Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 03:53

General

  • Target

    6e303601af3f39756e878c1014eea78f0f89542783ee1ef02dbe66b54b154f08.exe

  • Size

    88KB

  • MD5

    40c4a6f1ecab4462dd086731cb551ee2

  • SHA1

    40c2130399c50a697488f4503ba4f647373c0206

  • SHA256

    6e303601af3f39756e878c1014eea78f0f89542783ee1ef02dbe66b54b154f08

  • SHA512

    ce0cefd14164e696ec073760c9e19e6853a50c6a3ccda94555024d35e23a744f4e37b15759383753ab729b8165ecf57f7f19471f9e8e989b70c797a9bd60dde5

  • SSDEEP

    1536:dXNXdlRH+Dwk4cSGesvhC8plnQ85+HwClgfTQqPTFTCtOQ8CcfiQ:ddtlRH+UxGzh3HQ85+QqoTBfiQ

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 7 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e303601af3f39756e878c1014eea78f0f89542783ee1ef02dbe66b54b154f08.exe
    "C:\Users\Admin\AppData\Local\Temp\6e303601af3f39756e878c1014eea78f0f89542783ee1ef02dbe66b54b154f08.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\windows\svchosts.exe
      C:\windows\svchosts.exe auto
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1236
    • C:\progra~1\Intern~1\iexplore.exe
      C:\\progra~1\\Intern~1\\iexplore.exe http://jianqiangzhe1.com/AddSetup.asp?id=137&localID=QM00013&isqq=3
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1336 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1496

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6VDJ5BZJ.txt

    Filesize

    599B

    MD5

    972f83524898a1b4edc5d4528a29f94b

    SHA1

    2da79da46683406d3c5b2044cd604fc6ffdef44e

    SHA256

    06ebf6b12fd2bb0b1fc3b429d19eb0c6427c377388667c84d7d5113a0172d62d

    SHA512

    5ba0d6b14da614d0a3646db48b17160c864963742bf85815b383a46057000bb254d1c4f810c3afb73fc42c40d98ec9ed533585d34436d43c92539914212ae3ca

  • C:\Windows\svchosts.exe

    Filesize

    88KB

    MD5

    40c4a6f1ecab4462dd086731cb551ee2

    SHA1

    40c2130399c50a697488f4503ba4f647373c0206

    SHA256

    6e303601af3f39756e878c1014eea78f0f89542783ee1ef02dbe66b54b154f08

    SHA512

    ce0cefd14164e696ec073760c9e19e6853a50c6a3ccda94555024d35e23a744f4e37b15759383753ab729b8165ecf57f7f19471f9e8e989b70c797a9bd60dde5

  • memory/892-64-0x0000000075141000-0x0000000075143000-memory.dmp

    Filesize

    8KB

  • memory/892-54-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/892-66-0x00000000002B0000-0x00000000002E1000-memory.dmp

    Filesize

    196KB

  • memory/892-65-0x00000000002B0000-0x00000000002E1000-memory.dmp

    Filesize

    196KB

  • memory/892-68-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/892-69-0x00000000002B0000-0x00000000002E1000-memory.dmp

    Filesize

    196KB

  • memory/892-70-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/892-57-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/1236-60-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/1236-67-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB