Overview
overview
8Static
static
1.exe
windows7_x64
11.exe
windows10_x64
8Fallen.exe
windows7_x64
8Fallen.exe
windows10_x64
8Inte.exe
windows7_x64
8Inte.exe
windows10_x64
8LX64
windows7_x64
1LX64
windows10_x64
1Server.exe
windows7_x64
8Server.exe
windows10_x64
8hfs.exe
windows7_x64
6hfs.exe
windows10_x64
6hfs_1.exe
windows7_x64
6hfs_1.exe
windows10_x64
6hg
windows7_x64
1hg
windows10_x64
1java
windows7_x64
1java
windows10_x64
1moren.exe
windows7_x64
6moren.exe
windows10_x64
6Analysis
-
max time kernel
104s -
max time network
109s -
platform
windows10_x64 -
resource
win10v200217 -
submitted
10-03-2020 00:09
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7v200217
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v200217
Behavioral task
behavioral3
Sample
Fallen.exe
Resource
win7v200217
Behavioral task
behavioral4
Sample
Fallen.exe
Resource
win10v200217
Behavioral task
behavioral5
Sample
Inte.exe
Resource
win7v200217
Behavioral task
behavioral6
Sample
Inte.exe
Resource
win10v200217
Behavioral task
behavioral7
Sample
LX64
Resource
win7v200217
Behavioral task
behavioral8
Sample
LX64
Resource
win10v200217
Behavioral task
behavioral9
Sample
Server.exe
Resource
win7v200217
Behavioral task
behavioral10
Sample
Server.exe
Resource
win10v200217
Behavioral task
behavioral11
Sample
hfs.exe
Resource
win7v200217
Behavioral task
behavioral12
Sample
hfs.exe
Resource
win10v200217
Behavioral task
behavioral13
Sample
hfs_1.exe
Resource
win7v200217
Behavioral task
behavioral14
Sample
hfs_1.exe
Resource
win10v200217
Behavioral task
behavioral15
Sample
hg
Resource
win7v200217
Behavioral task
behavioral16
Sample
hg
Resource
win10v200217
Behavioral task
behavioral17
Sample
java
Resource
win7v200217
Behavioral task
behavioral18
Sample
java
Resource
win10v200217
Behavioral task
behavioral19
Sample
moren.exe
Resource
win7v200217
Behavioral task
behavioral20
Sample
moren.exe
Resource
win10v200217
General
-
Target
1.exe
-
Size
103KB
-
MD5
4a953a639593adb97eacef0e3992b818
-
SHA1
ecf5ae2648ec0660c82912c0fd6ecc7fbfab9df2
-
SHA256
f3ea4dfbb6a31ba417d3e9caa90159e0e786226743a7b5ed04701f847054366f
-
SHA512
ea701c6474dfa1d910c5c3abbfa01e615bab73521f841eb15b9d76488cff6e6aa33caff4c7c65bfc97f8ff47e06e17e9979cd0ff305fd18aed76729500822e3b
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
Processes:
Sougou.exedescription ioc process File created C:\progra~1\Common Files\Sogou.exe Sougou.exe -
Modifies service 2 TTPs 17 IoCs
Processes:
Sogou.exe1.exeSougou.exeSogou.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\By:»ð¸ç\Description = "Äã²ÂÕâÊǸÉʲôµÎ£¡" Sogou.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS\InitTime = "20200310" 1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS\InitTime = "20200310" Sogou.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS\Version = "V1.0" Sogou.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS Sougou.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS\InitTime = "20200310" Sougou.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS\Version = "V1.0" Sougou.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS\Group = "rj" 1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS\InitTime = "20200310" Sogou.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS\Version = "V1.0" Sogou.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS\Group = "rj" Sogou.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS 1.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS Sogou.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS\Group = "rj" Sogou.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS Sogou.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS\Version = "V1.0" 1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BITS\Group = "rj" Sougou.exe -
Adds Run entry to start application 2 TTPs 4 IoCs
Processes:
1.exeSougou.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Ball = "C:\\progra~1\\Common Files\\Sogou.exe" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Sougou.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Ball = "C:\\progra~1\\Common Files\\Sogou.exe" Sougou.exe -
Drops file in System32 directory 1 IoCs
Processes:
Sogou.exedescription ioc process File created C:\Windows\SysWOW64\Sougou.exe Sogou.exe -
Suspicious behavior: RenamesItself 3 IoCs
Processes:
1.exeSogou.exeSogou.exepid process 4052 1.exe 2076 Sogou.exe 3668 Sogou.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1.exeSougou.exedescription pid process target process PID 4052 wrote to memory of 2076 4052 1.exe Sogou.exe PID 4052 wrote to memory of 2076 4052 1.exe Sogou.exe PID 4052 wrote to memory of 2076 4052 1.exe Sogou.exe PID 3956 wrote to memory of 3668 3956 Sougou.exe Sogou.exe PID 3956 wrote to memory of 3668 3956 Sougou.exe Sogou.exe PID 3956 wrote to memory of 3668 3956 Sougou.exe Sogou.exe -
Executes dropped EXE 1 IoCs
Processes:
Sougou.exepid process 3956 Sougou.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Modifies service
- Adds Run entry to start application
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\progra~1\Common Files\Sogou.exe"C:\progra~1\Common Files\Sogou.exe"2⤵
- Modifies service
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
-
C:\Windows\SysWOW64\Sougou.exeC:\Windows\SysWOW64\Sougou.exe1⤵
- Drops file in Program Files directory
- Modifies service
- Adds Run entry to start application
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
-
C:\progra~1\Common Files\Sogou.exe"C:\progra~1\Common Files\Sogou.exe"2⤵
- Modifies service
- Suspicious behavior: RenamesItself