Overview
overview
10Static
static
7cfsamdsfzr...��.exe
windows7-x64
10cfsamdsfzr...��.exe
windows10-2004-x64
cfsamdsfzr...yg.dll
windows7-x64
10cfsamdsfzr...yg.dll
windows10-2004-x64
10cfsamdsfzr...��.exe
windows7-x64
7cfsamdsfzr...��.exe
windows10-2004-x64
7cfsamdsfzr...��.bat
windows7-x64
1cfsamdsfzr...��.bat
windows10-2004-x64
1Analysis
-
max time kernel
1s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 11:58
Behavioral task
behavioral1
Sample
cfsamdsfzrej_gr/LOL意哥破解版/LOL意哥全能辅助.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cfsamdsfzrej_gr/LOL意哥破解版/LOL意哥全能辅助.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
cfsamdsfzrej_gr/LOL意哥破解版/lolyg.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
cfsamdsfzrej_gr/LOL意哥破解版/lolyg.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
cfsamdsfzrej_gr/LOL意哥破解版/娇滴滴破解.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
cfsamdsfzrej_gr/LOL意哥破解版/娇滴滴破解.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
cfsamdsfzrej_gr/LOL意哥破解版/插件注册失败打开.bat
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
cfsamdsfzrej_gr/LOL意哥破解版/插件注册失败打开.bat
Resource
win10v2004-20240426-en
Errors
General
-
Target
cfsamdsfzrej_gr/LOL意哥破解版/LOL意哥全能辅助.exe
-
Size
11.4MB
-
MD5
023a521e6cd4e539da30086da993176c
-
SHA1
1f33591e1fe3b5e5daabf903ab44ba52b5f302a1
-
SHA256
fc1125bc588065dfeb94e20bf41ff25db7bd812c8a1b964087f239489ca976f4
-
SHA512
1e2b2a31862587f1ca94149ccd9466fe04bd2b06344866ea9b1c1068a38dc7daec0c668d0558abbffc955d8ab8af5b242f81073fd3508d07249006bb3d81fba9
-
SSDEEP
196608:l7vzAIaW9+1lFgJklVv5CjCDFDADZTIj3FFMAIw+w9GqjYoj0yoXe3:lbzAtWWlFO2AjCD1ADZTIj3IAIw+w9GY
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2360-3-0x0000000000400000-0x0000000001BF0000-memory.dmp family_blackmoon behavioral2/memory/2360-51-0x0000000000400000-0x0000000001BF0000-memory.dmp family_blackmoon behavioral2/memory/2360-55-0x0000000000400000-0x0000000001BF0000-memory.dmp family_blackmoon behavioral2/memory/2360-53-0x0000000000400000-0x0000000001BF0000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral2/memory/2360-42-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-46-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-40-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-50-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-48-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-44-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-38-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-34-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-30-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-28-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-26-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-25-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-22-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-20-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-18-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-16-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-14-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-12-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-10-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-54-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-9-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-8-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-36-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx behavioral2/memory/2360-32-0x0000000003D10000-0x0000000003D4F000-memory.dmp upx -
Processes:
resource yara_rule behavioral2/memory/2360-0-0x0000000000400000-0x0000000001BF0000-memory.dmp vmprotect behavioral2/memory/2360-3-0x0000000000400000-0x0000000001BF0000-memory.dmp vmprotect behavioral2/memory/2360-51-0x0000000000400000-0x0000000001BF0000-memory.dmp vmprotect behavioral2/memory/2360-55-0x0000000000400000-0x0000000001BF0000-memory.dmp vmprotect behavioral2/memory/2360-53-0x0000000000400000-0x0000000001BF0000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
LOL意哥全能辅助.exepid process 2360 LOL意哥全能辅助.exe 2360 LOL意哥全能辅助.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
LOL意哥全能辅助.exepid process 2360 LOL意哥全能辅助.exe 2360 LOL意哥全能辅助.exe 2360 LOL意哥全能辅助.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfsamdsfzrej_gr\LOL意哥破解版\LOL意哥全能辅助.exe"C:\Users\Admin\AppData\Local\Temp\cfsamdsfzrej_gr\LOL意哥破解版\LOL意哥全能辅助.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2360
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39b4055 /state1:0x41c64e6d1⤵PID:3804