Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 19:13

General

  • Target

    8d3e1524f58f0432d0031b49218350faf5f936e1eb7b0394c58e316337e2c831.exe

  • Size

    2.5MB

  • MD5

    5e4f6f9342dd61cb750a2bf2462e82a9

  • SHA1

    ea85b1c851ec413fb9f7a4df6b7990f67d20a623

  • SHA256

    8d3e1524f58f0432d0031b49218350faf5f936e1eb7b0394c58e316337e2c831

  • SHA512

    cba140903fc2a37395feef57732232ffdc8cac5031f79bf0e8c723fba82ebf143ce635906506b0a1c263b72ba17b956849fcc08d1d00f412efbc9ffa0a0a5f1a

Malware Config

Signatures

  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d3e1524f58f0432d0031b49218350faf5f936e1eb7b0394c58e316337e2c831.exe
    "C:\Users\Admin\AppData\Local\Temp\8d3e1524f58f0432d0031b49218350faf5f936e1eb7b0394c58e316337e2c831.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.tiantusoft.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1048 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1980

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C
    Filesize

    471B

    MD5

    9a989f35df80151f4a182d91cfddba1f

    SHA1

    1b3615d6d5ef72900488adcbf7a9bad409177683

    SHA256

    a592c3bf95e1814bb68d581617ba505ea515e873f5841167990bd733de4bcf1f

    SHA512

    c5ffe4ec8d2097338758160d1ae7402258ebec46c382291011fec1fcbaf6a01b5bec2c398c08373f4a3dbfe63d35efccac16c5ad7d5adff006f3377291914532

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_4526C34C7242D5286A61D28DFF0D2161
    Filesize

    471B

    MD5

    45866f7f8a503ad0dc2fbe5d6638cbf8

    SHA1

    0d76fada82bd84785be3d22baa15f5a3f15e195b

    SHA256

    c0260d382d68fd5666a9d0046c7d425f35cc6c0ac667b0e1b9a96cdac224daa0

    SHA512

    7d768fd325b40d6fdc3d60058dfea0192c79edae511d1adb7ad11efcd4ac730ea4af69b90b480cd0bb53ca7af1633433c5358c4feb87c013a5e6d89cc5d40340

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_BDB52D4A140D226319D8CF4CEA8486D7
    Filesize

    471B

    MD5

    33c270707c7ee3e4aa46a7770e4bf7d5

    SHA1

    2264fa2004ecf16b04f69e76ceb1613a0ea281e8

    SHA256

    115de087a412bb9819a94d2ddbe6fbe1e3a4af964539d8b42b7dc1ba47b77de2

    SHA512

    583f31b1ccb598bebcd53bd54ebb3eb87070b688ebf8b35a9721f2fdde4e24341021d21fb85a765e980365c6a1478f6b52bc724b9e9857d81f49a41c0d63f3c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C
    Filesize

    428B

    MD5

    19bf5085b0a2fa113d13b9a70e9b6d52

    SHA1

    cfad7146558b13f844479851bc630331b99a3cb9

    SHA256

    9c8917e4bc7653b8350c23c190f81da655ab19f08035961926c2cf2e0e28c905

    SHA512

    c627251b1089ba9c396e749293705caa1e98940063b0e89326a23446f3be1d34884b1498ac1266803de3db611e68bc96f1148759b6779d2c7dc1d9596db4b2f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9a74e41aea9bf404932fce86603ae2d5

    SHA1

    4e5268e980806a1793ba5c8a07334e54c86c5d5c

    SHA256

    a4ba197de8d24467301c313a43413525d2496cae1a891acec1e2a986d02e14ac

    SHA512

    c2560aeb9214de1497126d27ffab61093ae5cd799fa0ee8da5a7cd594f1d332c0ad6bbb20984a478b81481acb6240a76bea5e59020798b787c438613c0c3c904

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_4526C34C7242D5286A61D28DFF0D2161
    Filesize

    398B

    MD5

    a6fe23146e4b91875de915cc18675319

    SHA1

    ee5ef0e0d18e3fb56865b0531bfde5d6f353f414

    SHA256

    2355168893967cf9de69d87a61bd2188610c4a81b4a3cb5948969ec873287684

    SHA512

    51d432557e5aeca84b64b327baa47e338d3d2707bd9cf46d03962afd6c7c8fd50eba391e6fafbff41c1138f8af48f94dc6caeaed76ee8097349563183e7a4c71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_BDB52D4A140D226319D8CF4CEA8486D7
    Filesize

    398B

    MD5

    8068eefda324cec0ea64346f535b906b

    SHA1

    c6bdb02f43c051fbdd3eec10295e5509715c368f

    SHA256

    d3c3d3a55cd11eb21d8d10b306b710b13eb705a9fe650d789a14946d0e5b69af

    SHA512

    4de966a2a02f14e128b76b05a74fb1bab034029f175361c4293d31a58e2e4124404334f85de73362070997f8599329b0616b2f79e5cbd2ec8ac970609edb54b3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1b4wh1e\imagestore.dat
    Filesize

    8KB

    MD5

    42bfe1a96b846f81702116e5272ea2f7

    SHA1

    43188dde1f0aaffedc30c7c25923270290056e6e

    SHA256

    b4077a6f378067300f98a7e0b38948ff86855099e1cf6e51a7b7c3674e04d2ea

    SHA512

    324fcc73bc1d75d38308c9d0c5aab4bb55f3a85eb98f5f45fef6fe4fb5b9ada0dd7b6b343093d13545d6ce1258df609dd80ca2d3afe348428f098777514ca6ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8VTEASET.txt
    Filesize

    608B

    MD5

    4832453234afd6b91d3e0fd59a94a2f3

    SHA1

    574d1fb2084906a8644d3fc9ea09ebb0b4a08d98

    SHA256

    0a49e4189b5cf7a467d5473f56334d396cd159cf29c8327800cafa3033e52743

    SHA512

    85a222862191ec1179dda2ab536da7e006330ba15b0ef150d9575ab54384cfcad3aa9ecfc25745080d5f663730dc065d97fc4b7bd1b7283c5f7e3f4ae50e5cad

  • memory/1640-71-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-79-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-81-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-85-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-89-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-93-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-97-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-101-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-99-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-95-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-91-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-87-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-83-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-77-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-75-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-67-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-63-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-61-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-54-0x0000000076241000-0x0000000076243000-memory.dmp
    Filesize

    8KB

  • memory/1640-73-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-69-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-65-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-60-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-59-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-57-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-58-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1640-55-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB