Analysis
-
max time kernel
4s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 13:45
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe
-
Size
1.4MB
-
MD5
d6affe0bfbe329109f5dc3e785fce0b4
-
SHA1
cc340be4c3fcb28c2ad22169eb90cf12ecf017f3
-
SHA256
8e56c3d8c063172bf227e1980b09c41576440a1c3edef604cf5238f7c7299e3d
-
SHA512
40c63cfbe2c4d7ad095a871d3e9e53766c10d5f12719bc5f0e75773456807a25b9216d2647e91d3541fa105ac8e5991913d0034a91fcce13fdda6f7c15477388
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
炎黄大陆.exepid process 1612 炎黄大陆.exe -
Loads dropped DLL 7 IoCs
Processes:
SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe炎黄大陆.exepid process 1696 SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe 1696 SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe 1696 SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe 1696 SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe 1696 SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe 1696 SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe 1612 炎黄大陆.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 15 IoCs
Processes:
SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exedescription ioc process File created C:\Program Files (x86)\炎黄大陆\3.ico SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\SysBtn\MinFocus.bmp SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\SysBtn\MinNormal.bmp SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\Uninstall.exe SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\DuiLib_u.dll SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\nsUninstall.dat SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\炎黄大陆.exe SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\skin.xml SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\SysBtn\CloseNormal.bmp SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\SysBtn\MaxNormal.bmp SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\SysBtn\StoreFocus.bmp SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\SysBtn\StoreNormal.bmp SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\SysBtn\Thumbs.db SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\SysBtn\CloseFocus.bmp SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe File created C:\Program Files (x86)\炎黄大陆\SysBtn\MaxFocus.bmp SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exedescription pid process target process PID 1696 wrote to memory of 1612 1696 SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe 炎黄大陆.exe PID 1696 wrote to memory of 1612 1696 SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe 炎黄大陆.exe PID 1696 wrote to memory of 1612 1696 SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe 炎黄大陆.exe PID 1696 wrote to memory of 1612 1696 SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe 炎黄大陆.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Ursu.722681.19447.23377.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\炎黄大陆\炎黄大陆.exe"C:\Program Files (x86)\炎黄大陆\炎黄大陆.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1612
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
71c257d2f23f788477b91b77ad810cba
SHA1013e167637e18e7c55499e90c48681613389dee7
SHA256bc572a6d3508e13547df69962b4d2ef6432d098d530eff03b36678f1180a7b68
SHA512a1a37e6f08f20a23f3922ace14e8fdfbd2076ee703657f064d07846c7f53173eca8511f4e39c99ef997870d60008d967abe5fe6ec2ef104cad67fac5a4505623
-
MD5
38368601612714a437a3d89a95c8ac91
SHA16e719bb04a623b141c4726f2f5c71b7833419eac
SHA256ea36a9c8034cbea2a143c4ea91bc483bbe608c2dcabd6dba91a804a2f3e01a09
SHA5126f474881ea4fd95f4acdfc3619ac1153f91efbbc7840dd60be6b686577f1c0dc2bd36b5452d4f3e987e11491eaea6931db8cfbe905676ebc0059a940d5653712
-
MD5
71c257d2f23f788477b91b77ad810cba
SHA1013e167637e18e7c55499e90c48681613389dee7
SHA256bc572a6d3508e13547df69962b4d2ef6432d098d530eff03b36678f1180a7b68
SHA512a1a37e6f08f20a23f3922ace14e8fdfbd2076ee703657f064d07846c7f53173eca8511f4e39c99ef997870d60008d967abe5fe6ec2ef104cad67fac5a4505623
-
MD5
b2ef813fe853ef7fc6d8658b06e813c7
SHA1928c42dedb449e283263a96617bc3f5af11a1a55
SHA256f4b0f26e4ba9a95c7526e4b84ad3a966155675d920d1ce144594f0f12787c26d
SHA5126fb9eb01789ee4dea3215f0b5cfd75a3f9d3bbf2b99144997dff7518da6a5c58fc47f1d9a74300855669dea2e40c7687b63e629d98ceee86de958d1cebf354ca
-
MD5
38368601612714a437a3d89a95c8ac91
SHA16e719bb04a623b141c4726f2f5c71b7833419eac
SHA256ea36a9c8034cbea2a143c4ea91bc483bbe608c2dcabd6dba91a804a2f3e01a09
SHA5126f474881ea4fd95f4acdfc3619ac1153f91efbbc7840dd60be6b686577f1c0dc2bd36b5452d4f3e987e11491eaea6931db8cfbe905676ebc0059a940d5653712
-
MD5
38368601612714a437a3d89a95c8ac91
SHA16e719bb04a623b141c4726f2f5c71b7833419eac
SHA256ea36a9c8034cbea2a143c4ea91bc483bbe608c2dcabd6dba91a804a2f3e01a09
SHA5126f474881ea4fd95f4acdfc3619ac1153f91efbbc7840dd60be6b686577f1c0dc2bd36b5452d4f3e987e11491eaea6931db8cfbe905676ebc0059a940d5653712
-
MD5
38368601612714a437a3d89a95c8ac91
SHA16e719bb04a623b141c4726f2f5c71b7833419eac
SHA256ea36a9c8034cbea2a143c4ea91bc483bbe608c2dcabd6dba91a804a2f3e01a09
SHA5126f474881ea4fd95f4acdfc3619ac1153f91efbbc7840dd60be6b686577f1c0dc2bd36b5452d4f3e987e11491eaea6931db8cfbe905676ebc0059a940d5653712
-
MD5
38368601612714a437a3d89a95c8ac91
SHA16e719bb04a623b141c4726f2f5c71b7833419eac
SHA256ea36a9c8034cbea2a143c4ea91bc483bbe608c2dcabd6dba91a804a2f3e01a09
SHA5126f474881ea4fd95f4acdfc3619ac1153f91efbbc7840dd60be6b686577f1c0dc2bd36b5452d4f3e987e11491eaea6931db8cfbe905676ebc0059a940d5653712
-
MD5
38368601612714a437a3d89a95c8ac91
SHA16e719bb04a623b141c4726f2f5c71b7833419eac
SHA256ea36a9c8034cbea2a143c4ea91bc483bbe608c2dcabd6dba91a804a2f3e01a09
SHA5126f474881ea4fd95f4acdfc3619ac1153f91efbbc7840dd60be6b686577f1c0dc2bd36b5452d4f3e987e11491eaea6931db8cfbe905676ebc0059a940d5653712