Overview
overview
8Static
static
81001下载乐园.url
windows7-x64
11001下载乐园.url
windows10-2004-x64
1EChartBar.dll
windows7-x64
1EChartBar.dll
windows10-2004-x64
1TrayIcon.dll
windows7-x64
1TrayIcon.dll
windows10-2004-x64
3eAPI.dll
windows7-x64
1eAPI.dll
windows10-2004-x64
1krnln.dll
windows7-x64
1krnln.dll
windows10-2004-x64
1main.exe
windows7-x64
1main.exe
windows10-2004-x64
1xplib.dll
windows7-x64
1xplib.dll
windows10-2004-x64
1yhzj.exe
windows7-x64
8yhzj.exe
windows10-2004-x64
8Analysis
-
max time kernel
150s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 22:58
Behavioral task
behavioral1
Sample
1001下载乐园.url
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1001下载乐园.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
EChartBar.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
EChartBar.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
TrayIcon.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
TrayIcon.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
eAPI.dll
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
eAPI.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
krnln.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
krnln.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
main.exe
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
main.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
xplib.dll
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
xplib.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
yhzj.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
yhzj.exe
Resource
win10v2004-20220812-en
General
-
Target
yhzj.exe
-
Size
50KB
-
MD5
88b39d09645aa838387fc95670aa36c6
-
SHA1
e16f50586abf4e6857c8537b23ddd0a45a9a25a2
-
SHA256
53d880178a910f1ed651139ce5c869dd215e2f309718a7295612131b608bcab6
-
SHA512
6c74f37c961782ceb6da599fd8ee64432c9f8cfa19db17827bf0955224b3d2c2dc9ffc7188984915e57d436d083e2acdc28e8c06e97941c127766a3bd1174f63
-
SSDEEP
768:Ka1aKW+gwxMvEGiCuBEPKTBZGgV6zBIx7QEHzEaUxCCKsPa4TaDIv8dP:Khxo4E3196zMpHwACKG+I8P
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Processes:
resource yara_rule behavioral15/memory/784-54-0x0000000000400000-0x000000000042A499-memory.dmp upx behavioral15/memory/784-57-0x0000000000400000-0x000000000042A499-memory.dmp upx -
Drops file in Windows directory 1 IoCs
Processes:
explorer.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
yhzj.exepid process 784 yhzj.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 1988 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
explorer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 1988 explorer.exe Token: SeShutdownPrivilege 1988 explorer.exe Token: SeShutdownPrivilege 1988 explorer.exe Token: SeShutdownPrivilege 1988 explorer.exe Token: SeShutdownPrivilege 1988 explorer.exe Token: SeShutdownPrivilege 1988 explorer.exe Token: SeShutdownPrivilege 1988 explorer.exe Token: SeShutdownPrivilege 1988 explorer.exe Token: SeShutdownPrivilege 1988 explorer.exe Token: SeShutdownPrivilege 1988 explorer.exe Token: 33 468 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 468 AUDIODG.EXE Token: 33 468 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 468 AUDIODG.EXE Token: SeShutdownPrivilege 1988 explorer.exe Token: SeShutdownPrivilege 1988 explorer.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
Processes:
yhzj.exeexplorer.exepid process 784 yhzj.exe 784 yhzj.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
Processes:
yhzj.exeexplorer.exepid process 784 yhzj.exe 784 yhzj.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
Processes:
yhzj.exepid process 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe 784 yhzj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\yhzj.exe"C:\Users\Admin\AppData\Local\Temp\yhzj.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x58c1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/784-54-0x0000000000400000-0x000000000042A499-memory.dmpFilesize
169KB
-
memory/784-56-0x0000000075FC1000-0x0000000075FC3000-memory.dmpFilesize
8KB
-
memory/784-57-0x0000000000400000-0x000000000042A499-memory.dmpFilesize
169KB
-
memory/784-58-0x0000000000780000-0x00000000007B6000-memory.dmpFilesize
216KB
-
memory/784-59-0x0000000002030000-0x0000000002078000-memory.dmpFilesize
288KB
-
memory/784-60-0x00000000003B0000-0x00000000003BC000-memory.dmpFilesize
48KB
-
memory/784-63-0x0000000000780000-0x00000000007B6000-memory.dmpFilesize
216KB
-
memory/784-64-0x0000000002030000-0x0000000002078000-memory.dmpFilesize
288KB
-
memory/1988-61-0x000007FEFBB61000-0x000007FEFBB63000-memory.dmpFilesize
8KB
-
memory/1988-62-0x0000000002690000-0x00000000026A0000-memory.dmpFilesize
64KB