Analysis
-
max time kernel
134s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 16:37
Static task
static1
Behavioral task
behavioral1
Sample
MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
Resource
win10v2004-20240704-en
General
-
Target
MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
-
Size
5.3MB
-
MD5
fbd9ad001bb2719f574c0705c5de05fb
-
SHA1
d07e77a490ad677935ac8213b88237e94440e791
-
SHA256
f0031f9d7f25d4d29581879f62565a5a565995899adc60213f9e218147c78593
-
SHA512
5724e3f858ae7ea92ba4ce325f3f8f4b90ecc6d7c19476e2888c4b09f0913463191b977f71314300918cceb0a6ae0b80e29d3c70891e8aeb9314da233a929e96
-
SSDEEP
98304:oeZOuRuvqAgef1ndGaX6tJJQv2FKA75OpVclc02vDRZTEB:1ZOPNdo3u0jc02vVZoB
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
nemu-downloader.exedescription ioc process File opened (read-only) \??\F: nemu-downloader.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
nemu-downloader.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation nemu-downloader.exe -
Drops file in Program Files directory 64 IoCs
Processes:
MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exedescription ioc process File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\qwebengine_convert_dict.exe MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File opened for modification C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\7z1602\x64\7za.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\api-ms-win-core-libraryloader-l1-1-0.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\libGLESv2.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\nemu-inputmanager.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\nemu-vboxmanager.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\device\nevkms.exe MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\plugins\iconengines\qsvgicon.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\plugins\playlistformats\qtmultimedia_m3u.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\7z1602\x64\7zxa.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\api-ms-win-core-synch-l1-2-0.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\api-ms-win-crt-time-l1-1-0.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\harfbuzz.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\PocoJSON.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\Qt5WebEngineCore.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\Qt5WebEngine.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\libEGL.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\Qt5PrintSupport.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\api-ms-win-core-namedpipe-l1-1-0.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\plugins\imageformats\qwbmp.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File opened for modification C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\7z1602\Far\7-ZipEng.lng MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\MuMuMultiPlayer.ico MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\PocoNet.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\icuuc71.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\api-ms-win-core-string-l1-1-0.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\7z1602\Far\7-ZipRus.hlf MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\api-ms-win-crt-stdio-l1-1-0.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\concrt140.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\pcre2-16.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\Qt5Quick.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\api-ms-win-core-file-l1-2-0.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\nemu-vcontrolmanager.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\webpdecoder.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\nemu-ui-lib.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\device\libExternal.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\api-ms-win-core-file-l1-1-0.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\Qt5QuickControls2.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\plugins\imageformats\qicns.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\vcruntime140.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\api-ms-win-core-handle-l1-1-0.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\plugins\imageformats\qjp2.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\plugins\mediaservice\qtmedia_audioengine.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\7z1602\7za.exe MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\Qt5Qml.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\SDL2.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\MuMuPlayerRemote.exe MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\MuMuStatisticsReporter.exe MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\api-ms-win-core-processthreads-l1-1-0.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\libpng16.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\AdbWinUsbApi.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\api-ms-win-core-util-l1-1-0.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\webp.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\icuin71.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\sentry.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\device\vcomp140.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\api-ms-win-core-debug-l1-1-0.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\api-ms-win-crt-locale-l1-1-0.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\nemu-statistics.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\7z1602\Far\7-ZipFar.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\vcruntime140_1.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\device\d3dcompiler_47.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\AdbWinApi.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\PocoXML.dll MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\temp\shell\Shell\shortcut_tools.exe MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe -
Executes dropped EXE 7 IoCs
Processes:
nemu-downloader.exeColaBoxChecker.exeHyperVChecker.exeHyperVChecker.exeHyperVChecker.exeMuMuDownloader.exeMuMuNG-setup-V3.8.18.2845-overseas-0417125205.exepid process 2792 nemu-downloader.exe 4068 ColaBoxChecker.exe 5056 HyperVChecker.exe 5032 HyperVChecker.exe 1920 HyperVChecker.exe 3636 MuMuDownloader.exe 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe -
Loads dropped DLL 13 IoCs
Processes:
MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exepid process 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133647575288927385" chrome.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
nemu-downloader.exechrome.exepid process 2792 nemu-downloader.exe 2792 nemu-downloader.exe 2792 nemu-downloader.exe 2792 nemu-downloader.exe 2792 nemu-downloader.exe 2792 nemu-downloader.exe 552 chrome.exe 552 chrome.exe 2792 nemu-downloader.exe 2792 nemu-downloader.exe -
Suspicious behavior: LoadsDriver 3 IoCs
Processes:
pid process 656 656 656 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 552 chrome.exe 552 chrome.exe 552 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
chrome.exepid process 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exepid process 3304 MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exenemu-downloader.exechrome.exedescription pid process target process PID 3116 wrote to memory of 2792 3116 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe nemu-downloader.exe PID 3116 wrote to memory of 2792 3116 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe nemu-downloader.exe PID 3116 wrote to memory of 2792 3116 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe nemu-downloader.exe PID 2792 wrote to memory of 4068 2792 nemu-downloader.exe ColaBoxChecker.exe PID 2792 wrote to memory of 4068 2792 nemu-downloader.exe ColaBoxChecker.exe PID 2792 wrote to memory of 4068 2792 nemu-downloader.exe ColaBoxChecker.exe PID 2792 wrote to memory of 5056 2792 nemu-downloader.exe HyperVChecker.exe PID 2792 wrote to memory of 5056 2792 nemu-downloader.exe HyperVChecker.exe PID 2792 wrote to memory of 5032 2792 nemu-downloader.exe HyperVChecker.exe PID 2792 wrote to memory of 5032 2792 nemu-downloader.exe HyperVChecker.exe PID 2792 wrote to memory of 1920 2792 nemu-downloader.exe HyperVChecker.exe PID 2792 wrote to memory of 1920 2792 nemu-downloader.exe HyperVChecker.exe PID 2792 wrote to memory of 3636 2792 nemu-downloader.exe MuMuDownloader.exe PID 2792 wrote to memory of 3636 2792 nemu-downloader.exe MuMuDownloader.exe PID 2792 wrote to memory of 3636 2792 nemu-downloader.exe MuMuDownloader.exe PID 552 wrote to memory of 4580 552 chrome.exe chrome.exe PID 552 wrote to memory of 4580 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 4444 552 chrome.exe chrome.exe PID 552 wrote to memory of 3872 552 chrome.exe chrome.exe PID 552 wrote to memory of 3872 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe PID 552 wrote to memory of 2096 552 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe"C:\Users\Admin\AppData\Local\Temp\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\7z7CB32C2C\nemu-downloader.exeC:\Users\Admin\AppData\Local\Temp\7z7CB32C2C\nemu-downloader.exe2⤵
- Enumerates connected drives
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\7z7CB32C2C\ColaBoxChecker.exe"C:\Users\Admin\AppData\Local\Temp\7z7CB32C2C\ColaBoxChecker.exe" checker /baseboard3⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\7z7CB32C2C\HyperVChecker.exe"C:\Users\Admin\AppData\Local\Temp\7z7CB32C2C\HyperVChecker.exe"3⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\7z7CB32C2C\HyperVChecker.exe"C:\Users\Admin\AppData\Local\Temp\7z7CB32C2C\HyperVChecker.exe"3⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\7z7CB32C2C\HyperVChecker.exe"C:\Users\Admin\AppData\Local\Temp\7z7CB32C2C\HyperVChecker.exe"3⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\7z7CB32C2C\MuMuDownloader.exe"C:\Users\Admin\AppData\Local\Temp\7z7CB32C2C\MuMuDownloader.exe" --log="C:\Users\Admin\AppData\Local\Temp\nemu-downloader-aria.log" --log-level=notice --check-certificate=false --enable-rpc=true --rpc-listen-port=55085 --continue --max-concurrent-downloads=10 --max-connection-per-server=5 --async-dns=false --file-allocation=prealloc --enable-mmap=true --connect-timeout=5 --rpc-max-request-size=1024M --stop-with-process=27923⤵
- Executes dropped EXE
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe"C:\Users\Admin\AppData\Local\Temp\MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe" /S /auto_start=false /fchannel=gw-overseas12 /D=C:\Program Files\Netease\MuMuPlayerGlobal-12.03⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3304
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9bc4fab58,0x7ff9bc4fab68,0x7ff9bc4fab782⤵PID:4580
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1924,i,15972955076200370940,5434799281525506453,131072 /prefetch:22⤵PID:4444
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1924,i,15972955076200370940,5434799281525506453,131072 /prefetch:82⤵PID:3872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2268 --field-trial-handle=1924,i,15972955076200370940,5434799281525506453,131072 /prefetch:82⤵PID:2096
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1924,i,15972955076200370940,5434799281525506453,131072 /prefetch:12⤵PID:3592
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3140 --field-trial-handle=1924,i,15972955076200370940,5434799281525506453,131072 /prefetch:12⤵PID:4808
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4264 --field-trial-handle=1924,i,15972955076200370940,5434799281525506453,131072 /prefetch:12⤵PID:3288
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 --field-trial-handle=1924,i,15972955076200370940,5434799281525506453,131072 /prefetch:82⤵PID:2312
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1924,i,15972955076200370940,5434799281525506453,131072 /prefetch:82⤵PID:4048
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4816 --field-trial-handle=1924,i,15972955076200370940,5434799281525506453,131072 /prefetch:82⤵PID:2088
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bf87cc8bf27d27f2d3491dfa07db3ee0
SHA10040c3d8cbaf214f83e543203210a73afcd3d379
SHA256045f64e420d276e5cd24a232022146e6957414f54f6be761764a3aa69e943635
SHA5128f0a1737670254d993d58275bdaa7ddaf67e802121edc421f2ea9c0083a05934c3e8ce97eb134d374ae500c1bbcad01915ca13000ad2317d45f74c2bfdc55648
-
Filesize
1KB
MD52a70d9474ce12086309f90f3e03baecf
SHA1c655edd8bbacdb09e63b002c56a2a6b14704f9d4
SHA256d504bd903a9b5ea63bf026dfd2f0ad71a03847ff441a4baa1937b44f7efebfb0
SHA512e032921e953c68f721619be6d082da2a7ed5ffae474a40113e826fa0fa51082ca6151a9962f75ef9d5238c2cbf0b70567c53959b4f213811448df35acdbe1189
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD577b2b048b363d55133a5feb4a35995d7
SHA153ff76a484ee4f3e1b6289e16a8acee51576f34f
SHA256950c9cd8ef813d60469eb206d210e8f3f488d587a143c83109610b025a810b0f
SHA5122b8e5aadf464e318d78b624f60a22a3511afe3799e703f9c8a28601adcff4769e239a59b4ab6cb7e4a4740a54d5841c16875405beb83b6a541702a82d6a3ba5b
-
Filesize
6KB
MD5de8ee0d03a10a5537ca7b01cd26ff629
SHA132e0c65cdd463e51b4fde0e383734dd1bc8c256f
SHA2565bbcde08e9d89a50fd417e0957422ded6ff9c999f23da5f04e0c35df47b5092a
SHA51230593ea783825fcc69c1d36d35c4b9532d395dfe432d40913b98c5ee859c06f6629d9b11177c5e59bedb8050aa8a8be310556e81972c2db72f13f89d8b1d9f3b
-
Filesize
16KB
MD5ad4e37c7825c0a0402c80622933254fe
SHA1cd720491b3d6d3fe69ce8c460c2b3e078a607364
SHA2561638d20b15dc8e01b3e6519061e5bf321cda84d3c4c7991706757833f66c6f8e
SHA5123804016bc69a942b963e687e93366320ab0375b8bf85ea41148c316aeea79eba70d284f8cd0a268cc211540a94da6836ddd10541961f450f496d9ddee3f8441f
-
Filesize
285KB
MD52840fce51b45ac97465b67bc4db56496
SHA19fb1a9f95cef4e8b05cab3dd2fdb54bc2df674dc
SHA2566785216edd4440dfe3aa5c60a9e5431cfbe75cd5ad2415377717d6378fa76b69
SHA512a0d72cf301d723c9dc99cc5dfdcde743a4673e1fec360b1426cba8e045a148c0ee2144b4fef692113a10f1b4352922fdf0caf54c5f5c7d586ad4cce074d096cc
-
Filesize
285KB
MD5a00094f8288919e896e81c7ccf52c598
SHA1d890659933b7a3472beb3bc42d162337b1d4476b
SHA256a47fcfc5d4cb5715daca904f713929fa3e23a63cc46ef8d0bc8fb32601dc97c3
SHA512a03193e2d9290dac64ab20ed83527162690eda927b5bd85ddc5d3b24f18aa4e5cf8c131f32b4b7a49c6165643348a0450acc72c7f10d0cb87381b6e09a3496df
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4.0MB
MD5839708e3f96cf055436fa08d6205263c
SHA1a4579f8cb6b80fe3fd50099794f63eb51be3292f
SHA2561373c5d006a5dbcd9b86cfff9a37616f1245d1333c4adcefc7cd18926b98d752
SHA512ece67e031e06a0442d935e7d81d0eed57ae92b348b5d104423577478ce226e4a4bde834c54e31d33bfe6f574fb7798ba96886d9e8edb738edee6e7c9c43054cd
-
Filesize
117KB
MD5dbd84c6083e4badf4741d95ba3c9b5f8
SHA14a555adf8e0459bfd1145d9bd8d91b3fff94aad0
SHA2569ff467bc5a1c377102d25da9fa9c24dcc4375f456510f71584f0714fdfb2af39
SHA512fb5fe74f64254609e07d6642acf904562bb905cd7c14c6f85ba31bcdbaf06686c0586609ec4f5d2f8f55ff90334dcbb774a3a6e78df74bf1b1d0cd03dec21870
-
Filesize
5.7MB
MD52f3d77b4f587f956e9987598b0a218eb
SHA1c067432f3282438b367a10f6b0bc0466319e34e9
SHA2562f980c56d81f42ba47dc871a04406976dc490ded522131ce9a2e35c40ca8616e
SHA512a63afc6d708e3b974f147a2d27d90689d8743acd53d60ad0f81a3ab54dfa851d73bcb869d1e476035abc5e234479812730285c0826a2c3da62f39715e315f221
-
Filesize
113B
MD578ba1a36d426b3ad449db60b4523898a
SHA1af97b9619ee3463d1405a3815277888c203cc1f3
SHA256083a7576307e206376d57fd178356a20cb767efd3b52dde834d7c093d4e488e9
SHA51252e4c42e19ab35c8c6f0a3c1a83d558dc55aeb7c16a05cb5c330a74d92648f9c40efdca6813aea169fdd6cd5de9d2a4433cd4e24d390b485fb6e37379a060b40
-
Filesize
346B
MD5d00fb4c61a255b58ff09886c6c72461b
SHA14e4f7d7ae36f67a4d6fc8479f8400b3eb769e978
SHA25677dec4d79e1e844a2156f101defc0fc81c138a989e8ba1c722c58feb91b3cd4a
SHA5128494ab9fe0594f3ff7b0893ca3e25d6d0a706e546e92c5b662aa864affcefe5f9721a6a95f37f40cdacf39d27a23e2b3cd5dbca4d7b8909cd7c186209d4b46db
-
Filesize
3.2MB
MD5cdf8047ceae80d9cd9eb798a57bf6084
SHA18e7971401fada3099aed61849745fda37e1c0d32
SHA2561f01a9abac64fae72e0a253ad9ffe2d62cd2967c1c2bc90fb956ac446fe2b11e
SHA512ac366f38f39b935110192d1355147392ced5a21966cc22386804356dce24b2da7971a6a60d675689f93d74014d961bfb3b0c13cf06809b9f9feef580045e20dc
-
Filesize
509KB
MD5ecb43530caf9566c1b76d5af8d2097f1
SHA134562ada66cd1501fcb7411a1e1d86729fd7fdc0
SHA256a12381f97aee2d91568f44b23e866ccc99f0ae5e5961f318ed24b72f4f5da80a
SHA5124a243c0bc4dbaf892bee91ea7eff9e6a7732d3aa2df5bebd9a4bea2859a30a8511945ce3bb823f7ef921f2e1a98906fb676fce85f25fd5908646b3a2f5d02563
-
Filesize
23KB
MD5bb0f26c7a18434ee1d648c7e6743d1fe
SHA1f7503b348aa7c7691668fbb64ccd541e247f87e5
SHA2561b4d25f2f544f520c20493ee1e9ac7b3043aab88e4ff87953390d357de4c2096
SHA5124311e960a4f8f441b25c5ec9a82d64112016ff9c4510dfb082a0c1bcce2d03cb2871912dcaafc5d00f07ed9ac4d6d7998cdcea2bfc84f7180b2f62a2cf24e08d
-
Filesize
52KB
MD56eba32325d2db645c958c551f0aa2e31
SHA1b116cc9ff0369af681ebf805a1a3befedd9ab868
SHA256cf7b45a69a13551db95dcdefc8bfdd4128e1c1db67198347b43469b69c36b844
SHA5126c48038341bb16ce50b01c99f8ebfc919adfce61008d9718c06d55e92e54625ed2ab6ac850592e847bca61d7d57809dd531afeea4f0fb0c8310cfe1710f37927
-
Filesize
12KB
MD5283555de06751c261b66243bbb1558da
SHA14532ed4e255ad0163494a02081b45e893ad666f9
SHA256b6298637fea88a44e4de3f6b7fe254fb73857c08f1dcd8bd1af6f9eb5e6e7e3c
SHA512469dbb4b7cc0d4f59d903415fbb7ea6417323f0daa2aeb2945a9744668f3d9fa95eb34a9d64a647835b563c74c3484c6d4b823a75119599aa5f975dbe471d3ab
-
Filesize
22KB
MD5b7e1d609915cf0b3f9dfee488a92fc91
SHA1d9c873b39e3cac648742568378fe788b2cae6e84
SHA256fa3bb333f615689691ff98527dc3341e3b8ffee4bf97c6128820bf0d303930e7
SHA512ae4a00659f522996600bd0754b2f2706e297939ea616ada66e590409c6c2f28ed7ed39b67a078ae72e9b472a97291c7f3da42339051ef1a3d1941b0368b2e775
-
Filesize
3KB
MD5cb310d97bd72a6ae8fc6e44c88ef9e8c
SHA1ed935c8f17340fecb7021dddd9dc7de0e23bf487
SHA256d6fae2e57c84b25b73fe942fb7ba725158b21ec81c9d989845b64ba1ee337c27
SHA5128351004d0bf86c5577940613cee26803d797b2375038726ce31827d66038664aaf74399d7d5e11c6487012942fb4f147b7021d6e887ac09c39f541991f594f9f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e