x64
93km2-20120...le.dll
windows7-x64
93km2-20120...le.dll
windows10-2004-x64
93km2-20120...te.exe
windows7-x64
13km2-20120...te.exe
windows10-2004-x64
13km2-20120...te.exe
windows7-x64
13km2-20120...te.exe
windows10-2004-x64
13km2-20120...��.exe
windows7-x64
13km2-20120...��.exe
windows10-2004-x64
13km2-20120...ne.exe
windows7-x64
13km2-20120...ne.exe
windows10-2004-x64
13km2-20120...��.bat
windows7-x64
13km2-20120...��.bat
windows10-2004-x64
13km2-20120...��.exe
windows7-x64
13km2-20120...��.exe
windows10-2004-x64
1Analysis
-
max time kernel
275s -
max time network
421s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 14:41
Behavioral task
behavioral1
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/3K引擎M2说明书.chm
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/3K引擎M2说明书.chm
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/3km2.com.cn.url
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/3km2.com.cn.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/DBServer/DBServer.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/DBServer/DBServer.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/GameCenter.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/GameCenter.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/LogServer/LogDataServer.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/LogServer/LogDataServer.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/LoginGate/LoginGate.exe
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/LoginGate/LoginGate.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/LoginSrv/LoginSrv.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/LoginSrv/LoginSrv.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/IPLocal.dll
Resource
win7-20220901-en
Behavioral task
behavioral16
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/IPLocal.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/M2Server.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/M2Server.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/SystemModule.dll
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/SystemModule.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/RunGate/RunGate.exe
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/RunGate/RunGate.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/SelGate/SelGate.exe
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/SelGate/SelGate.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral25
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/副将数据转换.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/副将数据转换.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/合区工具/AllInOne.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/合区工具/AllInOne.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/开始更新程序.bat
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/开始更新程序.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral31
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/数据升级.exe
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/数据升级.exe
Resource
win10v2004-20220812-en
General
-
Target
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/SystemModule.dll
-
Size
1.7MB
-
MD5
6e00bde454e5c87cd6a4c0abdc698c89
-
SHA1
9f9c5d03f1ed8fc40b7f1560fa3db94c0b8a2b28
-
SHA256
b66ff82da730bb8021fd28aa9f7aa7d6c002a9ade9f64e14645a51665723c5e2
-
SHA512
fce79019308bf11449f88d52c746ec4dad624c5f4ec03d8b9a1d4cc95dd1a4997513676160eb03101bb041c30970ba7e93df5dd38d39ceac3b935ae74d0de489
-
SSDEEP
24576:U9kBIWxwSHJvOqByWQH0qYCSIxRJsxLwWfu7bOaSKN/6ZqlRIV+BEl6SujwK:nBINc2qBLlCSQxGuPOyl2V+UL0wK
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Wine rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 1984 shutdown.exe Token: SeRemoteShutdownPrivilege 1984 shutdown.exe Token: 33 1652 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1652 AUDIODG.EXE Token: 33 1652 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1652 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1472 wrote to memory of 1104 1472 rundll32.exe 27 PID 1472 wrote to memory of 1104 1472 rundll32.exe 27 PID 1472 wrote to memory of 1104 1472 rundll32.exe 27 PID 1472 wrote to memory of 1104 1472 rundll32.exe 27 PID 1472 wrote to memory of 1104 1472 rundll32.exe 27 PID 1472 wrote to memory of 1104 1472 rundll32.exe 27 PID 1472 wrote to memory of 1104 1472 rundll32.exe 27 PID 1104 wrote to memory of 1984 1104 rundll32.exe 28 PID 1104 wrote to memory of 1984 1104 rundll32.exe 28 PID 1104 wrote to memory of 1984 1104 rundll32.exe 28 PID 1104 wrote to memory of 1984 1104 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3km2-20120528[1117]\3K20120528(0404)合击引擎\Mir200\SystemModule.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3km2-20120528[1117]\3K20120528(0404)合击引擎\Mir200\SystemModule.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" -s -t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:920
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x55c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1792