Overview
overview
5Static
static
5使用必读.url
windows7-x64
1使用必读.url
windows10-2004-x64
1如果无�...rk.url
windows7-x64
1如果无�...rk.url
windows10-2004-x64
1最新版�...��.url
windows7-x64
1最新版�...��.url
windows10-2004-x64
1洛克王�...��.exe
windows7-x64
5洛克王�...��.exe
windows10-2004-x64
5绿色软件园.url
windows7-x64
1绿色软件园.url
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 10:59
Behavioral task
behavioral1
Sample
使用必读.url
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
使用必读.url
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
如果无法运行,请先安装.NET Framework.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
如果无法运行,请先安装.NET Framework.url
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
最新版到ARP联盟搜索下载.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
最新版到ARP联盟搜索下载.url
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
洛克王国菲菲辅助9.4无广告版.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
洛克王国菲菲辅助9.4无广告版.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
绿色软件园.url
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
绿色软件园.url
Resource
win10v2004-20250314-en
General
-
Target
洛克王国菲菲辅助9.4无广告版.exe
-
Size
777KB
-
MD5
5dc2d981b20fd1f1e3d5df04ace02138
-
SHA1
2f867da7e8868ed82680f5ac5b9b483149c24613
-
SHA256
9b8452217e0e37d95ca9371aad6a6621ed6360d22fca53f4aa992d9b3f0d7a46
-
SHA512
f816a919378556b3ae5243e1fafe4d0e8722881806bec0be6d5d9b8e8fed7808c2c80d06212b31370892bb56ff541996c1bfe859c7b274ef455cf0fac133d3a6
-
SSDEEP
12288:PTJmFW/3ZEV+NYBOa2qqdC2wP/o4FuaYuZess/6oc8vt4hpzp6:P9mMvZEV+e4uq02wXRQa5IRyyGTzp
Malware Config
Signatures
-
resource yara_rule behavioral7/memory/1372-0-0x0000000000400000-0x00000000005E4000-memory.dmp upx behavioral7/memory/1372-5-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-53-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-52-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-51-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-48-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-46-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-43-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-41-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-39-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-37-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-34-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-32-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-30-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-28-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-25-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-23-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-21-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-19-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-16-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-14-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-12-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-8-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-6-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-4-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-3-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-1-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-58-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral7/memory/1372-57-0x0000000000400000-0x00000000005E4000-memory.dmp upx behavioral7/memory/1372-59-0x0000000000400000-0x00000000005E4000-memory.dmp upx behavioral7/memory/1372-62-0x0000000000400000-0x00000000005E4000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 洛克王国菲菲辅助9.4无广告版.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main 洛克王国菲菲辅助9.4无广告版.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1372 洛克王国菲菲辅助9.4无广告版.exe 1372 洛克王国菲菲辅助9.4无广告版.exe 1372 洛克王国菲菲辅助9.4无广告版.exe 1372 洛克王国菲菲辅助9.4无广告版.exe 1372 洛克王国菲菲辅助9.4无广告版.exe