Analysis

  • max time kernel
    124s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 06:26

General

  • Target

    869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe

  • Size

    1.1MB

  • MD5

    a26369f797590c4e519bcf5088567904

  • SHA1

    b308396e4b0776e8dbec0288bb36dd7b4988dacb

  • SHA256

    869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e

  • SHA512

    f43935cf498e40e0774a4b9f2ecde718f3a165ccaf337da091e5e5ad15d16354d93b2ae60c11574dcdb30c62b0dc2502095d412387074ede2ab6129ef64d3873

  • SSDEEP

    24576:CFE//Tct4bOsAgXi/PdSmAL/stGYHLdU2SMO1N2h7HZ5ytBB7+p3uMnRs:QSVAgXiwOLHL+2BpHqjB60F

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 44 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe
    "C:\Users\Admin\AppData\Local\Temp\869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.5015.cn/?newth3
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:988
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:988 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:592
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ping 127.0.0.1 -n 3&del/q/s "C:\Users\Admin\AppData\Local\Temp\869954e2ec1483889967e93044050074d845eea0a3d7001c8b12f2d2c9470c6e.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 3
        3⤵
        • Runs ping.exe
        PID:1956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3ILO5Q2V.txt

    Filesize

    603B

    MD5

    ebae95db838e183707217f33ccefd65c

    SHA1

    cc97883ffa49d4636e64a73f45bf4e32fde0e20a

    SHA256

    6e8c6f834ba9dd3c4b50bcd0a0a55ebde25f7a174abf215b790acf3f09bfcf52

    SHA512

    a824c659b4d501509060d335932bf9b2ab3b654ba29b4fd3ece27559824702caa0b07ca285aa9af0d909d421d4fc117d4889f4543dfff57c8913b212c77acb35

  • \Program Files (x86)\TheWorld3\世界之窗.exe

    Filesize

    1.4MB

    MD5

    9bfe658cfc944ad9adba1620b5d466b4

    SHA1

    034aba118ba053e168e80e29671a9ec4674c2f12

    SHA256

    931cf24254954bb1516f415d8ff4ff8a4478c922b993d3e29f3586cab4172bbb

    SHA512

    86d59322b5592b00c71a177775566dd77dc6a68bd4261ae4faf5778d894893420105ea60e8feb6e8b7dbe0e7d76e1fa0e63a58508b14b192cc81f724d7cfd4b8

  • memory/1932-54-0x0000000075F51000-0x0000000075F53000-memory.dmp

    Filesize

    8KB

  • memory/1932-55-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/1932-57-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/1932-60-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB