Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 20:19

General

  • Target

    斗战神小梁辅助.exe

  • Size

    852KB

  • MD5

    f1ee198197adbf6fddbe29f522f58c8c

  • SHA1

    4bec5815b55690a5c69f5af5894566c36cfed581

  • SHA256

    03bf584dca3d676a2044a3f7062e2a69b6233c2368ac8de7c806c7d70d6e5876

  • SHA512

    2a0a19efedc9186c2be1932889622871d3f218e56fcdce3b9252e66941078470337b73e268fcb46a6a6937aa536c1295069f23173fba25695c3050321b9af2b9

  • SSDEEP

    12288:3aniS1QChHr051P3Demxv1A8+wizXa/JX20SdfaP5E1/SMZoSrF5KG9i:ZDvxNAJwizX1dfamQM/T4

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\斗战神小梁辅助.exe
    "C:\Users\Admin\AppData\Local\Temp\斗战神小梁辅助.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2184-1-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-0-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-21-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-16-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-23-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-20-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-12-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-30-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-32-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-28-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-10-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-8-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-6-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-4-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-2-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-42-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-40-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-45-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-38-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-36-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-34-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-26-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-24-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2184-57-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB