Overview
overview
10Static
static
3-°¦n+¦++.exe
windows7-x64
1-°¦n+¦++.exe
windows10-2004-x64
1PC远控测试-.exe
windows7-x64
1PC远控测试-.exe
windows10-2004-x64
3vip文件�...��.exe
windows7-x64
10vip文件�...��.exe
windows10-2004-x64
10菲律宾�...P4.exe
windows7-x64
6菲律宾�...P4.exe
windows10-2004-x64
6远程控�...2).exe
windows7-x64
3远程控�...2).exe
windows10-2004-x64
3远程控�...2).exe
windows7-x64
3远程控�...2).exe
windows10-2004-x64
3远程控�...�-.exe
windows7-x64
3远程控�...�-.exe
windows10-2004-x64
3远程控�...�-.exe
windows7-x64
3远程控�...�-.exe
windows10-2004-x64
3钱包收�...2).exe
windows7-x64
3钱包收�...2).exe
windows10-2004-x64
3钱包收�...�-.exe
windows7-x64
3钱包收�...�-.exe
windows10-2004-x64
3Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 21:27
Behavioral task
behavioral1
Sample
-°¦n+¦++.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
-°¦n+¦++.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
PC远控测试-.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
PC远控测试-.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
vip文件捆绑器.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
vip文件捆绑器.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
远程控制 测试- (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
远程控制 测试- (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
远程控制 测试- (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
远程控制 测试- (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
远程控制 测试-.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
远程控制 测试-.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
远程控制 测试-.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
远程控制 测试-.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
钱包收款地址强制更改器- (2).exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
钱包收款地址强制更改器- (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
钱包收款地址强制更改器-.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
钱包收款地址强制更改器-.exe
Resource
win10v2004-20241007-en
General
-
Target
菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe
-
Size
340KB
-
MD5
f2b6aae38b2a7d7eccd29f0293420d72
-
SHA1
da9209e98438a66c6453010f65e2b5c427382963
-
SHA256
db0c34fd60009271f420ab7adaf04d4476d7939892b217930fffcb9757be60e2
-
SHA512
d3c49e2d6fb731c747144e1bb301f390aeb34b1e399c841bc76287519d6ad13cb34e4a3ae24986b0f43e94c31d40e357d51d360a436b7651a4d539c8fad99951
-
SSDEEP
6144:uAtrKrjDnYCADp9VekbJ2tPJKA1jImwa6mcF:DmYpDFbJ2s0jIxmc
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\getip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\??????????????????.MP4.exe" 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cdefgh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\??????????????????.MP4.exe" 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1132 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 1132 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 1132 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 1132 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 1132 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 1132 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1132 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 1132 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1132 wrote to memory of 2712 1132 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 82 PID 1132 wrote to memory of 2712 1132 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 82 PID 1132 wrote to memory of 2712 1132 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 82 PID 1132 wrote to memory of 2712 1132 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 82 PID 1132 wrote to memory of 2712 1132 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe"C:\Users\Admin\AppData\Local\Temp\菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵
- System Location Discovery: System Language Discovery
PID:2712
-