Analysis
-
max time kernel
175s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
洛克王国火神辅助4.6/洛克王国火神辅助v4.6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
洛克王国火神辅助4.6/洛克王国火神辅助v4.6.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
洛克王国火神辅助4.6/游迅网.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
洛克王国火神辅助4.6/游迅网.url
Resource
win10v2004-20231222-en
General
-
Target
洛克王国火神辅助4.6/洛克王国火神辅助v4.6.exe
-
Size
5.7MB
-
MD5
ca30b48023517427895304a20b3473b3
-
SHA1
e7557a41c44e17b64ec97f0005a540f2300b3797
-
SHA256
894887e113fa2f8e25467c29bee11f5de5ffb3adc8adf4e949c3961311546a77
-
SHA512
33b99ecb9a3aeca82f142076259f4738a1b170a2ae482253af415d7deb547ba482accc83d7fade01b15202da89faea89ac56864b52468d086deddd75a2fb72a7
-
SSDEEP
98304:QLx2OfyJSL2MxE/9hOEkLhCiM+fnc1m+WIGLuzCIJMVM3esiJUiG5uGlKrybiJx:4UOKJY0/94Ekvdfb/IG6zlMVM3TsUvI8
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 洛克王国火神辅助v4.6.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Wine 洛克王国火神辅助v4.6.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5064 洛克王国火神辅助v4.6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 632 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5064 洛克王国火神辅助v4.6.exe 5064 洛克王国火神辅助v4.6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5064 洛克王国火神辅助v4.6.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5064 洛克王国火神辅助v4.6.exe 5064 洛克王国火神辅助v4.6.exe 5064 洛克王国火神辅助v4.6.exe 5064 洛克王国火神辅助v4.6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5064 wrote to memory of 632 5064 洛克王国火神辅助v4.6.exe 96 PID 5064 wrote to memory of 632 5064 洛克王国火神辅助v4.6.exe 96 PID 5064 wrote to memory of 632 5064 洛克王国火神辅助v4.6.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\洛克王国火神辅助4.6\洛克王国火神辅助v4.6.exe"C:\Users\Admin\AppData\Local\Temp\洛克王国火神辅助4.6\洛克王国火神辅助v4.6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v Hidden /t reg_dword /d 00000000 /f2⤵
- Modifies registry key
PID:632
-