Overview
overview
5Static
static
5hyhd2004/hyhd2004.exe
windows7-x64
5hyhd2004/hyhd2004.exe
windows10-2004-x64
5hyhd2004/�...��.url
windows7-x64
1hyhd2004/�...��.url
windows10-2004-x64
1免费电�...��.url
windows7-x64
1免费电�...��.url
windows10-2004-x64
1让你放�...��.url
windows7-x64
1让你放�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 05:49
Behavioral task
behavioral1
Sample
hyhd2004/hyhd2004.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
hyhd2004/hyhd2004.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
hyhd2004/更多软件.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
hyhd2004/更多软件.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
免费电话_免费打手机、座机、小灵通_铁通RedVIP网络电话.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
免费电话_免费打手机、座机、小灵通_铁通RedVIP网络电话.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
让你放心、永不中毒的浏览器.url
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
让你放心、永不中毒的浏览器.url
Resource
win10v2004-20241007-en
General
-
Target
hyhd2004/hyhd2004.exe
-
Size
358KB
-
MD5
0c265bb9cba6ed7d48329908ea41ce4e
-
SHA1
d72dabc427e391fc480d8b3e5aebcd24d501ef73
-
SHA256
5682e3de33d67d1ccc3a05b304fe1fded351bfa17cb1707c833d5725328126da
-
SHA512
11e5a6919d576c3b988c6b29a54d4efbf477d018c97742e300f98bdd036e7679e0a6e8d7596bb44907e2ebc7ce118f77cd676109d95c1f7332ea66346e6f65ec
-
SSDEEP
6144:Vs+ddbYMKulYNkmTIqp5VE/o+GaQq9ZwQsErvAJfSf8s35za9ye61MANXKmzR8MX:VlddEMBmTIqLV8oJMZwFEkqfe9J6dR8O
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5084-0-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/5084-1-0x0000000000400000-0x0000000000426000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hyhd2004.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5084 hyhd2004.exe 5084 hyhd2004.exe