Overview
overview
8Static
static
8河源下�...om.url
windows7-x64
1河源下�...om.url
windows10-2004-x64
1简單挂�...nj.dll
windows7-x64
8简單挂�...nj.dll
windows10-2004-x64
8简單挂�...ro.dll
windows7-x64
8简單挂�...ro.dll
windows10-2004-x64
8简單挂�...ip.dll
windows7-x64
1简單挂�...ip.dll
windows10-2004-x64
3简單挂�....0.exe
windows7-x64
8简單挂�....0.exe
windows10-2004-x64
8简單挂�...04.url
windows7-x64
1简單挂�...04.url
windows10-2004-x64
1简單挂�...om.url
windows7-x64
1简單挂�...om.url
windows10-2004-x64
1简單挂�...�1.exe
windows7-x64
8简單挂�...�1.exe
windows10-2004-x64
8简單挂�...��.exe
windows7-x64
7简單挂�...��.exe
windows10-2004-x64
6Analysis
-
max time kernel
155s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 20:18
Behavioral task
behavioral1
Sample
河源下载站-xz7.com.url
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
河源下载站-xz7.com.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
简單挂免曊版⒔1/SimpInj.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
简單挂免曊版⒔1/SimpInj.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
简單挂免曊版⒔1/SimplePro.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
简單挂免曊版⒔1/SimplePro.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
简單挂免曊版⒔1/zip.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
简單挂免曊版⒔1/zip.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
简單挂免曊版⒔1/传奇通用变速器7.0.exe
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
简單挂免曊版⒔1/传奇通用变速器7.0.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
简單挂免曊版⒔1/在线咨询QQ:910001904.url
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
简單挂免曊版⒔1/在线咨询QQ:910001904.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
简單挂免曊版⒔1/简单挂官网:s1904.com.url
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
简單挂免曊版⒔1/简单挂官网:s1904.com.url
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
简單挂免曊版⒔1/简單挂免曊版⒔1.exe
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
简單挂免曊版⒔1/简單挂免曊版⒔1.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
简單挂免曊版⒔1/霸王恶魔.exe
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
简單挂免曊版⒔1/霸王恶魔.exe
Resource
win10v2004-20220812-en
General
-
Target
简單挂免曊版⒔1/霸王恶魔.exe
-
Size
5.8MB
-
MD5
7cc45747bdc42b3ff4e395939af4dd63
-
SHA1
2b1868b7686f7122198d98b0426c2ae7daa68b80
-
SHA256
e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486
-
SHA512
01466dd373056f512140a470604d3aef9df50cad4e94d2947dc116346bc15946a51055b7b848bfb7ca0c553d48a34cb2043f6d71d71bbddbb0a916d6071e0fc4
-
SSDEEP
98304:Jk+5UUQ2ll0Zje8tNJj669cERHEkN+nCFwPoaSwIfeaG4u6V:d5UB2v088tUdkSCFwQe56V
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
霸王恶魔.exedescription ioc process File opened (read-only) \??\L: 霸王恶魔.exe File opened (read-only) \??\O: 霸王恶魔.exe File opened (read-only) \??\U: 霸王恶魔.exe File opened (read-only) \??\Y: 霸王恶魔.exe File opened (read-only) \??\G: 霸王恶魔.exe File opened (read-only) \??\H: 霸王恶魔.exe File opened (read-only) \??\X: 霸王恶魔.exe File opened (read-only) \??\B: 霸王恶魔.exe File opened (read-only) \??\T: 霸王恶魔.exe File opened (read-only) \??\N: 霸王恶魔.exe File opened (read-only) \??\P: 霸王恶魔.exe File opened (read-only) \??\Q: 霸王恶魔.exe File opened (read-only) \??\R: 霸王恶魔.exe File opened (read-only) \??\V: 霸王恶魔.exe File opened (read-only) \??\A: 霸王恶魔.exe File opened (read-only) \??\F: 霸王恶魔.exe File opened (read-only) \??\J: 霸王恶魔.exe File opened (read-only) \??\K: 霸王恶魔.exe File opened (read-only) \??\M: 霸王恶魔.exe File opened (read-only) \??\S: 霸王恶魔.exe File opened (read-only) \??\W: 霸王恶魔.exe File opened (read-only) \??\Z: 霸王恶魔.exe File opened (read-only) \??\E: 霸王恶魔.exe File opened (read-only) \??\I: 霸王恶魔.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
霸王恶魔.exedescription pid process Token: SeDebugPrivilege 4836 霸王恶魔.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
霸王恶魔.exepid process 4836 霸王恶魔.exe 4836 霸王恶魔.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4836-132-0x0000000000400000-0x0000000000A30000-memory.dmpFilesize
6.2MB
-
memory/4836-134-0x0000000000400000-0x0000000000A30000-memory.dmpFilesize
6.2MB
-
memory/4836-135-0x0000000000400000-0x0000000000A30000-memory.dmpFilesize
6.2MB
-
memory/4836-136-0x0000000010000000-0x0000000010052000-memory.dmpFilesize
328KB
-
memory/4836-137-0x0000000000400000-0x0000000000A30000-memory.dmpFilesize
6.2MB