Overview
overview
8Static
static
0909iocp�...ar.bat
windows7-x64
10909iocp�...ar.bat
windows10-2004-x64
10909iocp�...dow.js
windows7-x64
10909iocp�...dow.js
windows10-2004-x64
10909iocp�...dow.js
windows7-x64
10909iocp�...dow.js
windows10-2004-x64
1minilzo-2.02.vbs
windows7-x64
1minilzo-2.02.vbs
windows10-2004-x64
10909iocp�...Lib.js
windows7-x64
10909iocp�...Lib.js
windows10-2004-x64
10909iocp�...ay.exe
windows7-x64
10909iocp�...ay.exe
windows10-2004-x64
10909iocp�...s8.exe
windows7-x64
80909iocp�...s8.exe
windows10-2004-x64
80909iocp�...ock.js
windows7-x64
10909iocp�...ock.js
windows10-2004-x64
10909iocp�...ck2.js
windows7-x64
10909iocp�...ck2.js
windows10-2004-x64
10909iocp�...vfw.js
windows7-x64
10909iocp�...vfw.js
windows10-2004-x64
1加键盘�...ll.dll
windows7-x64
5加键盘�...ll.dll
windows10-2004-x64
5加键盘�...es.bat
windows7-x64
1加键盘�...es.bat
windows10-2004-x64
1加键盘�...ar.bat
windows7-x64
1加键盘�...ar.bat
windows10-2004-x64
1加键盘�...rv.exe
windows7-x64
3加键盘�...rv.exe
windows10-2004-x64
3加键盘�...ys.bat
windows7-x64
1加键盘�...ys.bat
windows10-2004-x64
1加键盘�...nit.js
windows7-x64
1加键盘�...nit.js
windows10-2004-x64
1Analysis
-
max time kernel
42s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 16:39
Static task
static1
Behavioral task
behavioral1
Sample
0909iocp控制端/clear.bat
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0909iocp控制端/clear.bat
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
0909iocp控制端/主窗单元/MainWindow.js
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
0909iocp控制端/主窗单元/MainWindow.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
0909iocp控制端/主窗单元/MainWindow.js
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
0909iocp控制端/主窗单元/MainWindow.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
minilzo-2.02.vbs
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
minilzo-2.02.vbs
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
0909iocp控制端/压缩单元/zlib/XiaoNiuZLib.js
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
0909iocp控制端/压缩单元/zlib/XiaoNiuZLib.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
0909iocp控制端/播放器/Play.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
0909iocp控制端/播放器/Play.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
0909iocp控制端/服务单元/wmpcdcs8.exe
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
0909iocp控制端/服务单元/wmpcdcs8.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
0909iocp控制端/网络模块/mssock.js
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
0909iocp控制端/网络模块/mssock.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
0909iocp控制端/网络模块/winsock2/WinSock2.js
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
0909iocp控制端/网络模块/winsock2/WinSock2.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
0909iocp控制端/视频单元/vfw.js
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
0909iocp控制端/视频单元/vfw.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
加键盘记录dll/加键盘记录dll/VIPDll.dll
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
加键盘记录dll/加键盘记录dll/VIPDll.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
加键盘记录dll/加键盘记录dll/Window-create res/BuildRes.bat
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
加键盘记录dll/加键盘记录dll/Window-create res/BuildRes.bat
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
加键盘记录dll/加键盘记录dll/clear.bat
Resource
win7-20221111-en
Behavioral task
behavioral26
Sample
加键盘记录dll/加键盘记录dll/clear.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
加键盘记录dll/加键盘记录dll/serv.exe
Resource
win7-20221111-en
Behavioral task
behavioral28
Sample
加键盘记录dll/加键盘记录dll/serv.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
加键盘记录dll/加键盘记录dll/sys.bat
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
加键盘记录dll/加键盘记录dll/sys.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
加键盘记录dll/加键盘记录dll/公用单元/PublicFunctionUnit.js
Resource
win7-20221111-en
Behavioral task
behavioral32
Sample
加键盘记录dll/加键盘记录dll/公用单元/PublicFunctionUnit.js
Resource
win10v2004-20221111-en
General
-
Target
加键盘记录dll/加键盘记录dll/VIPDll.dll
-
Size
119KB
-
MD5
875844cd39acbba37ec4b8a2ab63ef5a
-
SHA1
b89fa888f2459a6c621e59b1814605d8de5e7265
-
SHA256
044d4b93010ae485afed580339cd184d38c093e27ab4e29af9f563c853286b1a
-
SHA512
bd4e9337fb2fa17f0c12d356e16d8d658d8a81765af9cdbdb3c001ae055189d31dcb26e72dacfb5b988023861afe609e6ff4fc08f2b910252f7a41785dc62acb
-
SSDEEP
1536:+SFTXOm/CyKFNHcz9qSutBdyvGCEH9eF0LBLxbKZ+:+S9X7FKPHcRUtBwvGCEFFxbKZ+
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\.000 rundll32.exe File opened for modification C:\Windows\SysWOW64\dllcache\.tmp rundll32.exe File opened for modification C:\Windows\SysWOW64\.tmp rundll32.exe File opened for modification C:\Windows\SysWOW64\dllcache\.000 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1508 1380 WerFault.exe rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid process Token: SeRestorePrivilege 1380 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1252 wrote to memory of 1380 1252 rundll32.exe rundll32.exe PID 1252 wrote to memory of 1380 1252 rundll32.exe rundll32.exe PID 1252 wrote to memory of 1380 1252 rundll32.exe rundll32.exe PID 1252 wrote to memory of 1380 1252 rundll32.exe rundll32.exe PID 1252 wrote to memory of 1380 1252 rundll32.exe rundll32.exe PID 1252 wrote to memory of 1380 1252 rundll32.exe rundll32.exe PID 1252 wrote to memory of 1380 1252 rundll32.exe rundll32.exe PID 1380 wrote to memory of 1508 1380 rundll32.exe WerFault.exe PID 1380 wrote to memory of 1508 1380 rundll32.exe WerFault.exe PID 1380 wrote to memory of 1508 1380 rundll32.exe WerFault.exe PID 1380 wrote to memory of 1508 1380 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\加键盘记录dll\加键盘记录dll\VIPDll.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\加键盘记录dll\加键盘记录dll\VIPDll.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 3763⤵
- Program crash
PID:1508
-
-