Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 09:51
Behavioral task
behavioral1
Sample
hlg1.7/火龙果/火龙果.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
hlg1.7/火龙果/火龙果.exe
Resource
win10v2004-20230915-en
General
-
Target
hlg1.7/火龙果/火龙果.exe
-
Size
9.6MB
-
MD5
d3f95a7148a95f3cf6b02e630ebe25b1
-
SHA1
39f0c79e7c5011436147d66ac9fcccea12caca81
-
SHA256
7faa2b6fd2c84ec0cd6bb28cd1f67717eb0386bb571d1a8c32308a15f0aa5c8a
-
SHA512
ac92e955ddee092d33d69d9d61b512dcaa8f02cf5fff548769d0d86f9452f6550bee6fca4e360ea516128dbe2b5244224ef61b3fbf6c4a24ea62444f09f1923a
-
SSDEEP
196608:kDMRf+36NL4VBDVlq4CUzTDJrzkMEjKOhl:bRf+OLl4ZDNkMELj
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2168 火龙果.exe -
resource yara_rule behavioral2/memory/2168-2-0x0000000000400000-0x000000000168A000-memory.dmp vmprotect behavioral2/memory/2168-7-0x0000000000400000-0x000000000168A000-memory.dmp vmprotect behavioral2/memory/2168-17-0x0000000000400000-0x000000000168A000-memory.dmp vmprotect behavioral2/memory/2168-18-0x0000000000400000-0x000000000168A000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2168 火龙果.exe 2168 火龙果.exe 2168 火龙果.exe 2168 火龙果.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2168 火龙果.exe 2168 火龙果.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.6MB
MD5c1f7712711b59ed492ac4100cd76b8a1
SHA1c548f1192890ebd924e5f47ccbfd4e607e322a36
SHA2562f36f67c960644b5d53b24791b014c9758285256547f883b6db86cbeb734ef86
SHA512682168ad42ad75e7c4a69e515636733c85a3380a260d681ceddff61f9d8529689307305e72b26406236439d9037e2e6be3ac53497c110f610710e830d4fedac7