Overview
overview
7Static
static
777169.org/...��.htm
windows7-x64
377169.org/...��.htm
windows10-2004-x64
377169.org/...er.exe
windows7-x64
377169.org/...er.exe
windows10-2004-x64
377169.org/...��.url
windows7-x64
177169.org/...��.url
windows10-2004-x64
177169.org/...PE.exe
windows7-x64
377169.org/...PE.exe
windows10-2004-x64
377169.org/...er.exe
windows7-x64
377169.org/...er.exe
windows10-2004-x64
377169.org/...ct.exe
windows7-x64
777169.org/...ct.exe
windows10-2004-x64
777169.org/...��.exe
windows7-x64
577169.org/...��.exe
windows10-2004-x64
577169.org/...��.exe
windows7-x64
777169.org/...��.exe
windows10-2004-x64
7Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 16:27
Behavioral task
behavioral1
Sample
77169.org/ɱ͡AVG-Spyware/77169.org˵.htm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
77169.org/ɱ͡AVG-Spyware/77169.org˵.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
77169.org/ɱ͡AVG-Spyware/S-Player.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
77169.org/ɱ͡AVG-Spyware/S-Player.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
77169.org/ɱ͡AVG-Spyware/ĺڿͬ.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
77169.org/ɱ͡AVG-Spyware/ĺڿͬ.url
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/MaskPE.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/MaskPE.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/hmimys-Packer.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/hmimys-Packer.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral11
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/vmprotect.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/vmprotect.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/4.1ƽ.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/4.1ƽ.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/ڿԴ��.exe
Resource
win7-20240903-en
General
-
Target
77169.org/ɱ͡AVG-Spyware/̳̹/4.1ƽ.exe
-
Size
763KB
-
MD5
796b005c315ef1c476b30aa403c4e3d4
-
SHA1
4b0eae8e6ad0834c9ecbf00afc6539e9810094fc
-
SHA256
76444221653c00f313cd19146ad4dd4ea254fc1e7c795ae26796b51d67e0f05f
-
SHA512
b0229bd94da0d12df3d0bedc1d8f3308ad1d3f16cf21c22a6840ecf13a9c9bd8cb132bd6a031a908b311e91f9781564590c0d3b9236be0d52fa1fe495576000b
-
SSDEEP
12288:4cXBOWxqGRJ/V+Hy+XkWoBR5/o4iUjNk5XL5SWk9kSX84xlh3TlkZowWp:hROWwG39+S/WIR/iU5UbQX8QtT6ud
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\nsuser.dat 4.1ƽ.exe File created C:\Windows\SysWOW64\nsuser.dat 4.1ƽ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.1ƽ.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 4.1ƽ.exe 2196 4.1ƽ.exe 2196 4.1ƽ.exe 2196 4.1ƽ.exe 2196 4.1ƽ.exe 2196 4.1ƽ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77169.org\ɱ͡AVG-Spyware\̳̹\4.1ƽ.exe"C:\Users\Admin\AppData\Local\Temp\77169.org\ɱ͡AVG-Spyware\̳̹\4.1ƽ.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2196