Overview
overview
3Static
static
32006469339...ok.dll
windows7-x64
12006469339...ok.dll
windows10-2004-x64
12006469339...ket.js
windows7-x64
12006469339...ket.js
windows10-2004-x64
12006469339...et.exe
windows7-x64
12006469339...et.exe
windows10-2004-x64
12006469339...ket.js
windows7-x64
12006469339...ket.js
windows10-2004-x64
12006469339...ok.dll
windows7-x64
12006469339...ok.dll
windows10-2004-x64
12006469339...��.url
windows7-x64
12006469339...��.url
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
2006469339989/green/hook.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2006469339989/green/hook.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
2006469339989/green/main/greenpacket.js
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
2006469339989/green/main/greenpacket.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
2006469339989/green/main/greenpacket.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
2006469339989/green/main/greenpacket.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
2006469339989/green/main/greenpacket.js
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
2006469339989/green/main/greenpacket.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
2006469339989/green/main/hook.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
2006469339989/green/main/hook.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
2006469339989/新云软件.url
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
2006469339989/新云软件.url
Resource
win10v2004-20240226-en
General
-
Target
2006469339989/green/hook.dll
-
Size
375KB
-
MD5
fd99de6554e0d23d611a21d0aa6688db
-
SHA1
13f3acbbe5ba538bb982216189aec79c234ebcc2
-
SHA256
119d8b448698cbab512a18c9dbc09ca8355261732caf26de67f4efab460b617d
-
SHA512
cbaf58917ff09a839e9b00193ac7b43fa9af56608d5e7a642d021bf75c0e73d901c6eef7da242f1f7a5b5f584af65b646813a68852609075f409216c867a14e1
-
SSDEEP
6144:xoN84eftfFNhdDFhbIZs/mdn/FMdRwqyDMfvb0Na+XDejTucrkHLn22BLD:xoQl3DH0Zs/wtYRsMb0Na+Xbr2+
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 696 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1472 rundll32.exe 1472 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2424 wrote to memory of 1472 2424 rundll32.exe 91 PID 2424 wrote to memory of 1472 2424 rundll32.exe 91 PID 2424 wrote to memory of 1472 2424 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2006469339989\green\hook.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2006469339989\green\hook.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1472
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4368
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:696