Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-09-2022 05:42
Static task
static1
Behavioral task
behavioral1
Sample
兵河五四.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
兵河五四.exe
Resource
win10v2004-20220812-en
General
-
Target
兵河五四.exe
-
Size
83KB
-
MD5
d95807b22dc5cf5d323bf18172915159
-
SHA1
cdf4ca83655b8a695274f0f775e2bf0d50923b0f
-
SHA256
25d9443bf5cbec1449ec6bdee3c638ae3f1a61591af213d0c50e352010389538
-
SHA512
08a3d5833e0808bb6d1e851eb2a6a097b050c448d043acb1813bcff4da3ee5f23884ea6a0a4a30a60a38ce3a7663e44d309ed2048622d9ce3a3bb076949b6435
-
SSDEEP
1536:GAT7zA8QK45RlbKxGoy90tytopnpO5JXsEI:GATtQdtKKitaopnpmI
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\showsuperhidden = "0" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
兵河五四.execmd.exemshta.exe兵河五四.execmd.execmd.exedescription pid process target process PID 1952 wrote to memory of 668 1952 兵河五四.exe cmd.exe PID 1952 wrote to memory of 668 1952 兵河五四.exe cmd.exe PID 1952 wrote to memory of 668 1952 兵河五四.exe cmd.exe PID 668 wrote to memory of 1456 668 cmd.exe mode.com PID 668 wrote to memory of 1456 668 cmd.exe mode.com PID 668 wrote to memory of 1456 668 cmd.exe mode.com PID 668 wrote to memory of 1928 668 cmd.exe mshta.exe PID 668 wrote to memory of 1928 668 cmd.exe mshta.exe PID 668 wrote to memory of 1928 668 cmd.exe mshta.exe PID 1928 wrote to memory of 2036 1928 mshta.exe 兵河五四.exe PID 1928 wrote to memory of 2036 1928 mshta.exe 兵河五四.exe PID 1928 wrote to memory of 2036 1928 mshta.exe 兵河五四.exe PID 2036 wrote to memory of 1048 2036 兵河五四.exe cmd.exe PID 2036 wrote to memory of 1048 2036 兵河五四.exe cmd.exe PID 2036 wrote to memory of 1048 2036 兵河五四.exe cmd.exe PID 1048 wrote to memory of 2000 1048 cmd.exe mode.com PID 1048 wrote to memory of 2000 1048 cmd.exe mode.com PID 1048 wrote to memory of 2000 1048 cmd.exe mode.com PID 1048 wrote to memory of 1256 1048 cmd.exe reg.exe PID 1048 wrote to memory of 1256 1048 cmd.exe reg.exe PID 1048 wrote to memory of 1256 1048 cmd.exe reg.exe PID 1048 wrote to memory of 684 1048 cmd.exe reg.exe PID 1048 wrote to memory of 684 1048 cmd.exe reg.exe PID 1048 wrote to memory of 684 1048 cmd.exe reg.exe PID 1048 wrote to memory of 652 1048 cmd.exe cmd.exe PID 1048 wrote to memory of 652 1048 cmd.exe cmd.exe PID 1048 wrote to memory of 652 1048 cmd.exe cmd.exe PID 652 wrote to memory of 1844 652 cmd.exe reg.exe PID 652 wrote to memory of 1844 652 cmd.exe reg.exe PID 652 wrote to memory of 1844 652 cmd.exe reg.exe PID 652 wrote to memory of 1044 652 cmd.exe find.exe PID 652 wrote to memory of 1044 652 cmd.exe find.exe PID 652 wrote to memory of 1044 652 cmd.exe find.exe PID 1048 wrote to memory of 812 1048 cmd.exe reg.exe PID 1048 wrote to memory of 812 1048 cmd.exe reg.exe PID 1048 wrote to memory of 812 1048 cmd.exe reg.exe PID 1048 wrote to memory of 1596 1048 cmd.exe reg.exe PID 1048 wrote to memory of 1596 1048 cmd.exe reg.exe PID 1048 wrote to memory of 1596 1048 cmd.exe reg.exe PID 1048 wrote to memory of 528 1048 cmd.exe reg.exe PID 1048 wrote to memory of 528 1048 cmd.exe reg.exe PID 1048 wrote to memory of 528 1048 cmd.exe reg.exe PID 1048 wrote to memory of 1756 1048 cmd.exe reg.exe PID 1048 wrote to memory of 1756 1048 cmd.exe reg.exe PID 1048 wrote to memory of 1756 1048 cmd.exe reg.exe PID 1048 wrote to memory of 968 1048 cmd.exe reg.exe PID 1048 wrote to memory of 968 1048 cmd.exe reg.exe PID 1048 wrote to memory of 968 1048 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\兵河五四.exe"C:\Users\Admin\AppData\Local\Temp\兵河五四.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0Y7795XX.cmd" "C:\Users\Admin\AppData\Local\Temp\兵河五四.exe""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con: cols=65 lines=253⤵
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("shell.application").shellexecute("""C:\Users\Admin\AppData\Local\Temp\兵河五四.exe""","::",,"runas",1)(window.close)3⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\兵河五四.exe"C:\Users\Admin\AppData\Local\Temp\兵河五四.exe" ::4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\455H0QTV.cmd" "C:\Users\Admin\AppData\Local\Temp\兵河五四.exe" ::"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con: cols=65 lines=256⤵
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\Currentversion\Explorer\Advanced /v showsuperhidden /t REG_DWORD /d 0 /f6⤵
- Modifies visiblity of hidden/system files in Explorer
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\Currentversion\Explorer\Advanced /v hidden /t REG_DWORD /d 0 /f6⤵
- Modifies registry key
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKEY_USERS"|find /i "\S-1-5-"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg query "HKEY_USERS"7⤵
-
C:\Windows\system32\find.exefind /i "\S-1-5-"7⤵
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-19\Software\Classes\Interface\{24C6680A-2378-200A-21BE-26C09F4CAAF5}" /f6⤵
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-20\Software\Classes\Interface\{24C6680A-2378-200A-21BE-26C09F4CAAF5}" /f6⤵
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Classes\Interface\{24C6680A-2378-200A-21BE-26C09F4CAAF5}" /f6⤵
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Software\Classes\Interface\{24C6680A-2378-200A-21BE-26C09F4CAAF5}" /f6⤵
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-18\Software\Classes\Interface\{24C6680A-2378-200A-21BE-26C09F4CAAF5}" /f6⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0Y7795XX.cmdFilesize
1KB
MD54259ed610d43ff260feb6de379ceb836
SHA1797602b586e49a07653eb0977ad303f2250f3634
SHA256cd9004d399fc0bf8b987564cd94340fb8aba91c3d631e54cd2d6f9da82969f6c
SHA51279c835e25928cc2d4298d5c3ff27eda9156087cc169574d9b169a3ce2763e8abdda842851a3fd8657259ac8a153de250e0d3aa8ebb36f3315c37fd73e2141cf1
-
C:\Users\Admin\AppData\Local\Temp\455H0QTV.cmdFilesize
1KB
MD54259ed610d43ff260feb6de379ceb836
SHA1797602b586e49a07653eb0977ad303f2250f3634
SHA256cd9004d399fc0bf8b987564cd94340fb8aba91c3d631e54cd2d6f9da82969f6c
SHA51279c835e25928cc2d4298d5c3ff27eda9156087cc169574d9b169a3ce2763e8abdda842851a3fd8657259ac8a153de250e0d3aa8ebb36f3315c37fd73e2141cf1
-
memory/528-70-0x0000000000000000-mapping.dmp
-
memory/652-65-0x0000000000000000-mapping.dmp
-
memory/668-54-0x0000000000000000-mapping.dmp
-
memory/684-64-0x0000000000000000-mapping.dmp
-
memory/812-68-0x0000000000000000-mapping.dmp
-
memory/968-72-0x0000000000000000-mapping.dmp
-
memory/1044-67-0x0000000000000000-mapping.dmp
-
memory/1048-60-0x0000000000000000-mapping.dmp
-
memory/1256-63-0x0000000000000000-mapping.dmp
-
memory/1456-56-0x0000000000000000-mapping.dmp
-
memory/1596-69-0x0000000000000000-mapping.dmp
-
memory/1756-71-0x0000000000000000-mapping.dmp
-
memory/1844-66-0x0000000000000000-mapping.dmp
-
memory/1928-58-0x000007FEFB7B1000-0x000007FEFB7B3000-memory.dmpFilesize
8KB
-
memory/1928-57-0x0000000000000000-mapping.dmp
-
memory/2000-62-0x0000000000000000-mapping.dmp
-
memory/2036-59-0x0000000000000000-mapping.dmp