Analysis

  • max time kernel
    89s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/04/2023, 07:00

General

  • Target

    舔狗模拟器.exe

  • Size

    140KB

  • MD5

    856ea69bae571de4fa7113c88bd7d1e6

  • SHA1

    c667b17531adc906a0d2127d293476edc6dbf3b0

  • SHA256

    82e8cc17688f86129c586805bf0844c9eeafe702dd9efef55ce86888c24cd7b9

  • SHA512

    394e9ae64b5eeee0f0d259a35402ac3057a271eab50fe48cb19cb1ab0e5c8c92b80aa4bfd34b5a390e31c21776c39e3efd8c4c0bb7c96f5629170a8e185bf5ba

  • SSDEEP

    3072:xE1WdB+sYiiiSlM75gcNvZvTsuD2Nh6Ao0piWq:SJM76cNvZvTsuDLAo0pi

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\舔狗模拟器.exe
    "C:\Users\Admin\AppData\Local\Temp\舔狗模拟器.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1528
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:316
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x564
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1184

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            61KB

            MD5

            e71c8443ae0bc2e282c73faead0a6dd3

            SHA1

            0c110c1b01e68edfacaeae64781a37b1995fa94b

            SHA256

            95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

            SHA512

            b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

          • memory/1528-54-0x0000000000C80000-0x0000000000CAA000-memory.dmp

            Filesize

            168KB

          • memory/1528-55-0x0000000004AE0000-0x0000000004B20000-memory.dmp

            Filesize

            256KB

          • memory/1528-56-0x0000000004AE0000-0x0000000004B20000-memory.dmp

            Filesize

            256KB

          • memory/1528-57-0x0000000004AE0000-0x0000000004B20000-memory.dmp

            Filesize

            256KB

          • memory/1528-58-0x0000000004AE0000-0x0000000004B20000-memory.dmp

            Filesize

            256KB

          • memory/1528-59-0x0000000004AE0000-0x0000000004B20000-memory.dmp

            Filesize

            256KB

          • memory/1528-60-0x0000000009CD0000-0x000000000A476000-memory.dmp

            Filesize

            7.6MB

          • memory/1528-62-0x0000000004AE0000-0x0000000004B20000-memory.dmp

            Filesize

            256KB