Overview
overview
7Static
static
3黑客风�...33.bat
windows7-x64
3黑客风�...33.bat
windows10-2004-x64
7黑客风�...��.url
windows7-x64
1黑客风�...��.url
windows10-2004-x64
1黑客风�.../s.exe
windows7-x64
3黑客风�.../s.exe
windows10-2004-x64
3黑客风�...ip.exe
windows7-x64
1黑客风�...ip.exe
windows10-2004-x64
1黑客风�...��.exe
windows7-x64
1黑客风�...��.exe
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
黑客风云全套抓鸡工具/1433.bat
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
黑客风云全套抓鸡工具/1433.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
黑客风云全套抓鸡工具/173绿色软件.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
黑客风云全套抓鸡工具/173绿色软件.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
黑客风云全套抓鸡工具/s.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
黑客风云全套抓鸡工具/s.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
黑客风云全套抓鸡工具/vip.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
黑客风云全套抓鸡工具/vip.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
黑客风云全套抓鸡工具/黑客风云全套抓鸡工具(国庆版).exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
黑客风云全套抓鸡工具/黑客风云全套抓鸡工具(国庆版).exe
Resource
win10v2004-20231215-en
General
-
Target
黑客风云全套抓鸡工具/1433.bat
-
Size
1KB
-
MD5
8bb50b97954e49897d35746fe4a70e99
-
SHA1
3ee42ada95d8e490472fe35b670495b1fad3043a
-
SHA256
900aafbff9329e46eea707a49170c4bff998a9741fcd37e0b438cffcb8f57f29
-
SHA512
48f64c49ea3a7b1910b9f4a62a7350d0f4b175c9b4e41bc12f6a2445faf45e9b4b4196ea846db07f77c1aa437d455617ad60914a389fc66c0aa6e87db3f1e516
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1464 1812 cmd.exe 89 PID 1812 wrote to memory of 1464 1812 cmd.exe 89
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\黑客风云全套抓鸡工具\1433.bat"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\黑客风云全套抓鸡工具\ip.txt2⤵PID:1464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54B
MD5a98106ecbf85347e426d43d63f71ba18
SHA1447d8b07cc2babd20d63bb63191adf99a19df3f5
SHA256e8d6cb43c55b5bf44a4973a3b9483dd8a2187d9af7d45afb10d0628f8e83d42d
SHA5129bd0e82ef83a6c19ff1e4616dddf62fd990a4cf4eb3d94d4f3de8fbc42ea923e9238552d347e109ebf4bf119dfebb490b668cb3301a6a0e5b71ccaea9b593bfc