Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2024, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
csrss.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
csrss.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
eylogin.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
eylogin.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
数码资源网.url
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
数码资源网.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
日死362.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
日死362.exe
Resource
win10v2004-20240226-en
General
-
Target
日死362.exe
-
Size
964KB
-
MD5
08e4a9acbd735abb0945092788511453
-
SHA1
ab92e2648c661362b2637b370bc14fbf63967bb3
-
SHA256
62c019b24e99e40cff36e9801eaadb52b35f54e93d6bb612189dabdad7893a6f
-
SHA512
216fcc78fdc3814667b72410c634ea185895c234053c62b1f974b806c61dd01a067c915be11f3025f940a65d28766c1bfb36aaa30168b8ff24d324206f9ccf3b
-
SSDEEP
12288:t94btYomXRZGcQicUG7sC130shUV7FSkynMTx+PqxNgoSHpw1:tdfXbG9UusCqshUV7FSkzxARpw1
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 3184 日死362.exe 3184 日死362.exe 3184 日死362.exe 3184 日死362.exe -
resource yara_rule behavioral8/memory/3184-1-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-0-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-3-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-2-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-6-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-10-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-8-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-12-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-14-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-16-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-18-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-21-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-24-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-26-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-28-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-30-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-32-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-34-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-36-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-38-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-40-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-42-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-44-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-46-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral8/memory/3184-67-0x0000000010000000-0x000000001003C000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ESPI11.dll 日死362.exe File opened for modification C:\Windows\SysWOW64\ESPI11.dll 日死362.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3184 日死362.exe 3184 日死362.exe 3184 日死362.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3184 wrote to memory of 4720 3184 日死362.exe 91 PID 3184 wrote to memory of 4720 3184 日死362.exe 91 PID 3184 wrote to memory of 4720 3184 日死362.exe 91
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5b4c2caaa15d4e505ad2858ab15eafb58
SHA1a1c30a4d016f1c6bd3bf50e36767af8af166d59b
SHA25693e03eadd330242f2394c15cd32857194e5b80f6300835ef77f8558ca70a2ef1
SHA51209b5903a579685522a521cec3b6026ab0d7b9cff3099f032254dbd2b48fbbdd9a7411c0765049784c64f520d41916e681cae206a736b4fab1868f449e84b4bf2