Resubmissions
23-11-2023 18:30
231123-w5flfacb8t 1023-11-2023 18:24
231123-w16basbc55 1023-11-2023 18:09
231123-wrnpwscb3w 1023-11-2023 18:04
231123-wn4xpsca81 1Analysis
-
max time kernel
128s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2023 18:30
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/4444-265-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat behavioral1/memory/4444-264-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat behavioral1/memory/4444-309-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 发_票_单20231122.exe -
Executes dropped EXE 5 IoCs
pid Process 2828 发_票_单20231122.exe 4444 fufu.exe 4848 fufu.exe 1612 fufu.exe 3524 fufu.exe -
Loads dropped DLL 4 IoCs
pid Process 4444 fufu.exe 4848 fufu.exe 1612 fufu.exe 3524 fufu.exe -
resource yara_rule behavioral1/memory/4444-261-0x0000000010000000-0x0000000010011000-memory.dmp upx behavioral1/memory/4444-265-0x0000000010000000-0x0000000010011000-memory.dmp upx behavioral1/memory/4444-264-0x0000000010000000-0x0000000010011000-memory.dmp upx behavioral1/memory/4444-309-0x0000000010000000-0x0000000010011000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\LonlifeGame\hgsd.db 发_票_单20231122.exe File created C:\Program Files (x86)\LonlifeGame\nw_elf.dll 发_票_单20231122.exe File created C:\Program Files (x86)\LonlifeGame\cvsd.xml 发_票_单20231122.exe File created C:\Program Files (x86)\LonlifeGame\decvsd.xml 发_票_单20231122.exe File created C:\Program Files (x86)\LonlifeGame\fufu.exe 发_票_单20231122.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 864 msedge.exe 864 msedge.exe 4804 msedge.exe 4804 msedge.exe 3144 identity_helper.exe 3144 identity_helper.exe 4152 msedge.exe 4152 msedge.exe 2828 发_票_单20231122.exe 2828 发_票_单20231122.exe 2828 发_票_单20231122.exe 2828 发_票_单20231122.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe 4444 fufu.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3564 7zG.exe Token: 35 3564 7zG.exe Token: SeSecurityPrivilege 3564 7zG.exe Token: SeSecurityPrivilege 3564 7zG.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 3564 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2828 发_票_单20231122.exe 2828 发_票_单20231122.exe 4444 fufu.exe 4848 fufu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4468 4804 msedge.exe 83 PID 4804 wrote to memory of 4468 4804 msedge.exe 83 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 4344 4804 msedge.exe 85 PID 4804 wrote to memory of 864 4804 msedge.exe 84 PID 4804 wrote to memory of 864 4804 msedge.exe 84 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86 PID 4804 wrote to memory of 3568 4804 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://aisino-1321215118.cos.ap-guangzhou.myqcloud.com/col-103.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe46ca46f8,0x7ffe46ca4708,0x7ffe46ca47182⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 /prefetch:82⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5028 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,3339593076493998472,235639608457461833,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5436 /prefetch:22⤵PID:3068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2052
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:988
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\发_票_单20231122\" -spe -an -ai#7zMap7684:88:7zEvent312571⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3564
-
C:\Users\Admin\Downloads\发_票_单20231122\发_票_单20231122.exe"C:\Users\Admin\Downloads\发_票_单20231122\发_票_单20231122.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Program Files (x86)\LonlifeGame\fufu.exe"C:\Program Files (x86)\LonlifeGame\fufu.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4444 -
C:\Program Files (x86)\LonlifeGame\fufu.exe"C:\Program Files (x86)\LonlifeGame\fufu.exe" --type=crashpad-handler /prefetch:7 --no-rate-limit --database=C:\Users\Admin\AppData\Local\Crashpad --annotation=channel= --annotation=plat=Win32 --annotation=prod=书生ERP --annotation=ver=-devel --handshake-handle=0x2303⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4848
-
-
-
C:\Program Files (x86)\LonlifeGame\fufu.exe"C:\Program Files (x86)\LonlifeGame\fufu.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1612 -
C:\Program Files (x86)\LonlifeGame\fufu.exe"C:\Program Files (x86)\LonlifeGame\fufu.exe" --type=crashpad-handler /prefetch:7 --no-rate-limit --database=C:\Users\Admin\AppData\Local\Crashpad --annotation=channel= --annotation=plat=Win32 --annotation=prod=书生ERP --annotation=ver=-devel --handshake-handle=0x2302⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a182097a3169f5924c29d107c0b4b5a4
SHA18c5e7ff7a8b62de893a3cb6dad3fc028435ead92
SHA256a60a8592d45f56d9c2ec2039089b55b371dda0797e4fbb57038d40e8c8530e01
SHA5120f57bac990a446d17c468cd4cf9604c5eec4e40c599afd64451a6718417174f7f06de717412863c0f44f2f692a0557857a8799f3f4c700016db2a406f1d6a50d
-
Filesize
1.0MB
MD5a182097a3169f5924c29d107c0b4b5a4
SHA18c5e7ff7a8b62de893a3cb6dad3fc028435ead92
SHA256a60a8592d45f56d9c2ec2039089b55b371dda0797e4fbb57038d40e8c8530e01
SHA5120f57bac990a446d17c468cd4cf9604c5eec4e40c599afd64451a6718417174f7f06de717412863c0f44f2f692a0557857a8799f3f4c700016db2a406f1d6a50d
-
Filesize
1.0MB
MD5a182097a3169f5924c29d107c0b4b5a4
SHA18c5e7ff7a8b62de893a3cb6dad3fc028435ead92
SHA256a60a8592d45f56d9c2ec2039089b55b371dda0797e4fbb57038d40e8c8530e01
SHA5120f57bac990a446d17c468cd4cf9604c5eec4e40c599afd64451a6718417174f7f06de717412863c0f44f2f692a0557857a8799f3f4c700016db2a406f1d6a50d
-
Filesize
1.0MB
MD5a182097a3169f5924c29d107c0b4b5a4
SHA18c5e7ff7a8b62de893a3cb6dad3fc028435ead92
SHA256a60a8592d45f56d9c2ec2039089b55b371dda0797e4fbb57038d40e8c8530e01
SHA5120f57bac990a446d17c468cd4cf9604c5eec4e40c599afd64451a6718417174f7f06de717412863c0f44f2f692a0557857a8799f3f4c700016db2a406f1d6a50d
-
Filesize
1.0MB
MD5a182097a3169f5924c29d107c0b4b5a4
SHA18c5e7ff7a8b62de893a3cb6dad3fc028435ead92
SHA256a60a8592d45f56d9c2ec2039089b55b371dda0797e4fbb57038d40e8c8530e01
SHA5120f57bac990a446d17c468cd4cf9604c5eec4e40c599afd64451a6718417174f7f06de717412863c0f44f2f692a0557857a8799f3f4c700016db2a406f1d6a50d
-
Filesize
1.0MB
MD5a182097a3169f5924c29d107c0b4b5a4
SHA18c5e7ff7a8b62de893a3cb6dad3fc028435ead92
SHA256a60a8592d45f56d9c2ec2039089b55b371dda0797e4fbb57038d40e8c8530e01
SHA5120f57bac990a446d17c468cd4cf9604c5eec4e40c599afd64451a6718417174f7f06de717412863c0f44f2f692a0557857a8799f3f4c700016db2a406f1d6a50d
-
Filesize
253KB
MD50a08d3fc727dfee403bacd01b251c47a
SHA1d3e192bcecb0c1e8bf447be2faae9e31570250aa
SHA256ac3ba73e7be2c30b3175471236fed821e13934fc6dee78d43d165e13b7433980
SHA51250c90a18c2d5a05a8672f6b815717028c3146990c0a850a0a1b2cb97cfd35284e67c2612052241fcbe581724441a873f3b4880213452ce9eacd19affe681ac78
-
Filesize
253KB
MD50a08d3fc727dfee403bacd01b251c47a
SHA1d3e192bcecb0c1e8bf447be2faae9e31570250aa
SHA256ac3ba73e7be2c30b3175471236fed821e13934fc6dee78d43d165e13b7433980
SHA51250c90a18c2d5a05a8672f6b815717028c3146990c0a850a0a1b2cb97cfd35284e67c2612052241fcbe581724441a873f3b4880213452ce9eacd19affe681ac78
-
Filesize
253KB
MD50a08d3fc727dfee403bacd01b251c47a
SHA1d3e192bcecb0c1e8bf447be2faae9e31570250aa
SHA256ac3ba73e7be2c30b3175471236fed821e13934fc6dee78d43d165e13b7433980
SHA51250c90a18c2d5a05a8672f6b815717028c3146990c0a850a0a1b2cb97cfd35284e67c2612052241fcbe581724441a873f3b4880213452ce9eacd19affe681ac78
-
Filesize
253KB
MD50a08d3fc727dfee403bacd01b251c47a
SHA1d3e192bcecb0c1e8bf447be2faae9e31570250aa
SHA256ac3ba73e7be2c30b3175471236fed821e13934fc6dee78d43d165e13b7433980
SHA51250c90a18c2d5a05a8672f6b815717028c3146990c0a850a0a1b2cb97cfd35284e67c2612052241fcbe581724441a873f3b4880213452ce9eacd19affe681ac78
-
Filesize
253KB
MD50a08d3fc727dfee403bacd01b251c47a
SHA1d3e192bcecb0c1e8bf447be2faae9e31570250aa
SHA256ac3ba73e7be2c30b3175471236fed821e13934fc6dee78d43d165e13b7433980
SHA51250c90a18c2d5a05a8672f6b815717028c3146990c0a850a0a1b2cb97cfd35284e67c2612052241fcbe581724441a873f3b4880213452ce9eacd19affe681ac78
-
Filesize
40B
MD51a0847c11641f98316e2292513d6d5d8
SHA126614963098513e42c5f3fc35e4c709baf329018
SHA2568a408e0011f5cb525ef6f4396c79dfe5fc70727e8b21fc7b7ed424ebc71a6007
SHA512511b83968c95a7d2a1e8b6460d4a8e66ffc5cd18214c191c33609f3383c8802da00de522bb97155be7706db21082927378ef5a94cb2b2aacb9470d9b47dfd65e
-
Filesize
40B
MD51a0847c11641f98316e2292513d6d5d8
SHA126614963098513e42c5f3fc35e4c709baf329018
SHA2568a408e0011f5cb525ef6f4396c79dfe5fc70727e8b21fc7b7ed424ebc71a6007
SHA512511b83968c95a7d2a1e8b6460d4a8e66ffc5cd18214c191c33609f3383c8802da00de522bb97155be7706db21082927378ef5a94cb2b2aacb9470d9b47dfd65e
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD584eceb4a85e168cb3e8eb64cd2f9381e
SHA132c6376772d1a3b91a97fc8e0eb7c6cc818439ed
SHA25605af3b0dd347baa2bb9b56a613768a2f624b7ad8055146050fc7e769893ba3b7
SHA5123c1af50e458f68e258b8d0809bc0bc2e9ab03500748f8f5aaa9aa2bcf357719c668054bb5ac067e6f786aec1f3d40d89dbed9656f73fae2496065e0b631a8e86
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
181B
MD531cf096d283ce26f7d6ec93fde4b1e74
SHA11457f9efff4d061798ba9382be594b06fd302bf1
SHA2568a83e583581c6938e4ae5aae8233ca7628488bfe62c36cc28c87d4fa1e14a5f5
SHA512cea8a266514b4207a80cc92b6a2a7091b4cca8d502048cb7ac93ef6cfaeed7eacc113ef70cfc39d529a8f2d1d156c80f3b2932849af2234c1575ad79c420622c
-
Filesize
6KB
MD5523b61705f647866d2b19bd7f5c77d0b
SHA1fd8a6109f97319a107ca336f2effa9962548ad26
SHA25665e6e613a47ae5a55815bfecf290652bc0b2a1786fd4a50b32b53499b1583b2e
SHA51263d3586ae6fbab252d84b42564f02b5c0ace8b62ff54f72a301943084054eb0d12fc71c708b3020fb7c0fee9b7e97477396764108e43573f55cb731180ff8a1a
-
Filesize
5KB
MD55be2242f33491921047192a3b6bb9aac
SHA1b3b823a528fd85f31a1814bd670461c149f8f303
SHA256273f12c9dfc528c5f169f0a93b06cf8c2d201bcd8a34ae8889daaf6deb562584
SHA51203ac98aaaaece0d67b9bdfe1fbb56fdb2d949f13d0f75462b4fca913d1b45cac93cf21000f3e419ef490e1940651481f5da5200f0a0f770bacc7dec903599441
-
Filesize
5KB
MD504152afd097b700c5159eb5137d1a7a0
SHA13796c1ca0bec04f4cbee4ce3a100e703fc86309d
SHA256b53940967b8a5c2aaf695b50c4cf69c9ae37c9493dec2d9f2f43e362ecf2a19c
SHA512405254bfd91ded69e49f906dd7a07a8d3f41db787f323b4d1b7ba4bb51c3005d29ae020e1127272fa4cdf221774dea778a003eeea3b1b8f3eaa61153738526ab
-
Filesize
5KB
MD53116db9a19adaf9c5a091279cf121649
SHA1428f136ef5571abea43a86301e90949ec7fa40e5
SHA2563b344493451da82d65b7949da1a20fa49f1919b23c388e0028dc91c6d8f30e80
SHA512a88181fed733f5831eb7fc9915e994bfe3fc2b52f6c66a55256d7d4a59aaed1bd4cd6cfebe969cc311c0bc73fc48408b465a1b2ada8d530fdcc464c468e0494e
-
Filesize
24KB
MD5fd20981c7184673929dfcab50885629b
SHA114c2437aad662b119689008273844bac535f946c
SHA25628b7a1e7b492fff3e5268a6cd480721f211ceb6f2f999f3698b3b8cbd304bb22
SHA512b99520bbca4d2b39f8bedb59944ad97714a3c9b8a87393719f1cbc40ed63c5834979f49346d31072c4d354c612ab4db9bf7f16e7c15d6802c9ea507d8c46af75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD51a1ffde332e9ab622ece7db50114dcf2
SHA12551a9d8eaeef4ae7f2640a4f8a844922d099ea9
SHA2569bd42d5ac2b0134fb5e1773af0b0b87f72f8154814ccb6628cd590018c0c16fc
SHA51214e22f2cbe314ef79431b9859d753afcc8035c6ce7c336645f2dbd4339ca6f1c01c06316e3bd081de37f7b58067c896ea166a8b7af840d8fddde6b359d199788
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe585d4e.TMP
Filesize48B
MD5649f343bec09f55075df35df43e4dd6f
SHA1bbc6ae628151afe14c21aedd6eabb7b4e26c0b46
SHA256f4a44241ba445075e2da5461e22ea03d7435b1f599df9ae89950ea0f106458dd
SHA512ae1634aa8ab55c0310a1576d508aa90f53aba07e15c13ddffbecb8bd05db6bff54b8f71ca01a935436cfc6b3503bb833ae583c782e4fc38b053c8c71dff7f0e6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5243dae74e38367f29d9ff5c3f39333a6
SHA1664dc874afc195f4a04feedf128740108de5e676
SHA256df3c690129ed0dc042a1631a590332aa7f10463bdadd2d4114bd4064e36e2324
SHA5126680cbd0d983f464c3260919a46927df313754c2afbb1ab43e0c03cb11442309fe17ebb029a647a931921d9006f24ce7ce1d37179a3d03cabc7e4e48ab1d9973
-
Filesize
10KB
MD5928b815ae8d9f2038ce9bca82d611be3
SHA137e29ff4faa0b673c78649e11cebf33a27aef49f
SHA25637fef3ee37bbc555a51f002114d48b33d21892f3a57667f3419d19b63c8c094e
SHA51221c9a2ce1fa77d7e68b4818190222ed86c9b48483dc49fcdd58846e79aed264dedf6d049d9c53402fa4d6d3d5ef51c4454961503ce3d53c05b9e5ce2c690752b
-
Filesize
10KB
MD56e471265f69d8567500605853b24f63f
SHA170584c2a66d452823962b068372ec42ef39ef653
SHA25656f547b4a32f285672d9e137034eb4abdacc7a71285bc540c14aee79f32eb091
SHA512d0e679112cf655bdaa9830863852f9e4f78674d8f638f9555bcd2354d83fe75f278cfeacbfe44ccb5b51be80c20663a81b3652deae86de97846e7d6108e4d0c5
-
Filesize
2.5MB
MD54ead4a4b4e149e200d3cd6c9d6a62a4c
SHA1fe8698ce8620b89fd5a6060af2e315ca747a19e8
SHA256e5ff3a0cb1813a62c7e0634187bc236825632fdc3ac6540a7636745aa723df5f
SHA512e4505c1c71797d22e1ec03029af1d6c1d0f7d87bc7e0b2475488c8bf9ed941457699681f98b642fdf943a06961f3b8b1d980222a96a9ffd5aafc4ed1ab9f9b6c
-
Filesize
2.5MB
MD54ead4a4b4e149e200d3cd6c9d6a62a4c
SHA1fe8698ce8620b89fd5a6060af2e315ca747a19e8
SHA256e5ff3a0cb1813a62c7e0634187bc236825632fdc3ac6540a7636745aa723df5f
SHA512e4505c1c71797d22e1ec03029af1d6c1d0f7d87bc7e0b2475488c8bf9ed941457699681f98b642fdf943a06961f3b8b1d980222a96a9ffd5aafc4ed1ab9f9b6c
-
Filesize
4.9MB
MD581518ac163c0a85f722b465553ccad0e
SHA161e99077b02ec61825ab2efd7a18fcb2b70203f4
SHA25601bf914fd0e58210c625e7acce3705a2218786ac31b10a2f34e66f31fa72e365
SHA5127faff2013d01569564aa873fc3a8b92234daa2f5d4e43d11469238a2ba7893283ea2c18434600eaa7ae5fcaf3178377a12e44e5b2a7f2877a44eefcbb0611c68
-
Filesize
4.9MB
MD581518ac163c0a85f722b465553ccad0e
SHA161e99077b02ec61825ab2efd7a18fcb2b70203f4
SHA25601bf914fd0e58210c625e7acce3705a2218786ac31b10a2f34e66f31fa72e365
SHA5127faff2013d01569564aa873fc3a8b92234daa2f5d4e43d11469238a2ba7893283ea2c18434600eaa7ae5fcaf3178377a12e44e5b2a7f2877a44eefcbb0611c68