Analysis

  • max time kernel
    131s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 04:29

General

  • Target

    QQ空间秒赞秒评论系统1.2.exe

  • Size

    1.5MB

  • MD5

    c43bd8fbc267e1b0f2e843fe9dbfa968

  • SHA1

    d287760d628d73abc6e8e9b8aebd08a44bb26714

  • SHA256

    6f8ba7136673f3b59f5ec6a246b3483752ccfd47b0a484f1200431c118abdaa1

  • SHA512

    4676467a37193e5aa2bc76db259a99e3651e0dbf1c4b624be3cfbc5a693b2a924a3230067214e5bbce4e3e9bc8fc0ecbd5826ab4628c80b167f6a1bb0430022d

  • SSDEEP

    24576:ujFdVWlIehG32KAKQdLtanQbuKYxot6JaT9mPT4iDdT2:uFdVWJc32vSQbuKZ6JC8DT2

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 16 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QQ空间秒赞秒评论系统1.2.exe
    "C:\Users\Admin\AppData\Local\Temp\QQ空间秒赞秒评论系统1.2.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4020-132-0x0000000000400000-0x00000000007A6000-memory.dmp

    Filesize

    3.6MB

  • memory/4020-133-0x0000000077A70000-0x0000000077C13000-memory.dmp

    Filesize

    1.6MB

  • memory/4020-134-0x0000000000400000-0x00000000007A6000-memory.dmp

    Filesize

    3.6MB

  • memory/4020-135-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-136-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-137-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-139-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-141-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-143-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-145-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-147-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-149-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-151-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-153-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-155-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-157-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-161-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-159-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-163-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-165-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-167-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-169-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-171-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-173-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-175-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-177-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4020-178-0x0000000000400000-0x00000000007A6000-memory.dmp

    Filesize

    3.6MB

  • memory/4020-179-0x0000000077A70000-0x0000000077C13000-memory.dmp

    Filesize

    1.6MB

  • memory/4020-180-0x0000000000400000-0x00000000007A6000-memory.dmp

    Filesize

    3.6MB

  • memory/4020-181-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB