Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 11:01
Behavioral task
behavioral1
Sample
Baidu_Com_90000215.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Baidu_Com_90000215.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
ӛ-14.9.26.1.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
ӛ-14.9.26.1.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
QQ.url
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
QQ.url
Resource
win10v2004-20220812-en
General
-
Target
Baidu_Com_90000215.exe
-
Size
1.4MB
-
MD5
20dbd1541448c659e921ca523da62e8b
-
SHA1
59dfc6db7e026c5a27e89983d55be83aadf3a909
-
SHA256
0215531b7de01049eb626ab9c35f5e1264263bd11b120964a6ee34193e60561a
-
SHA512
ae4392893614f76bd2588cd9efa46dc6a5e14e3f2d23cf6da2d158f9bc70201a074558e8d103640c78a58d5dac5a84b1096e0a459c7917d6f8f5bb2adf71ff0b
-
SSDEEP
24576:aCfFgOHDg89bvfpETrWTVvqPldRv4dyB41Zk1J03xm4U5r1mqF+R3qo06QvuEjGn:RqOFbnaTrTTA041ZAKxFW8qFMan6Kudn
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 864 Baidu_Com_90000215.exe 864 Baidu_Com_90000215.exe 864 Baidu_Com_90000215.exe 864 Baidu_Com_90000215.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Baidu_Com_90000215.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid Baidu_Com_90000215.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd Baidu_Com_90000215.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid\SequenceID = 501a4cd94f408742a36548d91c78e02a Baidu_Com_90000215.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 864 Baidu_Com_90000215.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 864 Baidu_Com_90000215.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD5d184763cb4e62d531193978de7b82db2
SHA1f4824e6e58f50b1fd89396afa17d0f97d86895f7
SHA25663a233664064e22fd3260e4dc06293b8fa724e62071ad1cf8af9a4bb453e1dea
SHA51225bb657827c1c4ce410346e11e60fe954f62100731bd730405cba666d4eb7009dfd394053e2afabfd9981ea0eea5fa625f24805a1d4d24c7da44f6449eda7e1b
-
Filesize
1.3MB
MD5b540a866191f7fd20f5e6355bc2b094e
SHA1df01a0c011e88a1f860db41d474d3fe893f06082
SHA256ce3044e92a827fce76a75dbd817545506dcab76a5f4edac3c9cf37236a1eecb6
SHA512e65aa73a9e8118176f294edeb7a9dc3a71319b218a45de6073622b868bee2fab9d7b6f76577f846cc940b4b949ee0110fbb449df3d77c922464cf6ded1408331
-
Filesize
1.9MB
MD5763b532d651f0ad5e135d9b57bf4fba4
SHA123f1302f904a67a1fe0d48e11a435c2f36336196
SHA25650b3c45ede6fd2d77c4f040242b2174289767b18a3a084e7046133b05f93e173
SHA512a4ec0f5bfa30d3558935f4075a75aebf080ece324a550c573d8a424730693b030cd26b4862973e8da8937e610c287d64e96c2fd952b59324ed1822919a00737c
-
Filesize
636KB
MD5f0797dbe1af08f015da9b298d933bd43
SHA1653a424c60cc4795a75f2f661f869c4a60678976
SHA2563f3bfbfe70a4381d4e7f410163802a50ab21da0c01855944d52e07500bc519ce
SHA512de9a8ba4218a4155eb2cd6c37f857e41402caf2d439ae88d50e73bf6088c9d0151070f265462042d98caf1c4990093518e3d3a2d23f918340d70699118af3a99