Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-04-2023 05:51
Behavioral task
behavioral1
Sample
给老子冲/影流之王🈹 (10).exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
给老子冲/影流之王🈹 (10).exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
给老子冲/影流之王🈹 (5).exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
给老子冲/影流之王🈹 (5).exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
给老子冲/影流之王🈹 (7).exe
Resource
win7-20230220-en
General
-
Target
给老子冲/影流之王🈹 (10).exe
-
Size
5.0MB
-
MD5
22ba843c2cfd43aaf712b80b40e8b4f0
-
SHA1
b8ea71676e0651b7d918a16473a030c1014b7ffd
-
SHA256
76dee725ec290d43a66d16054121085868030a2af49fb0c5affc471c50984bd7
-
SHA512
5fbae872c164e80ff042aca5d4821ff14c47f2889dce7557ee4d7a2f5a4d7a4ac7d183f3dfe6144e210fa1621080de874dd30f7a7827032ebe3ec935799f6ac1
-
SSDEEP
49152:NtErfhsOSMa1xYus4Q2D2TgG6hN3gSVsmqoyeBe4:NtEbfa1xNL2g3mrEBX
Malware Config
Extracted
icedid
Signatures
-
Matiex Main payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1992-54-0x00000000008F0000-0x0000000000DF01E0-memory.dmp family_matiex -
Detectes Phoenix Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1992-54-0x00000000008F0000-0x0000000000DF01E0-memory.dmp miner_phoenix -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1996 1992 WerFault.exe 影流之王🈹 (10).exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
影流之王🈹 (10).exedescription pid process target process PID 1992 wrote to memory of 1996 1992 影流之王🈹 (10).exe WerFault.exe PID 1992 wrote to memory of 1996 1992 影流之王🈹 (10).exe WerFault.exe PID 1992 wrote to memory of 1996 1992 影流之王🈹 (10).exe WerFault.exe PID 1992 wrote to memory of 1996 1992 影流之王🈹 (10).exe WerFault.exe