Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
FlashSaver_5b8_WestKing_HA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
FlashSaver_5b8_WestKing_HA.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
非常世纪资源网.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
非常世纪资源网.url
Resource
win10v2004-20231222-en
General
-
Target
FlashSaver_5b8_WestKing_HA.exe
-
Size
2.8MB
-
MD5
91bb9d4ee13cf8207e1dad465b58a7e9
-
SHA1
b0615d9f6d8abe59c3ec718443a85da4159be5e8
-
SHA256
5eb04636520f3c18ee20f3592741c80cf20a65be796addde6a47e7f60f3cd58a
-
SHA512
6682b2a7f07ebbeaf7f9e2cf51a7d0911caccfd307b95a433b0f453f2dcde9192c2d8432c2fa86d3826c50873efbdba559c328859d9c260d59d2b47a1512a4a1
-
SSDEEP
49152:B6dWEGdUgUa5jjbSFRqK7qF1GSjyKSNXd1mIj2q4vXaMqpmpbbp49YbOH6:kdAtdtXSFRbqnGKFRDGmR4YbU6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2208 is-0ADV6.tmp -
Loads dropped DLL 3 IoCs
pid Process 1716 FlashSaver_5b8_WestKing_HA.exe 2208 is-0ADV6.tmp 2208 is-0ADV6.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2208 is-0ADV6.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2208 1716 FlashSaver_5b8_WestKing_HA.exe 15 PID 1716 wrote to memory of 2208 1716 FlashSaver_5b8_WestKing_HA.exe 15 PID 1716 wrote to memory of 2208 1716 FlashSaver_5b8_WestKing_HA.exe 15 PID 1716 wrote to memory of 2208 1716 FlashSaver_5b8_WestKing_HA.exe 15 PID 1716 wrote to memory of 2208 1716 FlashSaver_5b8_WestKing_HA.exe 15 PID 1716 wrote to memory of 2208 1716 FlashSaver_5b8_WestKing_HA.exe 15 PID 1716 wrote to memory of 2208 1716 FlashSaver_5b8_WestKing_HA.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\FlashSaver_5b8_WestKing_HA.exe"C:\Users\Admin\AppData\Local\Temp\FlashSaver_5b8_WestKing_HA.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\is-E1ER5.tmp\is-0ADV6.tmp"C:\Users\Admin\AppData\Local\Temp\is-E1ER5.tmp\is-0ADV6.tmp" /SL4 $40150 "C:\Users\Admin\AppData\Local\Temp\FlashSaver_5b8_WestKing_HA.exe" 2745568 481282⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2208
-