Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 14:54
Static task
static1
Behavioral task
behavioral1
Sample
实用软件.url
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
实用软件.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
帮豆助手 3.1.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
帮豆助手 3.1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
更多QQ活动.url
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
更多QQ活动.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
访问技术QQ网.url
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
访问技术QQ网.url
Resource
win10v2004-20240226-en
General
-
Target
帮豆助手 3.1.exe
-
Size
1.4MB
-
MD5
30f734033de5eeaa5e49413570e768f8
-
SHA1
10596261ff306e32431e45b34ce6d7e15c1943fd
-
SHA256
45fbe3f3c5ea5cf5d508d0e5c94cafd47674765ac33ca0b0e1c2cca24ade1a1e
-
SHA512
61876f1e630331fb8d23902c247683a3d97ba4d7780108e53094969798663dae85fcc4a66fcf8909d861572a6bb76381c8b6c1b6fa16ea586e9e546efd575a88
-
SSDEEP
24576:9AVUr6VL/xubYy6NceUt2yLLTge5M5YFsji4AdVt8mahPfMbTydttM:x05ugQLNGhc8QKttM
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 帮豆助手 3.1.exe -
resource yara_rule behavioral3/memory/2796-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/2796-32-0x0000000010000000-0x000000001003E000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main 帮豆助手 3.1.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2796 帮豆助手 3.1.exe 2796 帮豆助手 3.1.exe 2796 帮豆助手 3.1.exe 2796 帮豆助手 3.1.exe 2796 帮豆助手 3.1.exe 2796 帮豆助手 3.1.exe 2796 帮豆助手 3.1.exe