Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2023 05:51
Behavioral task
behavioral1
Sample
给老子冲/影流之王🈹 (10).exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
给老子冲/影流之王🈹 (10).exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
给老子冲/影流之王🈹 (5).exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
给老子冲/影流之王🈹 (5).exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
给老子冲/影流之王🈹 (7).exe
Resource
win7-20230220-en
General
-
Target
给老子冲/影流之王🈹 (10).exe
-
Size
5.0MB
-
MD5
22ba843c2cfd43aaf712b80b40e8b4f0
-
SHA1
b8ea71676e0651b7d918a16473a030c1014b7ffd
-
SHA256
76dee725ec290d43a66d16054121085868030a2af49fb0c5affc471c50984bd7
-
SHA512
5fbae872c164e80ff042aca5d4821ff14c47f2889dce7557ee4d7a2f5a4d7a4ac7d183f3dfe6144e210fa1621080de874dd30f7a7827032ebe3ec935799f6ac1
-
SSDEEP
49152:NtErfhsOSMa1xYus4Q2D2TgG6hN3gSVsmqoyeBe4:NtEbfa1xNL2g3mrEBX
Malware Config
Extracted
icedid
Signatures
-
Matiex Main payload 1 IoCs
resource yara_rule behavioral2/memory/2772-133-0x0000000000110000-0x00000000006101E0-memory.dmp family_matiex -
Detectes Phoenix Miner Payload 1 IoCs
resource yara_rule behavioral2/memory/2772-133-0x0000000000110000-0x00000000006101E0-memory.dmp miner_phoenix -
Program crash 2 IoCs
pid pid_target Process procid_target 4120 2772 WerFault.exe 83 876 2772 WerFault.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\给老子冲\影流之王🈹 (10).exe"C:\Users\Admin\AppData\Local\Temp\给老子冲\影流之王🈹 (10).exe"1⤵PID:2772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 2442⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 2482⤵
- Program crash
PID:876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2772 -ip 27721⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2772 -ip 27721⤵PID:1076