Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 14:18

General

  • Target

    0e6a25cbc84543de24e066cf5a3c9ba889dc2e37206b75d096a9c747352aa0d0.exe

  • Size

    333KB

  • MD5

    0ed013ddaf331351de0404c0a9380a40

  • SHA1

    a1ff6bf180f444cdbc1a584b75791f8eec075da3

  • SHA256

    0e6a25cbc84543de24e066cf5a3c9ba889dc2e37206b75d096a9c747352aa0d0

  • SHA512

    4a93a1c5eaeb55f2178c4f70d37c5b5a34545e761903a6bf6741d9947d2aa9f8a9bbe07a38cb8b15dc74eec2c07e2848085595e3a37b89249030568a9406d32b

  • SSDEEP

    6144:lYnenaO+ofOSaynZhXyepWZY5tGVcgjSYVaOLpV/FtoZDEqHkU:lpnaOl25rY5tGVcKSYLzoZwqEU

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e6a25cbc84543de24e066cf5a3c9ba889dc2e37206b75d096a9c747352aa0d0.exe
    "C:\Users\Admin\AppData\Local\Temp\0e6a25cbc84543de24e066cf5a3c9ba889dc2e37206b75d096a9c747352aa0d0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\AppData\Roaming\Spiritsoft\urlspirit\jlguaji.exe
      C:\Users\Admin\AppData\Roaming\Spiritsoft\urlspirit\jlguaji.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1792

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Spiritsoft\urlspirit\bd.dat

          Filesize

          13KB

          MD5

          e93a0f3c1593c2e545523e6e588a2cf5

          SHA1

          b09546b5cec5c5b99a32d9ce2dec5a71fa0da242

          SHA256

          550711d76522438658aac785865ae1981c37d2b3f5bc8ab5333aaec5a7145389

          SHA512

          c8780953a6d58ff5ee78749e603c17b76b2d279438cb683bacfb6c00f49eeb594f1d8139cfe825b9592be48e70694a083347df58a6b9c3c887d18e5b6e3c5021

        • C:\Users\Admin\AppData\Roaming\Spiritsoft\urlspirit\jlguaji.exe

          Filesize

          645KB

          MD5

          425dcd2af9e277b88e245887f84e63e1

          SHA1

          4449eacc382578ca8174129481d723284320c9b4

          SHA256

          7c52029eaaf76cc27b5640ca0b3a876e8efb17a7607cbe2c663a4a19defc7f54

          SHA512

          2b92bf9b1c5700920c1ecd04c3d13380f427697c8d3b4a38440bb124d06f9743dc5d18e7bc65255ea8299a5c33289f29a315cf7bf6f89fd64334ecc7c8fd3ef3

        • C:\Users\Admin\AppData\Roaming\Spiritsoft\urlspirit\jlguaji.exe

          Filesize

          645KB

          MD5

          425dcd2af9e277b88e245887f84e63e1

          SHA1

          4449eacc382578ca8174129481d723284320c9b4

          SHA256

          7c52029eaaf76cc27b5640ca0b3a876e8efb17a7607cbe2c663a4a19defc7f54

          SHA512

          2b92bf9b1c5700920c1ecd04c3d13380f427697c8d3b4a38440bb124d06f9743dc5d18e7bc65255ea8299a5c33289f29a315cf7bf6f89fd64334ecc7c8fd3ef3

        • C:\Users\Admin\AppData\Roaming\Spiritsoft\urlspirit\product.dat

          Filesize

          380B

          MD5

          b5423b660ccd59a122f51b9cf44d16c4

          SHA1

          df04d91ed9cf6758cd4b3370a24dee4d057c1d49

          SHA256

          8154d566e1d816740c4a6222ffa336a6f3861b37123b3e1566e834936bc5ce13

          SHA512

          622f3cc1b60115d0a01e6aa311764afc6900a68d686c6abd9513de5ccd79b321fa412400aba15e755add335977a5194f061b3ef60b6bb479d0033356cdb8b969

        • C:\Users\Admin\AppData\Roaming\Spiritsoft\urlspirit\tcfg.dat

          Filesize

          1KB

          MD5

          4dd2cf4196f898b41f5bf90d43681630

          SHA1

          d7bba347ddacedf7387d70cfa15f7b3e788b2307

          SHA256

          4544ecac7841fa425936937c4e5162d5cfa73a87a17ed2f5c2eb44534da6afe7

          SHA512

          e81a971d754b27f2c1f1c63471edec16b141f5800411ef53866f0f858cb28cb3eb8169ad77798ab3c09567d98f7d5c4f37eaecdaac464ebf024dfeced423e232

        • memory/1180-132-0x0000000000400000-0x000000000050A76A-memory.dmp

          Filesize

          1.0MB

        • memory/1180-133-0x0000000000400000-0x000000000050A76A-memory.dmp

          Filesize

          1.0MB

        • memory/1180-138-0x0000000000400000-0x000000000050A76A-memory.dmp

          Filesize

          1.0MB

        • memory/1180-139-0x0000000000400000-0x000000000050A76A-memory.dmp

          Filesize

          1.0MB