Overview
overview
9Static
static
9幻想辅助3/DM.dll
windows7-x64
1幻想辅助3/DM.dll
windows10-2004-x64
8幻想辅�...ad.dll
windows7-x64
1幻想辅�...ad.dll
windows10-2004-x64
1幻想辅助3/San.dll
windows7-x64
5幻想辅助3/San.dll
windows10-2004-x64
5幻想辅助3/com.dll
windows7-x64
3幻想辅助3/com.dll
windows10-2004-x64
3幻想辅�...30.exe
windows7-x64
1幻想辅�...30.exe
windows10-2004-x64
3幻想辅�...01.exe
windows7-x64
1幻想辅�...01.exe
windows10-2004-x64
3幻想辅�...��.exe
windows7-x64
1幻想辅�...��.exe
windows10-2004-x64
3幻想辅�...��.exe
windows7-x64
1幻想辅�...��.exe
windows10-2004-x64
3幻想辅�...��.exe
windows7-x64
1幻想辅�...��.exe
windows10-2004-x64
3幻想辅�...ln.dll
windows7-x64
1幻想辅�...ln.dll
windows10-2004-x64
1幻想辅�...ec.dll
windows7-x64
1幻想辅�...ec.dll
windows10-2004-x64
1幻想辅�...��.exe
windows7-x64
8幻想辅�...��.exe
windows10-2004-x64
3最新QQ�...��.url
windows7-x64
1最新QQ�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
151s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 19:23
Behavioral task
behavioral1
Sample
幻想辅助3/DM.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
幻想辅助3/DM.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
幻想辅助3/EThread.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
幻想辅助3/EThread.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
幻想辅助3/San.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
幻想辅助3/San.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
幻想辅助3/com.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
幻想辅助3/com.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
幻想辅助3/ds30.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
幻想辅助3/ds30.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
幻想辅助3/ds301.exe
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
幻想辅助3/ds301.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
幻想辅助3/ds30试用版.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
幻想辅助3/ds30试用版.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
幻想辅助3/ds30试用版(笔记本小屏幕用).exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
幻想辅助3/ds30试用版(笔记本小屏幕用).exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
幻想辅助3/ds30(笔记本小屏幕用).exe
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
幻想辅助3/ds30(笔记本小屏幕用).exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
幻想辅助3/krnln.dll
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
幻想辅助3/krnln.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
幻想辅助3/spec.dll
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
幻想辅助3/spec.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
幻想辅助3/小菜破戒.exe
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
幻想辅助3/小菜破戒.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
最新QQ软件下载.url
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
最新QQ软件下载.url
Resource
win10v2004-20221111-en
General
-
Target
幻想辅助3/小菜破戒.exe
-
Size
760KB
-
MD5
edc7cfb7aef1925d7ece62ad826a035d
-
SHA1
7d11d5860bb9b9817b7e170f0a31614e132994ac
-
SHA256
dedea129a4d3bbd3a543f0b83e8e5cce7f38d10e3d6ec2a29de902a924af545c
-
SHA512
5f86de5528fa4a51c5f5151932da2d387ffbf3ea350829ef33cbc38d4700fe99b5b6c3b96b7e7a94fc2467ced96737d2e9a74e8802c89467ec69f554ff730601
-
SSDEEP
12288:oMC1HSAwx2if8mFgUxIX1kfzw+ryCI+DR5nWFpPoSLq:oTox2tVUaX6fzJr17ybU
Malware Config
Signatures
-
resource yara_rule behavioral23/memory/1200-55-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-56-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-57-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-59-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-61-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-63-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-67-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-65-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-69-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-71-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-73-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-75-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-77-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-79-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-81-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-85-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-83-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-89-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-94-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-91-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-87-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-96-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-98-0x0000000000520000-0x000000000055E000-memory.dmp upx behavioral23/memory/1200-99-0x0000000000520000-0x000000000055E000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe -
Suspicious behavior: MapViewOfSection 21 IoCs
pid Process 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1200 小菜破戒.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1200 小菜破戒.exe 1200 小菜破戒.exe 1200 小菜破戒.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1200 wrote to memory of 372 1200 小菜破戒.exe 5 PID 1200 wrote to memory of 372 1200 小菜破戒.exe 5 PID 1200 wrote to memory of 372 1200 小菜破戒.exe 5 PID 1200 wrote to memory of 372 1200 小菜破戒.exe 5 PID 1200 wrote to memory of 372 1200 小菜破戒.exe 5 PID 1200 wrote to memory of 372 1200 小菜破戒.exe 5 PID 1200 wrote to memory of 380 1200 小菜破戒.exe 4 PID 1200 wrote to memory of 380 1200 小菜破戒.exe 4 PID 1200 wrote to memory of 380 1200 小菜破戒.exe 4 PID 1200 wrote to memory of 380 1200 小菜破戒.exe 4 PID 1200 wrote to memory of 380 1200 小菜破戒.exe 4 PID 1200 wrote to memory of 380 1200 小菜破戒.exe 4 PID 1200 wrote to memory of 412 1200 小菜破戒.exe 3 PID 1200 wrote to memory of 412 1200 小菜破戒.exe 3 PID 1200 wrote to memory of 412 1200 小菜破戒.exe 3 PID 1200 wrote to memory of 412 1200 小菜破戒.exe 3 PID 1200 wrote to memory of 412 1200 小菜破戒.exe 3 PID 1200 wrote to memory of 412 1200 小菜破戒.exe 3 PID 1200 wrote to memory of 464 1200 小菜破戒.exe 2 PID 1200 wrote to memory of 464 1200 小菜破戒.exe 2 PID 1200 wrote to memory of 464 1200 小菜破戒.exe 2 PID 1200 wrote to memory of 464 1200 小菜破戒.exe 2 PID 1200 wrote to memory of 464 1200 小菜破戒.exe 2 PID 1200 wrote to memory of 464 1200 小菜破戒.exe 2 PID 1200 wrote to memory of 480 1200 小菜破戒.exe 1 PID 1200 wrote to memory of 480 1200 小菜破戒.exe 1 PID 1200 wrote to memory of 480 1200 小菜破戒.exe 1 PID 1200 wrote to memory of 480 1200 小菜破戒.exe 1 PID 1200 wrote to memory of 480 1200 小菜破戒.exe 1 PID 1200 wrote to memory of 480 1200 小菜破戒.exe 1 PID 1200 wrote to memory of 488 1200 小菜破戒.exe 8 PID 1200 wrote to memory of 488 1200 小菜破戒.exe 8 PID 1200 wrote to memory of 488 1200 小菜破戒.exe 8 PID 1200 wrote to memory of 488 1200 小菜破戒.exe 8 PID 1200 wrote to memory of 488 1200 小菜破戒.exe 8 PID 1200 wrote to memory of 488 1200 小菜破戒.exe 8 PID 1200 wrote to memory of 576 1200 小菜破戒.exe 9 PID 1200 wrote to memory of 576 1200 小菜破戒.exe 9 PID 1200 wrote to memory of 576 1200 小菜破戒.exe 9 PID 1200 wrote to memory of 576 1200 小菜破戒.exe 9 PID 1200 wrote to memory of 576 1200 小菜破戒.exe 9 PID 1200 wrote to memory of 576 1200 小菜破戒.exe 9 PID 1200 wrote to memory of 660 1200 小菜破戒.exe 25 PID 1200 wrote to memory of 660 1200 小菜破戒.exe 25 PID 1200 wrote to memory of 660 1200 小菜破戒.exe 25 PID 1200 wrote to memory of 660 1200 小菜破戒.exe 25 PID 1200 wrote to memory of 660 1200 小菜破戒.exe 25 PID 1200 wrote to memory of 660 1200 小菜破戒.exe 25 PID 1200 wrote to memory of 748 1200 小菜破戒.exe 10 PID 1200 wrote to memory of 748 1200 小菜破戒.exe 10 PID 1200 wrote to memory of 748 1200 小菜破戒.exe 10 PID 1200 wrote to memory of 748 1200 小菜破戒.exe 10 PID 1200 wrote to memory of 748 1200 小菜破戒.exe 10 PID 1200 wrote to memory of 748 1200 小菜破戒.exe 10 PID 1200 wrote to memory of 800 1200 小菜破戒.exe 24 PID 1200 wrote to memory of 800 1200 小菜破戒.exe 24 PID 1200 wrote to memory of 800 1200 小菜破戒.exe 24 PID 1200 wrote to memory of 800 1200 小菜破戒.exe 24 PID 1200 wrote to memory of 800 1200 小菜破戒.exe 24 PID 1200 wrote to memory of 800 1200 小菜破戒.exe 24 PID 1200 wrote to memory of 836 1200 小菜破戒.exe 23 PID 1200 wrote to memory of 836 1200 小菜破戒.exe 23 PID 1200 wrote to memory of 836 1200 小菜破戒.exe 23 PID 1200 wrote to memory of 836 1200 小菜破戒.exe 23
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:576
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:748
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:484
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:744
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1736
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1228
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:1008
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:872
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:836
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:800
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:660
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:412
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:372
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:488
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\幻想辅助3\小菜破戒.exe"C:\Users\Admin\AppData\Local\Temp\幻想辅助3\小菜破戒.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200
-
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:2012
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1328