Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 18:17
Static task
static1
Behavioral task
behavioral1
Sample
155绿色软件站.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
155绿色软件站.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
uhjjm.exe
Resource
win7-20240903-en
General
-
Target
uhjjm.exe
-
Size
541KB
-
MD5
823898f7e0b12fa66b8e7ded74f4759d
-
SHA1
e83c37dc68f64947163d9f01662d1e1f933625e8
-
SHA256
6a0463a4bf0ce0f3fe157b70ad70f1b51ab7d1537fc135444bb010a9f3b65c57
-
SHA512
bc78342f793b5c7a93dbc08f1c8506500b1084c07593f946a1a72d017975fa96a7f9dc3190dd0212a44162261bcaf51772522cfb7d5d0a4282424565b3e73dfb
-
SSDEEP
6144:8w/pFWm4EcOpuF2tBWJHOOL4MSV/aq8nzIpBcbvbj/ZBneU1531uOXp:PpkmJYOP6zIpBc7X/ZBneU15Ft
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" uhjjm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uhjjm.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2988 uhjjm.exe 2988 uhjjm.exe 2988 uhjjm.exe 2988 uhjjm.exe