Analysis

  • max time kernel
    119s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 09:02

General

  • Target

    十彩0909正式版/CD非凡登陆器处理器/十彩CD(非凡)处理器.vmp.exe

  • Size

    594KB

  • MD5

    d834ebd846044c6b9e88591a51106c37

  • SHA1

    b5b2b0b9ea296d31c1a2ada168b01f7e0c7bb204

  • SHA256

    b03ac3f05d7a04c262ab9101ea04e3787a21469e7a35d285c3b6328fe68f6132

  • SHA512

    7aa17d3d7235ed3dc3115d2620e4aa7855a2120c18ed44ea8075d1ded0201b9e7e83c32c8b7722ff81ed539715b6f692eadbd97300fe402cb13f94d792481a38

  • SSDEEP

    12288:rcAAKh/WSbeKiWHggPEMMh0L7AL2tys9ARIT4XEJpBfxtulA:Ifs/WS6MggX37Y2tyLo40fBfxtu

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\十彩0909正式版\CD非凡登陆器处理器\十彩CD(非凡)处理器.vmp.exe
    "C:\Users\Admin\AppData\Local\Temp\十彩0909正式版\CD非凡登陆器处理器\十彩CD(非凡)处理器.vmp.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.10cwg.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4fd6d19e677adf8c21706870c6aeaac1

    SHA1

    531d445f1fafba25b6083ca8a3e3d9050e4d6c8a

    SHA256

    7bd56c55f18bfa4f21989e5721e0ca6f26f66604c8090f5930d2866285627e90

    SHA512

    046cc94d716c2b6a35d3189520d42750d93d38017d25dc2fb0fe6561764f6f6edf393a72048b9a8e5df84a7695dc8b370955b081dfb65b3c05ea6a463c43b197

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fdaf31a026b4d086d10720e9dbb093ef

    SHA1

    981d991fd18ffdd51c6210e9b469dd79a9a567ab

    SHA256

    27b0469f9da5661e7c5fb28e103f0d5e3fa7d7e6039925b33f730d3017eb2b3a

    SHA512

    ad55f69f4c4bce823724c3388990512061ce8f138d1050eb5588954747720c1bb7a313e461e38e334a861782772df5acdb037dcf3a4bc310442e246cb3567e1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7736b3948bfc8fff1bb800303e076075

    SHA1

    288d18c7db9658ac98441cacd45da11327c61d1e

    SHA256

    ef23147ef485fcc4eb55ab7f05e96964e318b3bbda82ab4ff38f6149221949f5

    SHA512

    04c0784fe8a24060f02f3d743f7e9e6fc4b4236b6784b71f0c27b1eff802d51d7a8083c64892d1902feeeda523ca0b59652431efb4bc5db72ed29bdd791bac07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec71b8b197e2ecc736a2c3185e6d0d96

    SHA1

    764e3c093d65816e79a91174857d75fb9af3d827

    SHA256

    762b0fd6b4057514b0c28587726a1f57310f8917035bfa10fd8c7c2b212bec5f

    SHA512

    fadd691c7b03fd3b1637d977978bc5d64e5c458213ef77bd9845cd7293866e27a3df1cc06dddc2f031a5eebe7f70c219000fd1a8318582c91d35c0c55baefb5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85100ec22e173b5d85f68b983f623134

    SHA1

    2e5f6f6ad55e0495d78d963bb8bc8e748df0e7ec

    SHA256

    6d9ff1b62fab6cdde87b8c146540a29ae53d10dc8c8ab589e0e33dff252abec9

    SHA512

    cc4ac7dd04475a8aac82b2e6afdb18e9b9075edcf7175400bd6ce77b84ee3ecaae3f07d4ca39cf04e24bc4c75366513d55f57276076cfb9b60659678201c2696

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e82e37a1d731ab7336464dd7e8657b0e

    SHA1

    43e5fc132c28e9f2bb031ac76fd9fe60198041a3

    SHA256

    4d6d3730f1a6a5e0bb7ea1ab98c209ae5510c16662d3b56a6c2770fbe3e67122

    SHA512

    80e5a51b70f9584a3236de72709cf2768de740fb508c51f71dacb55df2f35951193cec043568acb07ec14c54ea4322bb145198c279b4a5df37d610de779a5fbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    927317bcf491c6a4eb33abb574c07a54

    SHA1

    379270f9289cc33b71c99485773d593a2d95cdbc

    SHA256

    cfb2772b54742f0a83b19c23450d85a6889071aa7e5f1b4703ffc5ab6b71347b

    SHA512

    ab5a80ab8982e5a452cbbd8f838c0b4bbfca7ad2accf42f9813b8106623376279cfdb2e5e7f0e558d46e510eedf0d03bc490863e669c247b5315c445db97f20e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8fa5340ba0058e8137a6b13fb0368aa

    SHA1

    55203a6f14a4a3fa93b583e74231f9d7eaff510c

    SHA256

    57a0c21379c1612f5af359cfd50a51c066ee8b54b9a2a9b96bdd1f213d5b7247

    SHA512

    da2bbd92d485d0bca41957f10c69b1b31377044f6a9396342c952635770ff1d9194981dab07fa26f93d9e7c5e65ae77b502159aeaa1a2c0bd6c6a26ee75ef56d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    873f8a60c9b121089ca78d57443563b2

    SHA1

    a0d27f4e344fde6a6a894f092dc86f5c4b4aada9

    SHA256

    d540d88eeb507886f66ffec093bad266eb4e150ba5c5cf21688dc900c1cb44c0

    SHA512

    e5ead798e33395d2ca618b138871a2a887953ba2a9c4b4a8e0c55e3654a090c89363ef08851c456c31dd1e52bfe108258a90cf9fb91578fdd60f8ad2a5f5a561

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91cb9f88a599f3702ab7d79df8f1cbff

    SHA1

    97b2b5f0a6f024e2cf30b009712e1ed74b6b7f4d

    SHA256

    3b557f8ffce3e7e9fc993abb23e9f502795c18aecb0867d252292e8773a53482

    SHA512

    de2eaa9c66cb2cf2287b8597453cc6ac2e27c0c105bca212056001ebfc74e173fbb7f38f00ea2ec10d5e7af3ba90ecc0d2e45a515cf6214f703154ce030d5bc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef1d96d114292013e6aef0ad5e6c90ad

    SHA1

    9f1b35fd74dc0628e98d1bd561cae2f4ad1a7b0e

    SHA256

    affd17c03dc2fc6cfa5ba190e5babb4a9b6d5493ca7013650fb4a7ed47443aab

    SHA512

    6f098e313db02c8eda890bc6c06183093bd159b6a10af46f9540bd4ec204a22ede90547a869107ec088c1e3df446aec39ccfd2123cb3c9786e35c422e12a35b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43eec865020555afb574996aef7fc7df

    SHA1

    659953fcb2c8c4846cf9341d5334e5705c8c4853

    SHA256

    a032c857c778cbf6ccb04aae92563c479df7d9bb2dc942d3384624ed46054b38

    SHA512

    1c44ca74c30712df293fef7386c17fddde127a76819885e82c89f52351c40612b9211349f55942a741e6fcbe9a69ffad75380e4a762c77cc8b3daa8578a8a18d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ad01e302daf4a5a7262a1df50e62157

    SHA1

    f4b947e75a65c2f83471ba1d08d67771ef2343ae

    SHA256

    957759e924e749f1a45584bfae80975399759a9df834f66fa0415b6a2f2cba3d

    SHA512

    2746fb98d7dbe4ec36f16a6f98d639b7f1daa4c2ae7919a39e9136d4afb978cb90da9b8f9613cfdb22c202cfb5b2c7794d89ab4bb68b1cee25b57bfee1358ed6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aecd88c83407e04eb2b824fab4f63864

    SHA1

    4f16c5ba6f97bdff63fc8f9816ca61332b30a4c3

    SHA256

    a63c53c2a966f4323f1f0924a66b5459ddf3e79a5e9f8c76aebd236348da7886

    SHA512

    9b00730820cbc690ee6dc74983d86bb604a9b320aefe0c58ee4f8a1b2c7c3683a6b2a383a7875fb080c57f865b58de497164d84b1508de4782fd10e57399b256

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c77953be3fbb6fba910386a603b240df

    SHA1

    2b16441babe1a864ee5284b47f7836a9332888f3

    SHA256

    fc30ecfad3d73befe60c8e2a3f1a16f9560dc2a3d4a5c5a32f27df44ff0d5c55

    SHA512

    6c331942fb3f3d018a43f460ddcfe246ecceab830e23f9290dd143a660a060ca080a96ee3e8eab71cbdf9292feb2374c346908b6aed3147231456420aceb614d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    994f9ddea060f1a7022503414f13f981

    SHA1

    6a8fd19b3aaf9a17697d45b74ad61ea2f661de15

    SHA256

    1af2c3eedc8b8a3da68ead386b1a840f5035ec98f92ced9c2b836c5a8c3ad42a

    SHA512

    a7f51d6f89a4fefa640e0b5943427d09355c4418490c38397954dc1c08933785913ed7528fd739d958615df964b9df3c924bc2ba85ec2d419d752d2b7e922ad4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1c5d1c68b35322e4d12f7d51a03047c

    SHA1

    5066e6a613633767b2dc12d0fa5f4e6ee2de90a3

    SHA256

    0eef291be37f1e423a0a2a1c72385d92bd65852b9ec6d65f878d31672dc6a330

    SHA512

    dadd6cabb80363fa43d9fabb1e97f38a1a0957ceeee26418387a76778393119358bae8186aa226698727c03cf1578a997f505efc307ef373110c5d2b610d7a3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b42e02913f416215c0b659ea0008148

    SHA1

    913f2ea341dccb3047f37c34b272d6675d3f847e

    SHA256

    c05bef9628b1bb678ea5bf19ee5c6ec4c566a86b79d589825565f631fbc1b5b7

    SHA512

    7bd2774848204838db68ec3e8b5882937ec91dbe2b9358229bd2377b27a73b507e5a45257c94a93c6e2941490e9a27e4969aba943e4867aaf6b0f53cf08fbbc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc809fe755cb77a5c4331f992a0d9385

    SHA1

    e62a672ebf6def6d5b6c5c17b591c31657f3a897

    SHA256

    195a708746f33eb6f20f0e2bcf48fe2b15307045a1264a9f349b7cfbc7c97f48

    SHA512

    bc50e9321382ee336317ddf69c4b27d6c1bd7d60ef75724b7d860ed9536292940178d730cf0c70c4d895d690c420763e76ceee384e88e1fd5703ebfe87e2ccec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    76c4b94189cbffd2710c24f6bb8f3b11

    SHA1

    08c5c8184fb89b330ee890092f11dfb6e4cd39a1

    SHA256

    310ac2faab3b2742bfcf0401ea76ef71f06e321f3a4f98b913a867c38d828460

    SHA512

    09f6c12967c29f65006b0fbe3c1f14ab27f2258894a750544f7c7abb9f54875c278c120544afdd915ed2148aa945456f48682cc58ad2391e4248560697a46bfb

  • C:\Users\Admin\AppData\Local\Temp\CabEC05.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarECC5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2416-2-0x0000000000400000-0x000000000054C000-memory.dmp

    Filesize

    1.3MB

  • memory/2416-1-0x0000000000401000-0x000000000041E000-memory.dmp

    Filesize

    116KB

  • memory/2416-12-0x0000000000400000-0x000000000054C000-memory.dmp

    Filesize

    1.3MB

  • memory/2416-0-0x0000000000400000-0x000000000054C000-memory.dmp

    Filesize

    1.3MB