Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
机甲旋风时空辅助VSP92/更多软件下载.url
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
机甲旋风时空辅助VSP92/更多软件下载.url
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
机甲旋风时空辅助VSP92/机甲时空辅助VSP92(兼容window10版).exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
机甲旋风时空辅助VSP92/机甲时空辅助VSP92(兼容window10版).exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
机甲旋风时空辅助VSP92/飘荡软件.url
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
机甲旋风时空辅助VSP92/飘荡软件.url
Resource
win10v2004-20240419-en
General
-
Target
机甲旋风时空辅助VSP92/机甲时空辅助VSP92(兼容window10版).exe
-
Size
2.5MB
-
MD5
c64578d896d7e61e89cde21981696112
-
SHA1
ff0a5659fc396a4fde4b6db33a2f9bcb619852dd
-
SHA256
266579efe096461ea44189354833bbc2687acb3a6428632bb38c72b438a23e02
-
SHA512
6ecee0a63f9b7da7ce02424105acaa19db2a3201335306d2e129263cceb11726efa15dd88c43125cb74bc7a963f4ea15ff5edacdf2e9312fde524defe763e7fd
-
SSDEEP
49152:Ldfj44GlEIyK6vG7/+s8KuqGaX0ToIBAUZLYjO+:JU4GltrEGIJBAUZL
Malware Config
Signatures
-
resource yara_rule behavioral3/memory/820-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/820-52-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 820 机甲时空辅助VSP92(兼容window10版).exe 820 机甲时空辅助VSP92(兼容window10版).exe 820 机甲时空辅助VSP92(兼容window10版).exe 820 机甲时空辅助VSP92(兼容window10版).exe