Analysis

  • max time kernel
    47s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 13:00

General

  • Target

    淘淘淘宝论坛抢沙发软件/淘淘淘宝论坛沙发机.exe

  • Size

    1.8MB

  • MD5

    b44f2dae79eeffee0174ffa8babb685b

  • SHA1

    caf10a193736a58a79e68ea711f46757d85fa0aa

  • SHA256

    e320c00f5262fb1cd211af8ae64fdfbb5bd9cc35f125554663f1221c7bcd191e

  • SHA512

    3d93e4a23a636b600ef989a290c688cea6b252597b99629f130658a4370d1f8e90792c857cec2a122d38ea5c4706323e957190a244c9df9a70b63fe993a17b34

  • SSDEEP

    49152:+TpDJZ0UnBFPDMHWJjtI6DjqdA+zUZZsL:+tJZ0UPPOyjtvqd9U

Malware Config

Signatures

  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\淘淘淘宝论坛抢沙发软件\淘淘淘宝论坛沙发机.exe
    "C:\Users\Admin\AppData\Local\Temp\淘淘淘宝论坛抢沙发软件\淘淘淘宝论坛沙发机.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:2016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2016-54-0x00000000757A1000-0x00000000757A3000-memory.dmp

    Filesize

    8KB

  • memory/2016-55-0x0000000000400000-0x0000000000901000-memory.dmp

    Filesize

    5.0MB

  • memory/2016-58-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-60-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-61-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-62-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-65-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-63-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-69-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-67-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-75-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-77-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-73-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-71-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-81-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-79-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-85-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-89-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-87-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-95-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-93-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-101-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-103-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-99-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-97-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-91-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-83-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-105-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-104-0x0000000000400000-0x0000000000901000-memory.dmp

    Filesize

    5.0MB

  • memory/2016-106-0x0000000000400000-0x0000000000901000-memory.dmp

    Filesize

    5.0MB