Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2022, 01:59

General

  • Target

    3d99609d29ff105fb98e742e269ff7ba4bc660c3378ea261eada1ecb62c56913.exe

  • Size

    43KB

  • MD5

    48e8f2d02325efc478077b9c36eea2c7

  • SHA1

    a6e42979450ee8864d2e278677e72afe79eed705

  • SHA256

    3d99609d29ff105fb98e742e269ff7ba4bc660c3378ea261eada1ecb62c56913

  • SHA512

    f4e92864f04d56852731ba91d640ce2ef30dc8e5ed327e43e4b5d25f4f0d06cc07caf82eb86ee281fe852db2492d519df9f1418659df82a44b8d1dc6f786c873

  • SSDEEP

    768:yM8E/YC30zLP70lgrL9HI/ONvRCQ7UdBuOCUgNXmXHN:NYC38bgg9GQ7+CU4XmXHN

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d99609d29ff105fb98e742e269ff7ba4bc660c3378ea261eada1ecb62c56913.exe
    "C:\Users\Admin\AppData\Local\Temp\3d99609d29ff105fb98e742e269ff7ba4bc660c3378ea261eada1ecb62c56913.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\TenSafe.exe
      C:\Windows\TenSafe.exe auto
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:3772
    • C:\progra~1\Intern~1\iexplore.exe
      C:\\progra~1\\Intern~1\\iexplore.exe http://jianqiangzhe.com/AddSetup.asp?57;€UQ44457€7€5436536466$<>6<>4:$EQ€<8
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    6a15e3564b9eb382fe5534f59d6fccb4

    SHA1

    911dbc1a988c2d6816beb0c21c4ea5402253b884

    SHA256

    6b478c66c9a2024177d4a478ccea9a82f3162aa87a5125a0dc3750c920bdbc62

    SHA512

    2801f46d495eed08dbb10e73ccda4828faf4ef6b1ff3ff45ce8d73331e692381c25417d15c958f8c3f9c6932300cd0e66b1aad6bb5a92e2bf27b338b6d245711

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    665fc2927dc40190e8e2611c23fb2397

    SHA1

    9df355824e0fec794d20cadea3daee3175bda3a8

    SHA256

    d55f8ffce111d5bd41dfe5965bb2381bc9049e44040e100db5fd8449b1e50da1

    SHA512

    e0156d1f8177e3909ad31f2a4a7c1d6a368fc2a699d4dfd6bce983e829af431462817c39511dd4f8b82e7d108c1a7ec098977a9d4ecfb667f319b0a69934bac6

  • C:\Windows\TenSafe.exe

    Filesize

    43KB

    MD5

    48e8f2d02325efc478077b9c36eea2c7

    SHA1

    a6e42979450ee8864d2e278677e72afe79eed705

    SHA256

    3d99609d29ff105fb98e742e269ff7ba4bc660c3378ea261eada1ecb62c56913

    SHA512

    f4e92864f04d56852731ba91d640ce2ef30dc8e5ed327e43e4b5d25f4f0d06cc07caf82eb86ee281fe852db2492d519df9f1418659df82a44b8d1dc6f786c873

  • C:\Windows\TenSafe.exe

    Filesize

    43KB

    MD5

    48e8f2d02325efc478077b9c36eea2c7

    SHA1

    a6e42979450ee8864d2e278677e72afe79eed705

    SHA256

    3d99609d29ff105fb98e742e269ff7ba4bc660c3378ea261eada1ecb62c56913

    SHA512

    f4e92864f04d56852731ba91d640ce2ef30dc8e5ed327e43e4b5d25f4f0d06cc07caf82eb86ee281fe852db2492d519df9f1418659df82a44b8d1dc6f786c873

  • memory/1444-171-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-193-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-146-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-147-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-148-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-149-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-151-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-150-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-152-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-153-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-155-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-156-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-158-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-160-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-161-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-162-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-163-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-164-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-166-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-168-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-169-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-170-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-143-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-172-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-145-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-175-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-176-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-180-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-181-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-182-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-183-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-184-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-189-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-190-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-191-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-192-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-173-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-194-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-196-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-197-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-201-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-174-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/1444-142-0x00007FFA9ABD0000-0x00007FFA9AC3E000-memory.dmp

    Filesize

    440KB

  • memory/2432-219-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2432-215-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2432-132-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/3772-140-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/3772-216-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB