Analysis
-
max time kernel
148s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 08:25
Behavioral task
behavioral1
Sample
abc/炫舞助手V0710心动版.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
abc/炫舞助手V0710心动版.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
silentoi_29065018_29.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
silentoi_29065018_29.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
运行炫舞助手V0710心动版.bat
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
运行炫舞助手V0710心动版.bat
Resource
win10v2004-20241007-en
General
-
Target
运行炫舞助手V0710心动版.bat
-
Size
246B
-
MD5
0346285b2fa0672dbb01a172f3c965a6
-
SHA1
a438c4fcb298ed3b93b2267ce975f6147bb147bf
-
SHA256
67341b8a6e0245939a754c72f377abbeea4c60ae389ff4f7cf0817b11f584fb2
-
SHA512
026a5d795b0afaefe723088b81f7d2ecc24bc03229a64a60905602d15f7f03f60ad391e2cfbb2a680cc77c2238287409ddc3c395010c3bb27f0d183f2b037c15
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language silentoi_29065018_29.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2428 wrote to memory of 1224 2428 cmd.exe 85 PID 2428 wrote to memory of 1224 2428 cmd.exe 85 PID 2428 wrote to memory of 1224 2428 cmd.exe 85
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\运行炫舞助手V0710心动版.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\silentoi_29065018_29.exe"C:\Users\Admin\AppData\Local\Temp\silentoi_29065018_29.exe" "/S"2⤵
- System Location Discovery: System Language Discovery
PID:1224
-