Overview
overview
8Static
static
8mxdbl.pc6....68.exe
windows7-x64
7mxdbl.pc6....68.exe
windows10-2004-x64
7mxdbl.pc6....ti.dll
windows7-x64
1mxdbl.pc6....ti.dll
windows10-2004-x64
1mxdbl.pc6....��.url
windows7-x64
1mxdbl.pc6....��.url
windows10-2004-x64
1mxdbl.pc6....er.dll
windows7-x64
8mxdbl.pc6....er.dll
windows10-2004-x64
8mxdbl.pc6....32.dll
windows7-x64
1mxdbl.pc6....32.dll
windows10-2004-x64
1mxdbl.pc6....��.chm
windows7-x64
1mxdbl.pc6....��.chm
windows10-2004-x64
1mxdbl.pc6....��.exe
windows7-x64
8mxdbl.pc6....��.exe
windows10-2004-x64
8Analysis
-
max time kernel
177s -
max time network
257s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 21:10
Behavioral task
behavioral1
Sample
mxdbl.pc6.0831/冒险伴侣0831/Baidu_Com_90000168.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
mxdbl.pc6.0831/冒险伴侣0831/Baidu_Com_90000168.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
mxdbl.pc6.0831/冒险伴侣0831/HYDati.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
mxdbl.pc6.0831/冒险伴侣0831/HYDati.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
mxdbl.pc6.0831/冒险伴侣0831/PC6下载.url
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
mxdbl.pc6.0831/冒险伴侣0831/PC6下载.url
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
mxdbl.pc6.0831/冒险伴侣0831/Partner.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
mxdbl.pc6.0831/冒险伴侣0831/Partner.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
mxdbl.pc6.0831/冒险伴侣0831/bldllw32.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
mxdbl.pc6.0831/冒险伴侣0831/bldllw32.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
mxdbl.pc6.0831/冒险伴侣0831/冒险伴侣说明新手必看.chm
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
mxdbl.pc6.0831/冒险伴侣0831/冒险伴侣说明新手必看.chm
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
mxdbl.pc6.0831/冒险伴侣0831/冒險伴侶.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
mxdbl.pc6.0831/冒险伴侣0831/冒險伴侶.exe
Resource
win10v2004-20220812-en
General
-
Target
mxdbl.pc6.0831/冒险伴侣0831/Baidu_Com_90000168.exe
-
Size
1.4MB
-
MD5
d49e4198096aa6f7af3787ba230198c2
-
SHA1
e7a3c4feb071ec294ce14d74f6e0fa603740f1af
-
SHA256
2343e15558bba1e08369527cebd7082495c4fb5f1f859f1806f4ac0b464cd304
-
SHA512
a36ba06bdf98783b33d30b3f87854387493de077a679105ebb4af9e29df809e623738fab5014109e44d5965e8c07173e9f57c92fb1e02dc6b57b03095988dfa1
-
SSDEEP
24576:eCNjeWLiBF5Addz/++bJnksHBmNqvdOg5m8y01HHiaqulkrpsEG3eX:DjNLsFybzhkaBmNWdN5HyLHekeEG3+
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
Baidu_Com_90000168.exepid process 576 Baidu_Com_90000168.exe 576 Baidu_Com_90000168.exe 576 Baidu_Com_90000168.exe 576 Baidu_Com_90000168.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Baidu_Com_90000168.exedescription ioc process File opened for modification \??\PhysicalDrive0 Baidu_Com_90000168.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
Processes:
Baidu_Com_90000168.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid Baidu_Com_90000168.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd Baidu_Com_90000168.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid\SequenceID = 314aae339315d24e8636c7cae810ec1f Baidu_Com_90000168.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Baidu_Com_90000168.exepid process 576 Baidu_Com_90000168.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Baidu_Com_90000168.exepid process 576 Baidu_Com_90000168.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\mxdbl.pc6.0831\冒险伴侣0831\Baidu_Com_90000168.exe"C:\Users\Admin\AppData\Local\Temp\mxdbl.pc6.0831\冒险伴侣0831\Baidu_Com_90000168.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD5d184763cb4e62d531193978de7b82db2
SHA1f4824e6e58f50b1fd89396afa17d0f97d86895f7
SHA25663a233664064e22fd3260e4dc06293b8fa724e62071ad1cf8af9a4bb453e1dea
SHA51225bb657827c1c4ce410346e11e60fe954f62100731bd730405cba666d4eb7009dfd394053e2afabfd9981ea0eea5fa625f24805a1d4d24c7da44f6449eda7e1b
-
Filesize
1.3MB
MD5b540a866191f7fd20f5e6355bc2b094e
SHA1df01a0c011e88a1f860db41d474d3fe893f06082
SHA256ce3044e92a827fce76a75dbd817545506dcab76a5f4edac3c9cf37236a1eecb6
SHA512e65aa73a9e8118176f294edeb7a9dc3a71319b218a45de6073622b868bee2fab9d7b6f76577f846cc940b4b949ee0110fbb449df3d77c922464cf6ded1408331
-
Filesize
1.9MB
MD5763b532d651f0ad5e135d9b57bf4fba4
SHA123f1302f904a67a1fe0d48e11a435c2f36336196
SHA25650b3c45ede6fd2d77c4f040242b2174289767b18a3a084e7046133b05f93e173
SHA512a4ec0f5bfa30d3558935f4075a75aebf080ece324a550c573d8a424730693b030cd26b4862973e8da8937e610c287d64e96c2fd952b59324ed1822919a00737c
-
Filesize
620KB
MD5e0d8d0a69ce5eeb83594d4517afa54f6
SHA1b34de8329a7c014d3cf3f5fe6d9d8e679d4918fd
SHA256ba9e1a46344846aa2138c970f6581fd364bc9369fdbb9402199589fe0645abf0
SHA512ab7c752abb37165edff8e389f8ee0ac48149c9092decf347989df4ab47e5dd5046c131a74b1e35e15c31f6f95cc69ebd05c8d41162788a151f78e2d9025ca4a7