Overview
overview
7Static
static
7dxjy/zip.exe
windows7-x64
7dxjy/zip.exe
windows10-2004-x64
7�...��.exe
windows7-x64
1�...��.exe
windows10-2004-x64
1�...��.exe
windows7-x64
1�...��.exe
windows10-2004-x64
1�...��.exe
windows7-x64
7�...��.exe
windows10-2004-x64
7�...17.exe
windows7-x64
7�...17.exe
windows10-2004-x64
7Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
23-09-2023 04:03
Behavioral task
behavioral1
Sample
dxjy/zip.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dxjy/zip.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
㳣ýܹ/ܹ.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
㳣ýܹ/ܹ.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
㳣ýܹ/ѹߣƽṩ.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
㳣ýܹ/ѹߣƽṩ.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
㳣ýܹ/ͼѹ.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
㳣ýܹ/ͼѹ.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
㳣ýܹ/Զѹ2017.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
㳣ýܹ/Զѹ2017.exe
Resource
win10v2004-20230915-en
General
-
Target
㳣ýܹ/Զѹ2017.exe
-
Size
884KB
-
MD5
bb9b123f8cd2f8d8fae67c876ac2523d
-
SHA1
f9d96a09749daefbee77395f36abc46bf35e0435
-
SHA256
791c150089333a8bfdfe8f5224c0669c4448288395602cf0dfcfb6fd0673233e
-
SHA512
ec5b9a061314827862afd3736b41ffe5791fac7c10ca0c078733d02123915cb0212ae43cc2e6127575b49102d334a7e47da46bea696b220574ca657a488cb522
-
SSDEEP
12288:65xVf6omWDDZXjybQ0veHSWqBhDlIyGAR5nWFpPoS6O:65bi3WXZX+bDGHSHBNlIyGDbQO
Malware Config
Signatures
-
resource yara_rule behavioral9/memory/1888-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral9/memory/1888-50-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1888 Զѹ2017.exe 1888 Զѹ2017.exe 1888 Զѹ2017.exe