Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:22

General

  • Target

    造梦西游5武神辅助1.1.exe

  • Size

    3.7MB

  • MD5

    bf0a6b2047b1278885a185568b384625

  • SHA1

    ff790c5a4f4eff5f91ca3ab9266be2758f01ea0b

  • SHA256

    d5143eb62fd8df693961220955ae76d0c32b2cf50d7cce470d81cb1821654869

  • SHA512

    bb9fd83a4d16bc4060f4dc4b3e2ff20c4d71ad40b5db9358c422426cece70e3fb48cef405b3cb3da13c79d72a244dae72817e0b06bc00d2a1a61d0e25bdd9503

  • SSDEEP

    98304:t7pJchxq0t9bNM+SWTR9fkOc7XNqQyV0:7JIB95BSeR25qQyV

Malware Config

Signatures

  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\造梦西游5武神辅助1.1.exe
    "C:\Users\Admin\AppData\Local\Temp\造梦西游5武神辅助1.1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3020-0-0x0000000000400000-0x0000000000BD0000-memory.dmp

    Filesize

    7.8MB

  • memory/3020-1-0x0000000000400000-0x0000000000BD0000-memory.dmp

    Filesize

    7.8MB

  • memory/3020-5-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-4-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-3-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-46-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-45-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-43-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-41-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-39-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-37-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-35-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-33-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-31-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-29-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-27-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-25-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-23-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-21-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-19-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-17-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-15-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-13-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-11-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-9-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-7-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/3020-47-0x0000000000400000-0x0000000000BD0000-memory.dmp

    Filesize

    7.8MB

  • memory/3020-48-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB