Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 13:30
Behavioral task
behavioral1
Sample
QQ聊天精灵V1.0/QQ聊天精灵V1.0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
QQ聊天精灵V1.0/QQ聊天精灵V1.0.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
QQ聊天精灵V1.0/SkinH_EL.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
QQ聊天精灵V1.0/SkinH_EL.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
QQ聊天精灵V1.0/新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
QQ聊天精灵V1.0/新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
QQ聊天精灵V1.0/SkinH_EL.dll
-
Size
86KB
-
MD5
147127382e001f495d1842ee7a9e7912
-
SHA1
92d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
-
SHA256
edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
-
SHA512
97f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d
-
SSDEEP
1536:s5Np2dgZgIehUUS3E1Ujmrvl179D53UWnGQRJZiXRmrCnKptnouy8K:s5Np2dlUX0+Cx17F8QRJZKmOK3outK
Malware Config
Signatures
-
resource yara_rule behavioral4/memory/4864-1-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/4864-3-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/4864-2-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/4864-0-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2088 4864 WerFault.exe 16 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4864 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1900 wrote to memory of 4864 1900 rundll32.exe 16 PID 1900 wrote to memory of 4864 1900 rundll32.exe 16 PID 1900 wrote to memory of 4864 1900 rundll32.exe 16
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\QQ聊天精灵V1.0\SkinH_EL.dll,#11⤵
- Suspicious use of SetWindowsHookEx
PID:4864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 6442⤵
- Program crash
PID:2088
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\QQ聊天精灵V1.0\SkinH_EL.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4864 -ip 48641⤵PID:4604