Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 09:22
Static task
static1
Behavioral task
behavioral1
Sample
星辰全民K歌辅助工具V1.5.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
星辰全民K歌辅助工具V1.5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
最新版免费下载-百度搜【闪电软件园】.url
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
最新版免费下载-百度搜【闪电软件园】.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
软件官网--闪电软件园.url
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
软件官网--闪电软件园.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
闪电下载吧.url
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
闪电下载吧.url
Resource
win10v2004-20240802-en
General
-
Target
星辰全民K歌辅助工具V1.5.exe
-
Size
513KB
-
MD5
c1b6b168833a248d4200594a19a39b8c
-
SHA1
24365a609411912be2ab8d85bd5cb545d537fa27
-
SHA256
aea39ceddacbbe9dd5ccc6991022de86fa285681c92e08cd739c1dc8c0367148
-
SHA512
5acff6dd233290096e7cbf60ee885a620bc401df37bc357b773df744acd43c9d1c996c3d662e6f94ba0ee210851c7dffa9b340c671d1aa8bd34e2609b2515ccb
-
SSDEEP
6144:RQxI7M6ZYNSHhqYNJSW6BAu1BUDCx1diFHjX/V6maWYvgPh04HBmTCZuXMHsrj3J:RzdZYNSHBO+Q1MddaezHBKZ3PNLn
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1768-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-4-0x0000000010000000-0x000000001003E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 星辰全民K歌辅助工具V1.5.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1768 星辰全民K歌辅助工具V1.5.exe 1768 星辰全民K歌辅助工具V1.5.exe 1768 星辰全民K歌辅助工具V1.5.exe