Overview
overview
7Static
static
7SMBB4SJBZW...se.dll
windows7-x64
3SMBB4SJBZW...se.dll
windows10-2004-x64
3SMBB4SJBZW...sh.dll
windows7-x64
3SMBB4SJBZW...sh.dll
windows10-2004-x64
3SMBB4SJBZW...me.exe
windows7-x64
7SMBB4SJBZW...me.exe
windows10-2004-x64
7SMBB4SJBZW...ex.exe
windows7-x64
3SMBB4SJBZW...ex.exe
windows10-2004-x64
3SMBB4SJBZW...47.vbs
windows7-x64
1SMBB4SJBZW...47.vbs
windows10-2004-x64
1安装程序.exe
windows7-x64
7安装程序.exe
windows10-2004-x64
7Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 14:31
Behavioral task
behavioral1
Sample
SMBB4SJBZW/Chinese.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SMBB4SJBZW/Chinese.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
SMBB4SJBZW/English.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
SMBB4SJBZW/English.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
SMBB4SJBZW/PlayGame.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
SMBB4SJBZW/PlayGame.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
SMBB4SJBZW/VirtuaNESex.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SMBB4SJBZW/VirtuaNESex.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
SMBB4SJBZW/mapper_src/Mapper047.vbs
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
SMBB4SJBZW/mapper_src/Mapper047.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
安装程序.exe
Resource
win7-20240903-en
General
-
Target
安装程序.exe
-
Size
543KB
-
MD5
f3af3843f2d570b840febcdfde75eff8
-
SHA1
e5ceaae62ac6f40e71915f18872db7699b9e85c1
-
SHA256
6d5cf7140496e8006cc9fcb87618ecc572b36353dc2977730f390c23ec46e418
-
SHA512
b808344d10f0bb5f7dd758a0f2e088892f743722268d1c6650bfb1b4d8e2e60b4d6e63a97f68759651982be856e5c151742160e901784a2ed666266a78aef569
-
SSDEEP
12288:0B5nBM7siZXcsxeVjDe+NImEULEUm0DE9nCl10HvmX//Xz4LTda:m5B4VZXceeIuzLE3owCneeXXz4LTda
Malware Config
Signatures
-
resource yara_rule behavioral11/memory/1228-0-0x0000000000880000-0x00000000009A6000-memory.dmp upx behavioral11/memory/1228-22-0x0000000000880000-0x00000000009A6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 安装程序.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1228 安装程序.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1228 安装程序.exe