Overview
overview
3Static
static
3保姆小�...DK.dll
windows7-x64
1保姆小�...DK.dll
windows10-2004-x64
1保姆小�...ib.dll
windows7-x64
1保姆小�...ib.dll
windows10-2004-x64
1保姆小�...ib.dll
windows7-x64
1保姆小�...ib.dll
windows10-2004-x64
1保姆小�...20.dll
windows7-x64
1保姆小�...20.dll
windows10-2004-x64
1保姆小�...ET.dll
windows7-x64
1保姆小�...ET.dll
windows10-2004-x64
1保姆小�...et.dll
windows7-x64
1保姆小�...et.dll
windows10-2004-x64
1保姆小�...05.dll
windows7-x64
1保姆小�...05.dll
windows10-2004-x64
1保姆小�...ng.exe
windows7-x64
3保姆小�...ng.exe
windows10-2004-x64
1保姆小�...��.exe
windows7-x64
1保姆小�...��.exe
windows10-2004-x64
1Analysis
-
max time kernel
142s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/FetionSDK.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/FetionSDK.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/Interop.QuartzTypeLib.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/Interop.QuartzTypeLib.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/Interop.SSOAxCtrlForPTLoginLib.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/Interop.SSOAxCtrlForPTLoginLib.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/Newtonsoft.Json.Net20.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/Newtonsoft.Json.Net20.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/WININET.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/WININET.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/log4net.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/log4net.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/skincrafter.net-vs2005.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/skincrafter.net-vs2005.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/保姆小黑 V2.32-QQ摩天大楼辅助 By Loading.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/保姆小黑 V2.32-QQ摩天大楼辅助 By Loading.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/运行不了点击这个文件.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/运行不了点击这个文件.exe
Resource
win10v2004-20240709-en
General
-
Target
保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading/保姆小黑 V2.32-QQ摩天大楼辅助 By Loading.exe
-
Size
823KB
-
MD5
7864332afd716e90dccd6bc4bafd1019
-
SHA1
90c79933489825562fb6b848391a3ef1d7aca98f
-
SHA256
489a0b38b51824d771474b76b7e697ebf52aa93707ad40935a32a3a6d6740dfd
-
SHA512
3f7e27b51708cfec6651831b2405a7e48667106ecd6eac72b7f0c73705f608eb422f9b4c1c66e0a3480830208e0cf7597e791017af2e2568ebb1c1230a72777d
-
SSDEEP
12288:cF76NG9lWlWl8lWlKlJlBSQhZsV1SQhZsVhxRx4rKc0SQh5sV:cF76M5A5joJ/
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 2524 dw20.exe Token: SeBackupPrivilege 2524 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4632 wrote to memory of 2524 4632 保姆小黑 V2.32-QQ摩天大楼辅助 By Loading.exe 87 PID 4632 wrote to memory of 2524 4632 保姆小黑 V2.32-QQ摩天大楼辅助 By Loading.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading\保姆小黑 V2.32-QQ摩天大楼辅助 By Loading.exe"C:\Users\Admin\AppData\Local\Temp\保姆小黑_V2.32-QQ摩天大楼辅助_By_Loading\保姆小黑 V2.32-QQ摩天大楼辅助 By Loading.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 11802⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2524
-