Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
乡巴佬CS登录器V3.5 [测试].exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
乡巴佬CS登录器V3.5 [测试].exe
Resource
win10v2004-20240508-en
General
-
Target
乡巴佬CS登录器V3.5 [测试].exe
-
Size
1.9MB
-
MD5
c782a3edffde23f97403896a4e80ff81
-
SHA1
48d7ed6c5ebad5fed8bb1dda4c92288342bb83fb
-
SHA256
cb43d1edbb37c97b68b2a2eab066e4fa9f56ed04ae9a8d0e0ea1ba09273899b9
-
SHA512
2c8d3de2601226a2522cd89ee055e0b8beaf2b550b6e5f4ea9daa84b1751aa4c3318c65eeb9aef0eb8419fb0b83d247830d332bbe72d80736c8c4af47a85dbd7
-
SSDEEP
24576:ERGJvZko+Fheb9uxqsVBs77deWwUXGuBeYIXQ7deWwUXGujs1bZU2XX:RJvuo+FY8BEFIYo6Fja
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4752-9-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-8-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-0-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-5-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-41-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-42-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-40-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-38-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-35-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-34-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-29-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-27-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-26-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-23-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-21-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-19-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-17-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-11-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-4-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-1-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-31-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-15-0x0000000010000000-0x0000000010037000-memory.dmp upx behavioral2/memory/4752-13-0x0000000010000000-0x0000000010037000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
乡巴佬CS登录器V3.5 [测试].exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 乡巴佬CS登录器V3.5 [测试].exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
乡巴佬CS登录器V3.5 [测试].exedescription pid process Token: SeDebugPrivilege 4752 乡巴佬CS登录器V3.5 [测试].exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
乡巴佬CS登录器V3.5 [测试].exepid process 4752 乡巴佬CS登录器V3.5 [测试].exe 4752 乡巴佬CS登录器V3.5 [测试].exe 4752 乡巴佬CS登录器V3.5 [测试].exe