Analysis

  • max time kernel
    146s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 07:48

General

  • Target

    逆战嫩草透视辅助1119Sp1.exe

  • Size

    2.0MB

  • MD5

    1ef927006683a9187cc55c8efe36e256

  • SHA1

    bccb3687d7ce6caa1c8c6d1ee21e99aca9acf21c

  • SHA256

    6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b

  • SHA512

    0d76cf765eaeaef62f104fc9c6b2d9bb2a401c39e72df7fb2199b2348b5b3f482725f098125b6d443f0dcccef2aa495126a5b1e025be0df1b9b52ceec67d87b4

  • SSDEEP

    24576:uBoJKz7+Ze0/r2PEw55c2wTYs42cYbDyGWBVGZu8BlscURb+bo98Ef1gFIo4KGqI:upz7G2PxJhAyGWv4uAA+cRgFIAG2SWs

Score
8/10

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\逆战嫩草透视辅助1119Sp1.exe
    "C:\Users\Admin\AppData\Local\Temp\逆战嫩草透视辅助1119Sp1.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.cnlna.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1328 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:776
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /u /s C:\Windows\system32\SuperEC_Hook.dll
      2⤵
      • Loads dropped DLL
      PID:1600
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x508
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1852

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PFZC0YBM\FM2U9VPL.htm
    Filesize

    427B

    MD5

    774d13bb0fecd8fd1b141abc974c2840

    SHA1

    683c8cfb5b5d2fdaf704d9fd8c11885a024e0ee4

    SHA256

    4a89eebe118988c98ea41bc4540c8972a2e35ff2a616b933178dce75415191b8

    SHA512

    0759bc9280458afcba4d8a86fb179c98a34f985049d50b4a14c4949d7c99a5c689474a77c9f3564e2ae06a891d53319bf82626ff60cd858e4dda6b93d16e5792

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YEIY221N.txt
    Filesize

    608B

    MD5

    e02e87aecc30d93a1e8010fd220df748

    SHA1

    6eea564c4c97419d9ac7fa05c8ca5bb78f1beb40

    SHA256

    173a4ad8340785b3b0898256088776ada2325937de7565149233f7bb9eb65d50

    SHA512

    ab190a92d76b5c52c1c29c261260505d65a33783f9b41f4000170669986356a2c2883f0e022eb399d11450eb26dc172f0a282cb8a79e717e8d62f5e7adc322ce

  • C:\Windows\SysWOW64\SuperEC_Hook.dll
    Filesize

    368KB

    MD5

    6446f02463634295797ff698eb7eb92e

    SHA1

    64a20417acf7c9bd67efc601236c85fa640426a8

    SHA256

    53022e175ff09af40a8569a641a261ed08dabc7331afbdde97f2f3d6f9321b33

    SHA512

    eeeb4152b92f9c4cad35d596f6fdec8d4e26b93c1a71627007ce5e490c46bd7773cc65309645ace429467b335fea5fe33cb5aac4cf507367cd9ad72a1b9efbfe

  • \Windows\SysWOW64\SuperEC_Hook.dll
    Filesize

    368KB

    MD5

    6446f02463634295797ff698eb7eb92e

    SHA1

    64a20417acf7c9bd67efc601236c85fa640426a8

    SHA256

    53022e175ff09af40a8569a641a261ed08dabc7331afbdde97f2f3d6f9321b33

    SHA512

    eeeb4152b92f9c4cad35d596f6fdec8d4e26b93c1a71627007ce5e490c46bd7773cc65309645ace429467b335fea5fe33cb5aac4cf507367cd9ad72a1b9efbfe

  • memory/956-79-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-83-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-61-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-67-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-65-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-69-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-71-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-73-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-75-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-77-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-54-0x00000000757C1000-0x00000000757C3000-memory.dmp
    Filesize

    8KB

  • memory/956-81-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-85-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-63-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-87-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-89-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-93-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-91-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-97-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-95-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-98-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-55-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-56-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-57-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/956-59-0x0000000010000000-0x000000001003F000-memory.dmp
    Filesize

    252KB

  • memory/1600-104-0x0000000016080000-0x0000000016152000-memory.dmp
    Filesize

    840KB

  • memory/1600-100-0x0000000000000000-mapping.dmp