Overview
overview
10Static
static
1046d15d49c6...a7.rar
windows7-x64
346d15d49c6...a7.rar
windows10-2004-x64
3Resident E...er.exe
windows7-x64
1Resident E...er.exe
windows10-2004-x64
1dinput8.dll
windows7-x64
1dinput8.dll
windows10-2004-x64
5游侠网�...��.url
windows7-x64
1游侠网�...��.url
windows10-2004-x64
1游侠网�...��.url
windows7-x64
1游侠网�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
03-12-2023 16:35
Behavioral task
behavioral1
Sample
46d15d49c641f1a0645fbd011449ac4ae40f9c9b627e4544427d57650a8909a7.rar
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
46d15d49c641f1a0645fbd011449ac4ae40f9c9b627e4544427d57650a8909a7.rar
Resource
win10v2004-20231130-en
Behavioral task
behavioral3
Sample
Resident Evil 4 v1.0-v20230921 Plus 36 Trainer.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Resident Evil 4 v1.0-v20230921 Plus 36 Trainer.exe
Resource
win10v2004-20231127-en
Behavioral task
behavioral5
Sample
dinput8.dll
Resource
win7-20231201-en
Behavioral task
behavioral6
Sample
dinput8.dll
Resource
win10v2004-20231130-en
Behavioral task
behavioral7
Sample
游侠网最新单机游戏.url
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
游侠网最新单机游戏.url
Resource
win10v2004-20231127-en
Behavioral task
behavioral9
Sample
游侠网热门MOD补丁.url
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
游侠网热门MOD补丁.url
Resource
win10v2004-20231127-en
General
-
Target
46d15d49c641f1a0645fbd011449ac4ae40f9c9b627e4544427d57650a8909a7.rar
-
Size
4.8MB
-
MD5
444fcaf16556dd4c99077f901366cf71
-
SHA1
83fa5b4788cb54a28acacd2519a573779095be22
-
SHA256
46d15d49c641f1a0645fbd011449ac4ae40f9c9b627e4544427d57650a8909a7
-
SHA512
a181844a594c755024f05d19b805544403d7a26b80a88035bb74ecbffe6b8b079a07725b63e6a8852af7a37cfc274721d3bd3d658ea84ae9bcfa01a37510ef96
-
SSDEEP
98304:mGRVHiQmDhlDtuHndJwYeY50qpcF5kjawyPkO4XgPULxuJdgAsxKYxLlwJ:DjiQmDDDgHnsYeI0quFEa948X3gt/E
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2724 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 vlc.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe 2724 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2724 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2936 1704 cmd.exe 29 PID 1704 wrote to memory of 2936 1704 cmd.exe 29 PID 1704 wrote to memory of 2936 1704 cmd.exe 29 PID 2936 wrote to memory of 2724 2936 rundll32.exe 30 PID 2936 wrote to memory of 2724 2936 rundll32.exe 30 PID 2936 wrote to memory of 2724 2936 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\46d15d49c641f1a0645fbd011449ac4ae40f9c9b627e4544427d57650a8909a7.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\46d15d49c641f1a0645fbd011449ac4ae40f9c9b627e4544427d57650a8909a7.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\46d15d49c641f1a0645fbd011449ac4ae40f9c9b627e4544427d57650a8909a7.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2724
-
-