Overview
overview
7Static
static
74399生死...��.exe
windows7-x64
14399生死...��.exe
windows10-2004-x64
14399生死...ir.dll
windows7-x64
14399生死...ir.dll
windows10-2004-x64
14399生死...30.dll
windows7-x64
54399生死...30.dll
windows10-2004-x64
54399生死...jj.exe
windows7-x64
14399生死...jj.exe
windows10-2004-x64
14399生死...nt.dll
windows7-x64
14399生死...nt.dll
windows10-2004-x64
1使用说明.url
windows7-x64
1使用说明.url
windows10-2004-x64
1极速软�...��.url
windows7-x64
1极速软�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 15:15
Behavioral task
behavioral1
Sample
4399生死狙击刷金币修改器/4399生死狙击刷金币修改器.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4399生死狙击刷金币修改器/4399生死狙击刷金币修改器.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
4399生死狙击刷金币修改器/s_ju/asmls/Dir.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
4399生死狙击刷金币修改器/s_ju/asmls/Dir.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
4399生死狙击刷金币修改器/s_ju/asmls/Dnz_30.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
4399生死狙击刷金币修改器/s_ju/asmls/Dnz_30.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
4399生死狙击刷金币修改器/s_ju/asmls/need/ssjj.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
4399生死狙击刷金币修改器/s_ju/asmls/need/ssjj.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4399生死狙击刷金币修改器/s_ju/down_01/Basement.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
4399生死狙击刷金币修改器/s_ju/down_01/Basement.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
使用说明.url
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
使用说明.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
极速软件下载.url
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
极速软件下载.url
Resource
win10v2004-20240508-en
General
-
Target
4399生死狙击刷金币修改器/s_ju/asmls/Dir.dll
-
Size
1.6MB
-
MD5
40bfa995641da2a9bd2b97d30b18f316
-
SHA1
d3fb19ec952bdf9009442de1f0d60b9e424fbc5f
-
SHA256
d0955a3a228f652f14f679f66bd0be4d2dbe94620d511065bb97394100f1736f
-
SHA512
f094e5a76ecca32954908e2662f30104842279f9db92cd24fef91afb42e7abcd2f0c9b51f90f6474883af4a57ba26d99ff9034dc1f4ee3023576ea4d4521a892
-
SSDEEP
24576:ZqElV8RQZDKuxuyLw75ZmOolv+Nm8E2LAnj:n8RQ//2DEBj
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2900 2872 rundll32.exe 28 PID 2872 wrote to memory of 2900 2872 rundll32.exe 28 PID 2872 wrote to memory of 2900 2872 rundll32.exe 28 PID 2872 wrote to memory of 2900 2872 rundll32.exe 28 PID 2872 wrote to memory of 2900 2872 rundll32.exe 28 PID 2872 wrote to memory of 2900 2872 rundll32.exe 28 PID 2872 wrote to memory of 2900 2872 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4399生死狙击刷金币修改器\s_ju\asmls\Dir.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4399生死狙击刷金币修改器\s_ju\asmls\Dir.dll,#12⤵PID:2900
-