Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:22
Behavioral task
behavioral1
Sample
东坡软件下载.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
东坡软件下载.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
造梦西游5武神辅助1.1.exe
Resource
win7-20240903-en
General
-
Target
造梦西游5武神辅助1.1.exe
-
Size
3.7MB
-
MD5
bf0a6b2047b1278885a185568b384625
-
SHA1
ff790c5a4f4eff5f91ca3ab9266be2758f01ea0b
-
SHA256
d5143eb62fd8df693961220955ae76d0c32b2cf50d7cce470d81cb1821654869
-
SHA512
bb9fd83a4d16bc4060f4dc4b3e2ff20c4d71ad40b5db9358c422426cece70e3fb48cef405b3cb3da13c79d72a244dae72817e0b06bc00d2a1a61d0e25bdd9503
-
SSDEEP
98304:t7pJchxq0t9bNM+SWTR9fkOc7XNqQyV0:7JIB95BSeR25qQyV
Malware Config
Signatures
-
resource yara_rule behavioral3/memory/3020-5-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-4-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-3-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-46-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-45-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-43-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-41-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-39-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-37-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-35-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-33-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-31-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-29-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-27-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-25-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-23-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-17-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-11-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-9-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral3/memory/3020-48-0x0000000010000000-0x000000001003F000-memory.dmp upx -
resource yara_rule behavioral3/memory/3020-0-0x0000000000400000-0x0000000000BD0000-memory.dmp vmprotect behavioral3/memory/3020-1-0x0000000000400000-0x0000000000BD0000-memory.dmp vmprotect behavioral3/memory/3020-47-0x0000000000400000-0x0000000000BD0000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 造梦西游5武神辅助1.1.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3020 造梦西游5武神辅助1.1.exe 3020 造梦西游5武神辅助1.1.exe 3020 造梦西游5武神辅助1.1.exe