Overview
overview
7Static
static
3Keymaker/keygen.exe
windows7-x64
1Keymaker/keygen.exe
windows10-2004-x64
1Keymaker/�...��.url
windows7-x64
1Keymaker/�...��.url
windows10-2004-x64
1VirtGuard_...ll.exe
windows7-x64
3VirtGuard_...ll.exe
windows10-2004-x64
3$SYSDIR/DR...io.sys
windows7-x64
1$SYSDIR/DR...io.sys
windows10-2004-x64
1$SYSDIR/DR...ll.exe
windows7-x64
7$SYSDIR/DR...ll.exe
windows10-2004-x64
7$SYSDIR/Dlportio.dll
windows7-x64
1$SYSDIR/Dlportio.dll
windows10-2004-x64
1Help.chm
windows7-x64
1Help.chm
windows10-2004-x64
1VirtGuard.exe
windows7-x64
1VirtGuard.exe
windows10-2004-x64
3新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
Keymaker/keygen.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Keymaker/keygen.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Keymaker/新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Keymaker/新云软件.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
VirtGuard_2.02_install.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
VirtGuard_2.02_install.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$SYSDIR/DRIVERS/Dlportio.sys
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$SYSDIR/DRIVERS/Dlportio.sys
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
$SYSDIR/DRIVERS/uninstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$SYSDIR/DRIVERS/uninstall.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$SYSDIR/Dlportio.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$SYSDIR/Dlportio.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Help.chm
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
Help.chm
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
VirtGuard.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
VirtGuard.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
新云软件.url
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
新云软件.url
Resource
win10v2004-20231222-en
General
-
Target
$SYSDIR/DRIVERS/uninstall.exe
-
Size
59KB
-
MD5
9af28cabb18f22e2054bcda0f418d780
-
SHA1
94b5fce50b61e2825bd74d2cb8652038dd07dce6
-
SHA256
fe67c7ba7608f31feba0aac8516c78d211799bc8da04a5019d98cb62ff60379e
-
SHA512
fed04301247de5f115bf8bf54fbae5d3e1d12d592210d4dddcf3d473a0d57f911a29315947e24cbe6e9f83e8081dec75eaa9b1696ecd02b49b3f5ba33d5fa24b
-
SSDEEP
768:U+iHFs9gnqRoKDqZqc4VSH8fl9FcelELFS6sWkJLmn5u7POsknFOxZk617GOPb:nQyLzDD+6Rl8kJLm5u7WskF2k6YOz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4888 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 4888 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral10/files/0x000600000002321c-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3824 wrote to memory of 4888 3824 uninstall.exe 87 PID 3824 wrote to memory of 4888 3824 uninstall.exe 87 PID 3824 wrote to memory of 4888 3824 uninstall.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\$SYSDIR\DRIVERS\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\$SYSDIR\DRIVERS\uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$SYSDIR\DRIVERS\2⤵
- Deletes itself
- Executes dropped EXE
PID:4888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD59af28cabb18f22e2054bcda0f418d780
SHA194b5fce50b61e2825bd74d2cb8652038dd07dce6
SHA256fe67c7ba7608f31feba0aac8516c78d211799bc8da04a5019d98cb62ff60379e
SHA512fed04301247de5f115bf8bf54fbae5d3e1d12d592210d4dddcf3d473a0d57f911a29315947e24cbe6e9f83e8081dec75eaa9b1696ecd02b49b3f5ba33d5fa24b