Analysis
-
max time kernel
35s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 10:18
Behavioral task
behavioral1
Sample
ƶ˰չ滮ͨһ 20141.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ƶ˰չ滮ͨһ 20141.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
ƶ˰չ滮ͨһ 20141.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
ƶ˰չ滮ͨһ 20141.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
ƶ˰չ滮ͨһ 20141.ppt
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
ƶ˰չ滮ͨһ 20141.ppt
Resource
win10v2004-20221111-en
General
-
Target
ƶ˰չ滮ͨһ 20141.exe
-
Size
788KB
-
MD5
c86d03cba652fb03c0a0c2ada52db647
-
SHA1
d6eb328096dee621b858722ffc83b1540a0e1539
-
SHA256
90a0e6bbc98028ac2ce8dddff5b952fdc0d0307d29a6fc339dac00f2d718bc9d
-
SHA512
5f59df65d91997e69c0ffa1ef6aaa27d0e725b8b57b3434cb5961d43c304e2258b7cbcf963af97e2fdbfe61ef48eb0c5d178fc535030796b7360db634c3a979f
-
SSDEEP
6144:+TBcx19YgC8Ukq9NXcHNINzsr5IW4Fxpr7dTHbmdUnmXr3w798:+TB09SkkNXKgor5IWk3rkegr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe rundll.exe" ƶ˰չ滮ͨһ 20141.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ƶ˰չ滮ͨһ 20141.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral3/memory/1260-61-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral3/memory/1260-62-0x0000000000400000-0x0000000000535000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\regsvr.exe" ƶ˰չ滮ͨһ 20141.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run ƶ˰չ滮ͨһ 20141.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\m: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\q: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\r: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\v: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\y: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\b: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\g: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\k: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\o: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\p: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\u: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\w: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\z: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\e: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\h: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\n: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\l: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\t: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\a: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\f: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\i: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\j: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\s: ƶ˰չ滮ͨһ 20141.exe File opened (read-only) \??\x: ƶ˰չ滮ͨһ 20141.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\system = "Winhelp.exe" ƶ˰չ滮ͨһ 20141.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral3/memory/1260-61-0x0000000000400000-0x0000000000535000-memory.dmp autoit_exe behavioral3/memory/1260-62-0x0000000000400000-0x0000000000535000-memory.dmp autoit_exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr.exe ƶ˰չ滮ͨһ 20141.exe File opened for modification C:\Windows\SysWOW64\regsvr.exe ƶ˰չ滮ͨһ 20141.exe File created C:\Windows\SysWOW64\winhelp.exe ƶ˰չ滮ͨһ 20141.exe File opened for modification C:\Windows\SysWOW64\winhelp.exe ƶ˰չ滮ͨһ 20141.exe File opened for modification C:\Windows\SysWOW64\setup.ini ƶ˰չ滮ͨһ 20141.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\winhelp.ini ƶ˰չ滮ͨһ 20141.exe File opened for modification C:\Windows\winhelp.ini ƶ˰չ滮ͨһ 20141.exe File created C:\Windows\regsvr.exe ƶ˰չ滮ͨһ 20141.exe File opened for modification C:\Windows\regsvr.exe ƶ˰չ滮ͨһ 20141.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe 1260 ƶ˰չ滮ͨһ 20141.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1260 wrote to memory of 1288 1260 ƶ˰չ滮ͨһ 20141.exe 27 PID 1260 wrote to memory of 1288 1260 ƶ˰չ滮ͨһ 20141.exe 27 PID 1260 wrote to memory of 1288 1260 ƶ˰չ滮ͨһ 20141.exe 27 PID 1260 wrote to memory of 1288 1260 ƶ˰չ滮ͨһ 20141.exe 27 PID 1288 wrote to memory of 2036 1288 cmd.exe 29 PID 1288 wrote to memory of 2036 1288 cmd.exe 29 PID 1288 wrote to memory of 2036 1288 cmd.exe 29 PID 1288 wrote to memory of 2036 1288 cmd.exe 29 PID 1260 wrote to memory of 472 1260 ƶ˰չ滮ͨһ 20141.exe 30 PID 1260 wrote to memory of 472 1260 ƶ˰չ滮ͨһ 20141.exe 30 PID 1260 wrote to memory of 472 1260 ƶ˰չ滮ͨһ 20141.exe 30 PID 1260 wrote to memory of 472 1260 ƶ˰չ滮ͨһ 20141.exe 30 PID 472 wrote to memory of 1532 472 cmd.exe 32 PID 472 wrote to memory of 1532 472 cmd.exe 32 PID 472 wrote to memory of 1532 472 cmd.exe 32 PID 472 wrote to memory of 1532 472 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ƶ˰չ滮ͨһ 20141.exe"C:\Users\Admin\AppData\Local\Temp\ƶ˰չ滮ͨһ 20141.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\winhelp.exe2⤵
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\winhelp.exe3⤵PID:1532
-
-