Overview
overview
10Static
static
10YY5331过�...ok.dll
windows7-x64
1YY5331过�...ok.dll
windows10-2004-x64
1YY5331过�...er.exe
windows7-x64
1YY5331过�...er.exe
windows10-2004-x64
1YY5331过�...al.exe
windows7-x64
1YY5331过�...al.exe
windows10-2004-x64
1YY5331过�...ne.exe
windows7-x64
7YY5331过�...ne.exe
windows10-2004-x64
7YY5331过�...31.dll
windows7-x64
7YY5331过�...31.dll
windows10-2004-x64
7YY5331过�...32.dll
windows7-x64
1YY5331过�...32.dll
windows10-2004-x64
1YY5331过�...32.sys
windows7-x64
1YY5331过�...32.sys
windows10-2004-x64
1YY5331过�...ll.dll
windows7-x64
1YY5331过�...ll.dll
windows10-2004-x64
1YY5331过�...ss.exe
windows7-x64
1YY5331过�...ss.exe
windows10-2004-x64
1YY5331过�...��.exe
windows7-x64
1YY5331过�...��.exe
windows10-2004-x64
1Analysis
-
max time kernel
157s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 09:05
Behavioral task
behavioral1
Sample
YY5331过非法VE/DAHook.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
YY5331过非法VE/DAHook.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
YY5331过非法VE/SysCallRetriever.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
YY5331过非法VE/SysCallRetriever.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
YY5331过非法VE/SysCallSignal.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
YY5331过非法VE/SysCallSignal.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
YY5331过非法VE/Vzla Engine.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
YY5331过非法VE/Vzla Engine.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
YY5331过非法VE/dak31.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
YY5331过非法VE/dak31.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
YY5331过非法VE/dak32.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
YY5331过非法VE/dak32.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
YY5331过非法VE/dak32.sys
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
YY5331过非法VE/dak32.sys
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
YY5331过非法VE/emptydll.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
YY5331过非法VE/emptydll.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
YY5331过非法VE/emptyprocess.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
YY5331过非法VE/emptyprocess.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
YY5331过非法VE/腾讯游戏过非法.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
YY5331过非法VE/腾讯游戏过非法.exe
Resource
win10v2004-20231215-en
General
-
Target
YY5331过非法VE/Vzla Engine.exe
-
Size
2.3MB
-
MD5
e9b474c85cf7783fbd41e8411844cac5
-
SHA1
1af729aa53eed933fecc77ee5633ff4aae61371b
-
SHA256
f1dbbe9ba61a7e03dcb263b3444a3ccaeabe165cda937864772ecd1e8c5771b7
-
SHA512
4dc75d9e10551cf801cdae469bf5f42cd1907cfe43a993695d35456d564a9c7ae138df284445987ac4de237925fcad8fdcdf8c52cddbcd182e72a11b7a2aceb8
-
SSDEEP
24576:UVXRfLOKgZDB21NmRPqx+1Ceg0bedstbvCz0qcWyth+Ybx12raCTb7Yt8NFmQaak:UVXmuHsg0bnU4krawb7Yt8NFmQJAa
Malware Config
Signatures
-
resource yara_rule behavioral7/memory/2820-0-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-2-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-3-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-4-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-5-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-6-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-8-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-10-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-12-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-14-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-17-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-19-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-32-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-35-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-37-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-39-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-30-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-49-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-47-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-45-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-43-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-41-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-28-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-26-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-24-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-22-0x0000000000350000-0x000000000038D000-memory.dmp upx behavioral7/memory/2820-53-0x0000000000350000-0x000000000038D000-memory.dmp upx -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CT\shell Vzla Engine.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CT\shell\open Vzla Engine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.CT\shell\open\command\preCE Vzla Engine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.CT\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\YY5331???VE\\Vzla Engine.exe \"%1\"" Vzla Engine.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CT\shell\open\command Vzla Engine.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CT Vzla Engine.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CT\DefaultIcon Vzla Engine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.CT\DefaultIcon\preCE Vzla Engine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.CT\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\YY5331???VE\\Vzla Engine.exe,0" Vzla Engine.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2820 Vzla Engine.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2820 Vzla Engine.exe