Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
Readme-说明.htm
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Readme-说明.htm
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
电脑模拟LED广告牌.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
电脑模拟LED广告牌.exe
Resource
win10v2004-20220812-en
General
-
Target
电脑模拟LED广告牌.exe
-
Size
355KB
-
MD5
673f7b18ce4fce1447aa8e0163914d6c
-
SHA1
3113d9af50e3c8d62157556c11a66c8e9c67f1e6
-
SHA256
a26418d250d97328472cdc11392c116946e9267355a3e9e73f27eb9f02175234
-
SHA512
e7048513d9d1e938ab8ab1463959def2922e902b38ebe4ee405d61621aad84230e414c6a79e7fd6269c93ee7dd9316104ce0a96e93a58cb54b3b0dec056e0af7
-
SSDEEP
6144:TXcPRuF8RWdSwy+KBuy8h+9rsD7+XKgz2Wp4g9DLjJoxGq6IECy6m:TXcPRGyaSwy+KBbKmLz2Wp4AFYGq6Ym
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 952 LED.exe -
Loads dropped DLL 1 IoCs
pid Process 1004 电脑模拟LED广告牌.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: 33 1004 电脑模拟LED广告牌.exe Token: SeIncBasePriorityPrivilege 1004 电脑模拟LED广告牌.exe Token: 33 1004 电脑模拟LED广告牌.exe Token: SeIncBasePriorityPrivilege 1004 电脑模拟LED广告牌.exe Token: 33 1004 电脑模拟LED广告牌.exe Token: SeIncBasePriorityPrivilege 1004 电脑模拟LED广告牌.exe Token: 33 1004 电脑模拟LED广告牌.exe Token: SeIncBasePriorityPrivilege 1004 电脑模拟LED广告牌.exe Token: 33 952 LED.exe Token: SeIncBasePriorityPrivilege 952 LED.exe Token: 33 952 LED.exe Token: SeIncBasePriorityPrivilege 952 LED.exe Token: 33 952 LED.exe Token: SeIncBasePriorityPrivilege 952 LED.exe Token: 33 952 LED.exe Token: SeIncBasePriorityPrivilege 952 LED.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1004 wrote to memory of 952 1004 电脑模拟LED广告牌.exe 28 PID 1004 wrote to memory of 952 1004 电脑模拟LED广告牌.exe 28 PID 1004 wrote to memory of 952 1004 电脑模拟LED广告牌.exe 28 PID 1004 wrote to memory of 952 1004 电脑模拟LED广告牌.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\电脑模拟LED广告牌.exe"C:\Users\Admin\AppData\Local\Temp\电脑模拟LED广告牌.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\电脑虚拟LED广告牌\1.0.0.0\2013.06.08T03.22\Virtual\STUBEXE\@APPDATALOCAL@\Temp\LED.exe"C:\Users\Admin\AppData\Local\Temp\LED.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\电脑虚拟LED广告牌\1.0.0.0\2013.06.08T03.22\Virtual\STUBEXE\@APPDATALOCAL@\Temp\LED.exe
Filesize17KB
MD52dc5901d28a2a5a07fd1bad6223495a9
SHA198d5bee6291c558e54b976f08dbdb42dd41958ea
SHA256d6078adca4893bf57edf3a96e5eb0e450c9b4897f84bdb953e0bbd28e4e2ed91
SHA512aab782b3149ca80b2fb4dabb533b7d1d2307838029e3ca043fc56054c57b48cdc07e554aa5aa9b31b8dbdde3dbc4b654a77c828cc5d7a7d287cbad87a4dae3c9
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\电脑虚拟LED广告牌\1.0.0.0\2013.06.08T03.22\Virtual\STUBEXE\@APPDATALOCAL@\Temp\LED.exe
Filesize17KB
MD52dc5901d28a2a5a07fd1bad6223495a9
SHA198d5bee6291c558e54b976f08dbdb42dd41958ea
SHA256d6078adca4893bf57edf3a96e5eb0e450c9b4897f84bdb953e0bbd28e4e2ed91
SHA512aab782b3149ca80b2fb4dabb533b7d1d2307838029e3ca043fc56054c57b48cdc07e554aa5aa9b31b8dbdde3dbc4b654a77c828cc5d7a7d287cbad87a4dae3c9