Overview
overview
3Static
static
3啊哈C/SciLexer.dll
windows7-x64
3啊哈C/SciLexer.dll
windows10-2004-x64
1啊哈C/aha-c.exe
windows7-x64
1啊哈C/aha-c.exe
windows10-2004-x64
1啊哈C/co...=m.exe
windows7-x64
1啊哈C/co...=m.exe
windows10-2004-x64
1啊哈C/co...ne.exe
windows7-x64
1啊哈C/co...ne.exe
windows10-2004-x64
1啊哈C/co...ar.exe
windows7-x64
1啊哈C/co...ar.exe
windows10-2004-x64
1啊哈C/co...as.exe
windows7-x64
1啊哈C/co...as.exe
windows10-2004-x64
1啊哈C/co...++.exe
windows7-x64
1啊哈C/co...++.exe
windows10-2004-x64
1啊哈C/co...lt.exe
windows7-x64
1啊哈C/co...lt.exe
windows10-2004-x64
1啊哈C/co...pp.exe
windows7-x64
1啊哈C/co...pp.exe
windows10-2004-x64
1啊哈C/co...ol.exe
windows7-x64
1啊哈C/co...ol.exe
windows10-2004-x64
1啊哈C/co...ap.exe
windows7-x64
1啊哈C/co...ap.exe
windows10-2004-x64
1啊哈C/co...++.exe
windows7-x64
1啊哈C/co...++.exe
windows10-2004-x64
1啊哈C/co...cc.exe
windows7-x64
1啊哈C/co...cc.exe
windows10-2004-x64
1啊哈C/co...gccbug
ubuntu-18.04-amd64
3啊哈C/co...gccbug
debian-9-armhf
1啊哈C/co...gccbug
debian-9-mips
1啊哈C/co...gccbug
debian-9-mipsel
1啊哈C/co...ov.exe
windows7-x64
1啊哈C/co...ov.exe
windows10-2004-x64
1Analysis
-
max time kernel
14s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
啊哈C/SciLexer.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
啊哈C/SciLexer.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
啊哈C/aha-c.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
啊哈C/aha-c.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
啊哈C/core/bin/--library=m.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
啊哈C/core/bin/--library=m.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
啊哈C/core/bin/addr2line.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
啊哈C/core/bin/addr2line.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
啊哈C/core/bin/ar.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
啊哈C/core/bin/ar.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
啊哈C/core/bin/as.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
啊哈C/core/bin/as.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
啊哈C/core/bin/c++.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
啊哈C/core/bin/c++.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
啊哈C/core/bin/c++filt.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
啊哈C/core/bin/c++filt.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
啊哈C/core/bin/cpp.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
啊哈C/core/bin/cpp.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
啊哈C/core/bin/dlltool.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
啊哈C/core/bin/dlltool.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
啊哈C/core/bin/dllwrap.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
啊哈C/core/bin/dllwrap.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
啊哈C/core/bin/g++.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
啊哈C/core/bin/g++.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
啊哈C/core/bin/gcc.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
啊哈C/core/bin/gcc.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
啊哈C/core/bin/gccbug
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral28
Sample
啊哈C/core/bin/gccbug
Resource
debian9-armhf-20231222-en
Behavioral task
behavioral29
Sample
啊哈C/core/bin/gccbug
Resource
debian9-mipsbe-20231222-en
Behavioral task
behavioral30
Sample
啊哈C/core/bin/gccbug
Resource
debian9-mipsel-20231222-en
Behavioral task
behavioral31
Sample
啊哈C/core/bin/gcov.exe
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
啊哈C/core/bin/gcov.exe
Resource
win10v2004-20231215-en
General
-
Target
啊哈C/core/bin/--library=m.exe
-
Size
16KB
-
MD5
f93784f1055cd1d04b312e45ab9072a6
-
SHA1
6a2249157f6592704fd2095af4c3c9146b8e5401
-
SHA256
bf772c64a2a4ab415f52ae696bea0aacb1a94d125a59b4361287cd28c10dc805
-
SHA512
5c3ed6da41fab9ddff9cf5032de911541fd4681f8fc06db37c60f2e8a1d0b6ae6819e5010077e43f67cabd859af7a4ae55286a5eb1a0739d8f53c987bbe2dd47
-
SSDEEP
192:R/aHhiBQsGF3+qmuYO3ck4/kjyFSrncCD5:RkFuqmj+ck4MeMrnr9
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1472 wrote to memory of 4056 1472 --library=m.exe 17 PID 1472 wrote to memory of 4056 1472 --library=m.exe 17 PID 1472 wrote to memory of 4056 1472 --library=m.exe 17 PID 1472 wrote to memory of 4044 1472 --library=m.exe 40 PID 1472 wrote to memory of 4044 1472 --library=m.exe 40 PID 1472 wrote to memory of 4044 1472 --library=m.exe 40 PID 1472 wrote to memory of 5064 1472 --library=m.exe 126 PID 1472 wrote to memory of 5064 1472 --library=m.exe 126 PID 1472 wrote to memory of 5064 1472 --library=m.exe 126 PID 1472 wrote to memory of 4980 1472 --library=m.exe 86 PID 1472 wrote to memory of 4980 1472 --library=m.exe 86 PID 1472 wrote to memory of 4980 1472 --library=m.exe 86 PID 1472 wrote to memory of 3488 1472 --library=m.exe 99 PID 1472 wrote to memory of 3488 1472 --library=m.exe 99 PID 1472 wrote to memory of 3488 1472 --library=m.exe 99 PID 1472 wrote to memory of 2832 1472 --library=m.exe 100 PID 1472 wrote to memory of 2832 1472 --library=m.exe 100 PID 1472 wrote to memory of 2832 1472 --library=m.exe 100 PID 1472 wrote to memory of 5076 1472 --library=m.exe 101 PID 1472 wrote to memory of 5076 1472 --library=m.exe 101 PID 1472 wrote to memory of 5076 1472 --library=m.exe 101 PID 1472 wrote to memory of 2360 1472 --library=m.exe 103 PID 1472 wrote to memory of 2360 1472 --library=m.exe 103 PID 1472 wrote to memory of 2360 1472 --library=m.exe 103 PID 1472 wrote to memory of 2624 1472 --library=m.exe 104 PID 1472 wrote to memory of 2624 1472 --library=m.exe 104 PID 1472 wrote to memory of 2624 1472 --library=m.exe 104 PID 1472 wrote to memory of 4420 1472 --library=m.exe 105 PID 1472 wrote to memory of 4420 1472 --library=m.exe 105 PID 1472 wrote to memory of 4420 1472 --library=m.exe 105 PID 1472 wrote to memory of 3600 1472 --library=m.exe 108 PID 1472 wrote to memory of 3600 1472 --library=m.exe 108 PID 1472 wrote to memory of 3600 1472 --library=m.exe 108 PID 1472 wrote to memory of 4152 1472 --library=m.exe 173 PID 1472 wrote to memory of 4152 1472 --library=m.exe 173 PID 1472 wrote to memory of 4152 1472 --library=m.exe 173 PID 1472 wrote to memory of 116 1472 --library=m.exe 158 PID 1472 wrote to memory of 116 1472 --library=m.exe 158 PID 1472 wrote to memory of 116 1472 --library=m.exe 158 PID 1472 wrote to memory of 1088 1472 --library=m.exe 111 PID 1472 wrote to memory of 1088 1472 --library=m.exe 111 PID 1472 wrote to memory of 1088 1472 --library=m.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\啊哈C\core\bin\--library=m.exe"C:\Users\Admin\AppData\Local\Temp\啊哈C\core\bin\--library=m.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c color 132⤵PID:4056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:5064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:5076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:5068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3332
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:5032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2180
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3332
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:5112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:4324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1880
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv G181AmjnNku2iGFx1zzX8Q.0.21⤵PID:5064