Analysis
-
max time kernel
104s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 16:01
Behavioral task
behavioral1
Sample
西游网络.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
西游网络.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
LYdlq.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
LYdlq.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
lsass.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
lsass.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
.exe
Resource
win7-20240903-en
General
-
Target
.exe
-
Size
6.4MB
-
MD5
b65bbb59533176ff10083328ddaa18c7
-
SHA1
9f870ba135c4244db068c0bff7f875e904e535f0
-
SHA256
e0decd5e242a276ca03092e53e28f0a5d01741bfa3ba33170f1e7fa417b35618
-
SHA512
8dcab4b6dccb736f1bd55b3406b1598efa37e90153c71fb896755df9d65cde27ffcb7f01d2ee47edf572cd1cf36945d92050fe437a663649393e4294a4d18766
-
SSDEEP
98304:rQTzteK9NvJiP2Zje8tNJj669cERHEkN+nCFAD7aSwIfeaG4u6r:M/te2vJiP288tUdkSCFADOQe56r
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: .exe File opened (read-only) \??\X: .exe File opened (read-only) \??\Z: .exe File opened (read-only) \??\K: .exe File opened (read-only) \??\L: .exe File opened (read-only) \??\W: .exe File opened (read-only) \??\P: .exe File opened (read-only) \??\A: .exe File opened (read-only) \??\E: .exe File opened (read-only) \??\M: .exe File opened (read-only) \??\O: .exe File opened (read-only) \??\R: .exe File opened (read-only) \??\V: .exe File opened (read-only) \??\J: .exe File opened (read-only) \??\N: .exe File opened (read-only) \??\Q: .exe File opened (read-only) \??\S: .exe File opened (read-only) \??\T: .exe File opened (read-only) \??\U: .exe File opened (read-only) \??\Y: .exe File opened (read-only) \??\B: .exe File opened (read-only) \??\G: .exe File opened (read-only) \??\H: .exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language .exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5724 .exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5724 .exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5724 .exe 5724 .exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\.exe"C:\Users\Admin\AppData\Local\Temp\.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5724
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1