Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-07-2023 08:42

General

  • Target

    连连看.exe

  • Size

    4.9MB

  • MD5

    1ecea63b7cd538fcae8b0a67ecf59390

  • SHA1

    ecf9bad9a3dabe1acd079cb70fb6ba3d1112c3d3

  • SHA256

    b8a2c977f8e51d0138d2beca128b0902b1f2183a034ba5c06d74cbcffbea319e

  • SHA512

    682b85f2e4c9f68c43ab5e54dfc74df3a9c6319123e988feb780b1dc57b09cf9c05f423cf7ced31788c640615c06d075a2a119e36e2a7fe9d7fb6c8ee7453485

  • SSDEEP

    49152:t2xLirn4t2VXVscK0oKdTH4AUK6xv3UMrpsTQZH4cKZWkEblHpLUUPx4FiGZ6TWa:tciTcs6uip9x7jH4fEblHWO4FiGyb0FG

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\连连看.exe
    "C:\Users\Admin\AppData\Local\Temp\连连看.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3420

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\HPSocket4C.dll

    Filesize

    2.8MB

    MD5

    94fe235c1d162847b0db465f7947427e

    SHA1

    a4b56af339282efa243a506f44d420cc2f2339b6

    SHA256

    2aa2190842baa60578badabdb83a964d813aa20b614c77676f693c6ca21326d4

    SHA512

    f319688622c668f6ea9b0878753a9fa0a0c739581381d8a27bf424734e34b6f6579d03b97ef6a571f4879a8eb015c92bf6a8b5b48e7032259de90145b65f5fa7

  • memory/3420-133-0x0000000000400000-0x0000000000918000-memory.dmp

    Filesize

    5.1MB

  • memory/3420-134-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB

  • memory/3420-143-0x0000000000400000-0x0000000000918000-memory.dmp

    Filesize

    5.1MB