Overview
overview
5Static
static
5暴雨在�...��.url
windows7-x64
1暴雨在�...��.url
windows10-2004-x64
1暴雨在�...il.exe
windows7-x64
5暴雨在�...il.exe
windows10-2004-x64
5暴雨在�...LL.dll
windows7-x64
3暴雨在�...LL.dll
windows10-2004-x64
3暴雨在�...TL.dll
windows7-x64
3暴雨在�...TL.dll
windows10-2004-x64
暴雨在�...lp.doc
windows7-x64
4暴雨在�...lp.doc
windows10-2004-x64
1暴雨在�...��.exe
windows7-x64
3暴雨在�...��.exe
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 05:55
Behavioral task
behavioral1
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/!创e下载┆绿色软件天堂.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/!创e下载┆绿色软件天堂.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/GetQQMail.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/GetQQMail.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/SendMailDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/SendMailDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/SkinPPWTL.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/SkinPPWTL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/help.doc
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/help.doc
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/破解补丁.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/破解补丁.exe
Resource
win10v2004-20240802-en
General
-
Target
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/GetQQMail.exe
-
Size
30KB
-
MD5
6203fe78d89a26e3a7c16daad0cc6dfd
-
SHA1
25bbe767d25adb8a0c4d44063014605ee7f30b1c
-
SHA256
542e1cedc22a3b1099594dd843a9dc74cdf3ecc3c07cf3027c781bcc8c19cd8d
-
SHA512
36ea92db362af186faf410d4736b94cd6a795fa84d30ceaf154a887083187ff0646549294f8e5d8230b8e870bb5503f67eb8dbcd94f29ec72069fce285702d36
-
SSDEEP
384:ERgaAXnPwbjWOiheygh7e2ojCa44d19LFDOT4LvtYNw2v1+:rvXnP/OfyghM+/4PcOtYNwA
Malware Config
Signatures
-
resource yara_rule behavioral3/memory/2548-0-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-25-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-28-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-29-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-30-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-31-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-32-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-33-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-34-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-35-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-36-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-37-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-38-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-39-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-40-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral3/memory/2548-41-0x0000000000400000-0x0000000000415000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GetQQMail.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2548 GetQQMail.exe 2548 GetQQMail.exe 2548 GetQQMail.exe 2548 GetQQMail.exe