Analysis

  • max time kernel
    122s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 21:19

General

  • Target

    CF关公[体验服一区]超级无敌全能BT辅助V1.9.exe

  • Size

    1.7MB

  • MD5

    8764c5c7b05d753e85e4b8d717716668

  • SHA1

    7d7afea13a0685b29be03caa4f163d1f95213928

  • SHA256

    1aa90b13c04a03c01cf6c555ec8c4e7cbeffe54909c4bdf3fb8dd9c919d0bbad

  • SHA512

    92a6b571542935c057e43b281992237b2d001049d1ae0e4b6aea7a2c7e77ff9e3914ebf2efdc9708b9ad12a0159dd13e98187753a607b549f940ac38af895061

  • SSDEEP

    24576:E1QlBSW2vDU1nMFuRjxX67OFkKJn1vMBQWutkA+:Ealm4LpxXxv1v1We+

Score
5/10

Malware Config

Signatures

  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CF关公[体验服一区]超级无敌全能BT辅助V1.9.exe
    "C:\Users\Admin\AppData\Local\Temp\CF关公[体验服一区]超级无敌全能BT辅助V1.9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.75ts.com/?gq
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bdeb427498f54f053f3974e914971f97

    SHA1

    334d63cdecb1e5b3a329b4e1fb65e3befdf2646e

    SHA256

    d95855d93611fa6684953010ab653afda6683b4ce0c5419e3aa37e406fd2e4e4

    SHA512

    9924f20db67a36fa285045666b5a227718f8d182045aeb565cf2f40013966ea84ae2d0c0e90c26782e28ebd1689c91b0a7c13bef35c350d0e4fb0fb05126a4d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b725758046ef19deb269eddcf2b6ba8

    SHA1

    768f0ae70f7ef2ba5b404bacd4fe92fe39184898

    SHA256

    22a0bf5db9b68e820420e80401305f01e89a6ec21d06da23fdd9b232a9bb0f49

    SHA512

    800148c4ce2833ac9a0a22cf785b3d5b4bc1fde228c8f173e18c8aaf546e58ccef2f9648e9cf66202b543011b9193e3de1918803d034fa363f2f774020b58031

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea2d264b645cfa42e0fd6492a7c1fcde

    SHA1

    671d095b1c4c81013cdc3aa290fb0abaaa1d0b4e

    SHA256

    d4769dd4e369532a1ab16af0a148dae90f239fb9f72b80bd9a53bccea94ca04b

    SHA512

    1aec90f4e694b9f6f1c16b03ec971aac27fea1893231719812f36fe567e312efdb73338c63f0e254d3cff60ce4735b5f28f3821a11b3e738e38d1c4488f38f5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13ed8a9c9ddb715b980c7227f97fbe6d

    SHA1

    1bd50a4afe577f4f549600c98d042fdbe6f548fc

    SHA256

    c10672162626f1765998145c603f7cf63c15459d7307b86b13a8971814aba921

    SHA512

    4947bc4c7662834971e671bfda453c37cd9857c3087cc19f5e0b70b436d2b61b3012368c082096f2f1513b5260b69b555d8cbfa64e437710eddf616db87bbe11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fea687e7ac98bcf5e339fb718b38b636

    SHA1

    bcd6888163d9a4e7c23dd639bef1d9ba178684e7

    SHA256

    dc57e243f5ce4bfe5b478bc19e8290102db9132d5ac515ea9f158d13189bfd43

    SHA512

    1526e7f6f8069deeb86b081063186911dc27d48e03d886532b9d324d8f2c6af188886c78c71c38c8b65f5a978b49dff4c06c8ecbe2b11601ba1619963dde5697

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df9eff2396e26c2f49a082629ab6c0f6

    SHA1

    bcce977549b762786774816742527893db5286e2

    SHA256

    23c79a750a8d7f743c2b7049690590cabffa07e10f08baa0e5262ea442059109

    SHA512

    9e7f0cc8fc63e523ae2cbca40b6c438b1210c27f0086d6675bcf73f25cbcce5801a62ea77d531e5ab866574dd1e34c3ce45c35c654c70f7cbd17bc2009f81a5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1177bfe9c1c4f97bb2618272f01db9e

    SHA1

    4efa1afd3cc90c29048c0ea62e1e46b740559efd

    SHA256

    00c244333e17631777f66b7502a270e6e72f45836679e50c70333a72be7bd10c

    SHA512

    1dcb15e2f424d3bf327b2f03eff4ca61ab983d69bc277ef9f828c73dd7ace2da6a6a15f2ce1649ceca267db9a1b80ae0d09fb047366bb73947b5531932e6390c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24536d80f0e049035f2db96e6c8cb627

    SHA1

    4397b27b6327e8e56baf960f76fd5402fad0f3eb

    SHA256

    8dde4561ebced03106a4d67b02fc3c0eef587b85d19f19c330aa4edfe1bf0df2

    SHA512

    d1034b23a50506992e7dadd5d1a8b7d3ee844f99ed273f4a1d2ea1472e09db1e06ecf693bb31840632e67eb5a463840da250c64ff21167c7d304f0fefb667c98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff64ea4f768773f90433ef39e7dcade4

    SHA1

    e83da6f62f601cb2d9d4792e809eb300c4640991

    SHA256

    7d0ce01942c3cdf084457b5ce89abd650cbc8e5e1f40072294cea013ec83c528

    SHA512

    d29f66ee0a8d31ee66fabf0b6ca180bcd4e5c3010f269ad70da8db7b25ed8ad61b4cc0f6bc07c51f138845c6624d70402d0f370272f1089b7b7f718bafdf4b60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e167fddf3701aee6b8b582d799482e1

    SHA1

    4ec115e2edfd1b15d0ab2517d85698b7b90a6a68

    SHA256

    935b5164692c37207608d86dc9041acfa0c20ae5205ad78a82a0dd366b5770bd

    SHA512

    255682fed11435113ed17e56d89289a99bfd41b89ae620f54c03cfe3d988776b563efc3d0f92f8f72ed0586fd64993909620462f69240f9c47dcd703b0a35128

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43279a81c165e175c675ed5cf69c9cfa

    SHA1

    9cf7f98d2d7705e76690dca92f092c8f6502df56

    SHA256

    0ad2f9bff7bb3ceb515f410f2c7fcbf3f85f4fe659e9f708536d466d9c41f9bd

    SHA512

    657e4457d2f07701bfffa37b011d9ad11681db855d18b6ab436ceca95da88d72212e830c15492615c5dc4af1c56bcd4046760fb5316033496775aaea436e7968

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f53a0c391d21436ecf2d5fe3c11b4d92

    SHA1

    2bcd620d908f5e33b228bb81e0e9d1f44f90525b

    SHA256

    05c578bd62a37bbcdd549adbf2a4abcc425b17914d19fd7d71cfce97c4dc72b5

    SHA512

    197412c1ef0c2fa2ecefcbd0fdcfacb30dccda881ed024e8c8ffb42fa832a23c3fa9bf391213d9c2efabc5e67bfdfbc244e776c7fdf582e1ce112a3790469f4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0912484f6eb818c9f1f663f387e47052

    SHA1

    bb13eaa655bd0fe7934cb73f63cac2abf47722ec

    SHA256

    70de0321cddc1b72784817e3feee988c93b01e2d25df152b8e245937a3668d99

    SHA512

    a8533fc7ec42c6cad7879327049ca470cda2bbc935cf3e3a4c3c1e26eb29fe738434d5c0fad9c791e81d4a11b4794190dcc72898128af1ab773e3dc33f113776

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    964241141049145fac732e20d782d0eb

    SHA1

    8365bd26d245736cdc97fadc831ecc04c1d7fdc6

    SHA256

    4bed78ab423f972c724f696d171ec803e7fd6b850bbc715131a56f412642e0ad

    SHA512

    b99a3635b00519b553fb418c1aec69f619f6ad18bb2a09963113097e78a27afa4440441e1259b82c1c43e8a0bbf5d53f864cd274ffe55586cf15de1e223a025c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    259a228c35f41dadf11b244168549936

    SHA1

    f944d67c2afdcf149f218aa816424b9c2b70a262

    SHA256

    3527426badae4d353cf53737a2ef3643437924848450329264e0f527452dc376

    SHA512

    d3a3af56bdab7647d017f25e8fb29fc5098775b2a9b0e13f1c14d7690ca91b612cbf9a0cc121e730c81662fde7ffb66143ada88f7dad9bd46db3ec21ba09b394

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a118c11b5b3d7acc124184c7c6a57e0f

    SHA1

    6a6ba3d9bd93e2bc035fe2507e27159a7f3d1bc0

    SHA256

    69bb5299136b0bf3e47e08702483f837eff4e32f5d4ed254b30f3b6c2dd117bd

    SHA512

    7c0f7d880300c786f1fe63e92067d524e1a1a386610deb26620c52b47b126292082e9687aaaa95c3adc1f3a8afb1d81fe1ee699a35a1b780d0b55049854ad2b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b85d940c28c1e5224c91d6eea3e45cd8

    SHA1

    8e45c09d0d014a06728f91bf59dbf849e412d901

    SHA256

    af383a39529740efc24d24188dd7f37f8a7be8312136538e5b3ea7486b5eeb95

    SHA512

    0d71c900a4ff8455ae178dac829a966a8646aa3700475cf042004d2276651a168696e11d2811941db25a1a0e8f414159d30e1ee5c7edd11369172859b6c1b7f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bb65d9f364671e525b42e2e9fab711e

    SHA1

    2ab46ea881b9077309c4d62c27a73f60b89ceb58

    SHA256

    7597573454a51273056ce37dda1afef9410b8862918faf304ff14fe12d6f87c0

    SHA512

    9bc58247e3b888d499bc5e014c7a63fc2a13ca033141864292514e8c2cc512cc62de7af5d815d8e0dd4656b0cf2dc900b98717b002f47408e8ac7c165db9ab6f

  • C:\Users\Admin\AppData\Local\Temp\Cab10F3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1155.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2236-36-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-44-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-24-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-22-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-18-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-52-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-53-0x00000000007B0000-0x00000000008B0000-memory.dmp

    Filesize

    1024KB

  • memory/2236-28-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-30-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-32-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-38-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-40-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-42-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-26-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-46-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-49-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-2-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-20-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-34-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-16-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-15-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-5-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-12-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-10-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-4-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-7-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2236-3-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB