Analysis
-
max time kernel
158s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 18:19
Behavioral task
behavioral1
Sample
QQ大家来找茬外挂加强版V2.03.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
QQ大家来找茬外挂加强版V2.03.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
patch.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
patch.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
新云软件.url
Resource
win10v2004-20231222-en
General
-
Target
QQ大家来找茬外挂加强版V2.03.exe
-
Size
601KB
-
MD5
27cea473b56c0fecebc4d4756fb64d5b
-
SHA1
bfd04ca59e2a8e1f938ef9b3eb72e0f8e7e553c2
-
SHA256
8270751e48530dcf26bd4626472cc2ecf239b35764e780cb492a580c9214c280
-
SHA512
41fff7006ef008e7e8f3fd8f667b6ce24972aa1e49ecc5cdbe2e3a0875aab614d9757e79ed25f2f13ecce53ff3cab0f2e366bb5d5f93f161c85ef7da30c31c3f
-
SSDEEP
12288:t/jw08DCjKsuZ59obRC56BSDaqeKCXzlAQGFPdLM2AXOIwPm9:ZTjuj9obRC5oSDaPzlh49AqS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5012-0-0x0000000000400000-0x0000000000509000-memory.dmp upx behavioral2/memory/5012-1-0x0000000000400000-0x0000000000509000-memory.dmp upx behavioral2/memory/5012-4-0x0000000000400000-0x0000000000509000-memory.dmp upx behavioral2/memory/5012-5-0x0000000000400000-0x0000000000509000-memory.dmp upx behavioral2/memory/5012-6-0x0000000000400000-0x0000000000509000-memory.dmp upx behavioral2/memory/5012-7-0x0000000000400000-0x0000000000509000-memory.dmp upx behavioral2/memory/5012-30-0x0000000000400000-0x0000000000509000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 1596 msedge.exe 1596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5012 wrote to memory of 1596 5012 QQ大家来找茬外挂加强版V2.03.exe 95 PID 5012 wrote to memory of 1596 5012 QQ大家来找茬外挂加强版V2.03.exe 95 PID 1596 wrote to memory of 1068 1596 msedge.exe 96 PID 1596 wrote to memory of 1068 1596 msedge.exe 96 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 3596 1596 msedge.exe 98 PID 1596 wrote to memory of 1560 1596 msedge.exe 99 PID 1596 wrote to memory of 1560 1596 msedge.exe 99 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100 PID 1596 wrote to memory of 1308 1596 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\QQ大家来找茬外挂加强版V2.03.exe"C:\Users\Admin\AppData\Local\Temp\QQ大家来找茬外挂加强版V2.03.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://qqgame.qq.com/download.html2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8fa646f8,0x7ffd8fa64708,0x7ffd8fa647183⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1688140453106952930,4668330951307517191,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:23⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,1688140453106952930,4668330951307517191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,1688140453106952930,4668330951307517191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:83⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1688140453106952930,4668330951307517191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:13⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1688140453106952930,4668330951307517191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:13⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1688140453106952930,4668330951307517191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:13⤵PID:4728
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5778b1ad2ea73213a8c21d6c354c6863f
SHA17760ab6173185a9051002f9ca5a750947c8e88ed
SHA256a2ca53e0c148e2aeb282f86eeaab6d2f1db2254a2cc1e0df822aecdd70776aea
SHA51289a6d0b1be7638eefd359652281cf53944826101d21e5aec1294546459175bce3ff81de336e3b2cb22a0da5f9d1b9e48c1151403cb7f85fabceac8fe6b4f2b09
-
Filesize
5KB
MD54c55c3ed58082a2b8b6a6909050c5e07
SHA1fbc9d7686db73f69cdd47bbd036a5a2c5b999963
SHA256b67ae1b8482a513229cb24786d4454852838024891958ae642635e651a1595b7
SHA512321ddf556761667db9985fd519f2d8ba6ef46795ec4ac027298ecd6f8126e189bafd009b3837d81c66d214214a88b8f41bc337332726286b3292cdf1d4ecd224
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c686074c-3ead-4282-aa28-71503ad67b50.tmp
Filesize111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
10KB
MD52dc0b99004b8603e4eb7eb2e6381c50a
SHA1886519ce8d1df60ea09ee0e531ad97171e80551a
SHA256f56a49120828506c6706fc389c9697814491e4b9407a9f7da9e19fb5c8800f15
SHA51222029a58547121c9e1eb570d6ea74ce36222865e554b872d6dae93f3881ec46b87859a5eba11704cf86778aa492237ebf85570cfffe70ee8a961ffa09a6a5dd2