Overview
overview
7Static
static
7CORE10k.exe
windows7-x64
7CORE10k.exe
windows10-2004-x64
7data/program1.exe
windows7-x64
7data/program1.exe
windows10-2004-x64
7data/zip.dll
windows7-x64
1data/zip.dll
windows10-2004-x64
3keygen.exe
windows7-x64
7keygen.exe
windows10-2004-x64
7访问零�...��.url
windows7-x64
1访问零�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 03:18
Behavioral task
behavioral1
Sample
CORE10k.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
CORE10k.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
data/program1.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
data/program1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
data/zip.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
data/zip.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
keygen.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
keygen.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
访问零度软件园获取更多资源.url
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
访问零度软件园获取更多资源.url
Resource
win10v2004-20240426-en
General
-
Target
keygen.exe
-
Size
228KB
-
MD5
cf067a42232fd3ccabd7d7701a1f4ceb
-
SHA1
67448758d281a2a76a157e7457b6a9745a230e6b
-
SHA256
c6cef3d9ce6cad8aae5927416b0b3e13c3830ca6f2e0ca74ee49bf2283f42087
-
SHA512
57255dfeae555e1ec7636341286f7b5112336fdd5e32de4a0632ef74a2eee209836fb1de6b44885b908b4f60e31e47f0b10a2704e6b54360189331e1712e568a
-
SSDEEP
6144:wIzJc1Fro0Xrhor1Ok4xbU5B1KP/o2RaTi8k+jsk4Gunb:wec1W0bhK1t4xYJKA8G+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2960 keygen1.exe -
Loads dropped DLL 5 IoCs
pid Process 2904 keygen.exe 2904 keygen.exe 2960 keygen1.exe 2960 keygen1.exe 2960 keygen1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2904 keygen.exe 2904 keygen.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2960 2904 keygen.exe 28 PID 2904 wrote to memory of 2960 2904 keygen.exe 28 PID 2904 wrote to memory of 2960 2904 keygen.exe 28 PID 2904 wrote to memory of 2960 2904 keygen.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\keygen.exe"C:\Users\Admin\AppData\Local\Temp\keygen.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\keygen1.exeC:\Users\Admin\AppData\Local\Temp\keygen1.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2960
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD576a9565c5f51775719eebda1f25530a5
SHA1332feae4dba6b4a93bebea7a881a0fa758891091
SHA256a1a7c4f74d4fe7784ed03709e5f946b94cc10a64e3ae0ad5a9a3bece9a8a2c0a
SHA51279c9af704d1626cad9d44470585baf8d5f082b5d77c285fc6ae4862e99439f838fe9b1e745f8f2487fa64d5d7304954f66d0cef222db4dc9095a7294172094e9
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822
-
Filesize
212KB
MD5f330aa9230a65eb0482ff74c084d73e2
SHA1df89f5f51d4941fb2d23e07583ca71aa0ca78248
SHA2561c25b23b78586d4a66aef9950ea00235663e333f6f619c35896ad580e794ec34
SHA5128841422bb32160f6dfc71bc1d1690ee5b231303e7735872c4ca8dd66d503ca3e719d74b2bcd8acb319ae7c39b288773f5bab7ee80345da76c63ff282d8967778
-
Filesize
12KB
MD5e6144fb36c1fdc6ba1d1afa9632588f8
SHA1c4964264c6600fde210a644b639e2ea25ecb67e6
SHA256b141412d0611571df381c26186b3fc438c725d6e45ad66fd76413322c17a9ac6
SHA512400ca4e2ad987a88429da21d795f7365bd230ed4225e19b7841dcc09606e0afde2f3cc31aa8be4ee83dd3c6b0339cb2c13953523bdc8d2f547d953c6c6c8d339