Analysis
-
max time kernel
124s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 06:26
Behavioral task
behavioral1
Sample
869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe
Resource
win10v2004-20220812-en
General
-
Target
869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe
-
Size
1.1MB
-
MD5
a26369f797590c4e519bcf5088567904
-
SHA1
b308396e4b0776e8dbec0288bb36dd7b4988dacb
-
SHA256
869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e
-
SHA512
f43935cf498e40e0774a4b9f2ecde718f3a165ccaf337da091e5e5ad15d16354d93b2ae60c11574dcdb30c62b0dc2502095d412387074ede2ab6129ef64d3873
-
SSDEEP
24576:CFE//Tct4bOsAgXi/PdSmAL/stGYHLdU2SMO1N2h7HZ5ytBB7+p3uMnRs:QSVAgXiwOLHL+2BpHqjB60F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1932-55-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1932-57-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1932-60-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1188 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1932 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1932-57-0x0000000000400000-0x00000000004B5000-memory.dmp autoit_exe behavioral1/memory/1932-60-0x0000000000400000-0x00000000004B5000-memory.dmp autoit_exe -
Drops file in Program Files directory 44 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\TheWorld3\2\【台湾美食】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\在线网游.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\家电商城.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\favorder3.dat 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\【凡客诚品】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\【卓越特价商城】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\【当当商城】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\【疯狂购物】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\实用查询.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\百度.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\【台湾美食】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\【当当商城】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\【淘宝特卖】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\【网址导航】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\淘宝网.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\游戏下载.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\电视直播.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\【淘宝风云榜】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\实用查询.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\家居玩具.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\淘宝网.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\系统下载.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\【疯狂购物】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\世界之窗.exe 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\【凡客诚品】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\【淘宝特卖】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\【网址导航】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\在线网游.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\家居玩具.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\家电商城.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\世界之窗.ini 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\favorder3.dat 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\【卓越特价商城】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\【美容秘籍】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\百度.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\KSafe\cfg\ksfmon.ini 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\360\360Search.exe 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\世界之窗.exe 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\世界之窗.ini 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File created C:\Program Files (x86)\TheWorld3\2\【淘宝风云榜】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\【美容秘籍】.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\游戏下载.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\电视直播.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe File opened for modification C:\Program Files (x86)\TheWorld3\2\系统下载.url 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373923523" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d0fcf796ecd801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf000000000200000000001066000000010000200000007417c669da7523eacb5a66f6a7f3e3db61b1bf883a7b672a6c60fb2bce29aa07000000000e80000000020000200000007288d6ffef33b26bf9178374827f9649619151165bc43b0e59a95452993274f3200000002912cc9031a21a0f2b15074e0bd4766f1f2ed806f6bc13e96c0442026cf9222540000000beb99804027c15c63abf09e8509729c2a1ede179b5b57f856c8db3020990284db79cea92cdbc3c212818aa39b7526084468b9cdf05ac52831c9448d65196365a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{074820A1-588A-11ED-BD9E-FAB5137186BE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1956 PING.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 988 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1932 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe 1932 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe 988 iexplore.exe 988 iexplore.exe 592 IEXPLORE.EXE 592 IEXPLORE.EXE 592 IEXPLORE.EXE 592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1932 wrote to memory of 988 1932 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe 30 PID 1932 wrote to memory of 988 1932 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe 30 PID 1932 wrote to memory of 988 1932 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe 30 PID 1932 wrote to memory of 988 1932 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe 30 PID 1932 wrote to memory of 1188 1932 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe 31 PID 1932 wrote to memory of 1188 1932 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe 31 PID 1932 wrote to memory of 1188 1932 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe 31 PID 1932 wrote to memory of 1188 1932 869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe 31 PID 1188 wrote to memory of 1956 1188 cmd.exe 33 PID 1188 wrote to memory of 1956 1188 cmd.exe 33 PID 1188 wrote to memory of 1956 1188 cmd.exe 33 PID 1188 wrote to memory of 1956 1188 cmd.exe 33 PID 988 wrote to memory of 592 988 iexplore.exe 34 PID 988 wrote to memory of 592 988 iexplore.exe 34 PID 988 wrote to memory of 592 988 iexplore.exe 34 PID 988 wrote to memory of 592 988 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe"C:\Users\Admin\AppData\Local\Temp\869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.5015.cn/?newth32⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:988 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping 127.0.0.1 -n 3&del/q/s "C:\Users\Admin\AppData\Local\Temp\869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:1956
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD5ebae95db838e183707217f33ccefd65c
SHA1cc97883ffa49d4636e64a73f45bf4e32fde0e20a
SHA2566e8c6f834ba9dd3c4b50bcd0a0a55ebde25f7a174abf215b790acf3f09bfcf52
SHA512a824c659b4d501509060d335932bf9b2ab3b654ba29b4fd3ece27559824702caa0b07ca285aa9af0d909d421d4fc117d4889f4543dfff57c8913b212c77acb35
-
Filesize
1.4MB
MD59bfe658cfc944ad9adba1620b5d466b4
SHA1034aba118ba053e168e80e29671a9ec4674c2f12
SHA256931cf24254954bb1516f415d8ff4ff8a4478c922b993d3e29f3586cab4172bbb
SHA51286d59322b5592b00c71a177775566dd77dc6a68bd4261ae4faf5778d894893420105ea60e8feb6e8b7dbe0e7d76e1fa0e63a58508b14b192cc81f724d7cfd4b8