Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 08:02
Static task
static1
Behavioral task
behavioral1
Sample
445943图片格式转换.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
445943图片格式转换.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240709-en
General
-
Target
445943图片格式转换.exe
-
Size
2.1MB
-
MD5
693b4752d318f2b74553930941cbeb06
-
SHA1
f55afc4cf46d374201b2dca8c2840c29874bb29e
-
SHA256
b8a6f669bcbcf34ab16683a328370241041fbf1fca588d7a06f48f8b6089fb96
-
SHA512
512412a9fcca33556cf45a3cdcb92cd8bbc35e3397ec31c012f34a9ed1c97a3ad728d2173eefbdd7bd29a1e16f6f8d980115ff7b8be763b10081e01f3c98b1fb
-
SSDEEP
49152:XCFft3M9e8uVPjxaZWwn+0c0EHGh8eBYG:yFflMILx1wn+LdH5eB
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2384-4-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-2-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-16-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-44-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-43-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-42-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-40-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-38-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-36-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-34-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-32-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-30-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-28-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-26-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-24-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-22-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-20-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-18-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-14-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-12-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-10-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-8-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-6-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-1-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx behavioral1/memory/2384-0-0x0000000003EE0000-0x0000000003F1D000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main 445943图片格式转换.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2384 445943图片格式转换.exe 2384 445943图片格式转换.exe 2384 445943图片格式转换.exe 2384 445943图片格式转换.exe 2384 445943图片格式转换.exe