Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 14:02
Behavioral task
behavioral1
Sample
WoWBox.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
WoWBox.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
安装必读文件.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
安装必读文件.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
最牛的单机游戏下载网站.url
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
最牛的单机游戏下载网站.url
Resource
win10v2004-20241007-en
General
-
Target
WoWBox.exe
-
Size
2.4MB
-
MD5
4618d24ecb775b030d67154818ca0287
-
SHA1
229dd659c0c5c3ac75d8a686bfefcc66080d1551
-
SHA256
a3db1cd68b763347446170f694ce661703b547425a8a9d121866a998599c0e20
-
SHA512
58adeaea427cd4440d851ce4c087f52a90649a652ec5600993e33ae09415c233eafc37f867f8551ce9b5ef4290605f14f44455ec7a1b3974230570a959f1cb96
-
SSDEEP
49152:Tsh6I+QhMwuJT915JRltIJhh7s93a2nf1GU+aD2GhQMK060xf:Tsh7oJBLJRltIJjOjfP+aD2GhQ3cJ
Malware Config
Signatures
-
Detects Strela Stealer payload 1 IoCs
resource yara_rule behavioral2/memory/1336-7-0x0000000000400000-0x00000000008F0000-memory.dmp family_strela -
Strela family
-
Loads dropped DLL 1 IoCs
pid Process 1336 WoWBox.exe -
resource yara_rule behavioral2/memory/1336-0-0x0000000000400000-0x00000000008F0000-memory.dmp upx behavioral2/memory/1336-7-0x0000000000400000-0x00000000008F0000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WoWBox.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1336 WoWBox.exe 1336 WoWBox.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5d04438de49859c75d1ab799eab828c35
SHA18c778878a7b3686d7535d2d7acc65910c93ef3f7
SHA25609e5f0f9c441129dccbe32cedc46c1f6336a8ff7a5b76fc1ac357ff86374b5db
SHA512c0a39dc638370dae246e5939f7f1b5c9316083c18b0e6a4b70035c6d690107da26867147f78344a469c14431df48149f97d61d4693ce8b557469631b22b25c49