Overview
overview
8Static
static
8河源下�...om.url
windows7-x64
1河源下�...om.url
windows10-2004-x64
1简單挂�...nj.dll
windows7-x64
8简單挂�...nj.dll
windows10-2004-x64
8简單挂�...ro.dll
windows7-x64
8简單挂�...ro.dll
windows10-2004-x64
8简單挂�...ip.dll
windows7-x64
1简單挂�...ip.dll
windows10-2004-x64
3简單挂�....0.exe
windows7-x64
8简單挂�....0.exe
windows10-2004-x64
8简單挂�...04.url
windows7-x64
1简單挂�...04.url
windows10-2004-x64
1简單挂�...om.url
windows7-x64
1简單挂�...om.url
windows10-2004-x64
1简單挂�...�1.exe
windows7-x64
8简單挂�...�1.exe
windows10-2004-x64
8简單挂�...��.exe
windows7-x64
7简單挂�...��.exe
windows10-2004-x64
6Analysis
-
max time kernel
191s -
max time network
223s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 20:18
Behavioral task
behavioral1
Sample
河源下载站-xz7.com.url
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
河源下载站-xz7.com.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
简單挂免曊版⒔1/SimpInj.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
简單挂免曊版⒔1/SimpInj.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
简單挂免曊版⒔1/SimplePro.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
简單挂免曊版⒔1/SimplePro.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
简單挂免曊版⒔1/zip.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
简單挂免曊版⒔1/zip.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
简單挂免曊版⒔1/传奇通用变速器7.0.exe
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
简單挂免曊版⒔1/传奇通用变速器7.0.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
简單挂免曊版⒔1/在线咨询QQ:910001904.url
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
简單挂免曊版⒔1/在线咨询QQ:910001904.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
简單挂免曊版⒔1/简单挂官网:s1904.com.url
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
简單挂免曊版⒔1/简单挂官网:s1904.com.url
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
简單挂免曊版⒔1/简單挂免曊版⒔1.exe
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
简單挂免曊版⒔1/简單挂免曊版⒔1.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
简單挂免曊版⒔1/霸王恶魔.exe
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
简單挂免曊版⒔1/霸王恶魔.exe
Resource
win10v2004-20220812-en
General
-
Target
简單挂免曊版⒔1/简單挂免曊版⒔1.exe
-
Size
4.3MB
-
MD5
f7dbf6be3fc951697b713a286f4a6c48
-
SHA1
5b3eb15fefa4d8b546aa2987bcf36fcab901ae55
-
SHA256
640ca5066401e717118f19e5e471ba8832d87e900205d8e5d6d10a53da51a913
-
SHA512
340fde9e9c16eb9fe374930f6f247b4662ff1b2c20b10a03d093fad497b2367512d1908dbab9d790f86b2d4b8904950eef8d8de214626cab467c0c0a66a56477
-
SSDEEP
49152:PSvd6wMpY+mCvZhCCuLHy44COCVTVvoNVQCOeAYjLpT465SDEk2YBC3iMcoFntAe:+6wMa+5CCOqnDJ1jt86Qn26F+l/vw
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral15/memory/1140-55-0x00000000000A0000-0x000000000097B000-memory.dmp vmprotect behavioral15/memory/1140-56-0x00000000000A0000-0x000000000097B000-memory.dmp vmprotect behavioral15/memory/1140-58-0x00000000000A0000-0x000000000097B000-memory.dmp vmprotect behavioral15/memory/1140-59-0x00000000000A0000-0x000000000097B000-memory.dmp vmprotect -
Drops file in System32 directory 5 IoCs
Processes:
简單挂免曊版⒔1.exedescription ioc process File opened for modification C:\Windows\SysWOW64\E1EDmPwKO.sys 简單挂免曊版⒔1.exe File opened for modification C:\Windows\SysWOW64\E1EDmPwKO.systmp 简單挂免曊版⒔1.exe File created C:\Windows\SysWOW64\MakeAttManage.sys 简單挂免曊版⒔1.exe File created C:\Windows\SysWOW64\F6DEYc1UT.sys 简單挂免曊版⒔1.exe File created C:\Windows\SysWOW64\E1EDmPwKO.sys 简單挂免曊版⒔1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B75E5B81-6F5F-11ED-8AA1-4ADA2A0CA6C6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
简單挂免曊版⒔1.exepid process 1140 简單挂免曊版⒔1.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 464 464 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1052 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
简單挂免曊版⒔1.exeiexplore.exeIEXPLORE.EXEpid process 1140 简單挂免曊版⒔1.exe 1140 简單挂免曊版⒔1.exe 1140 简單挂免曊版⒔1.exe 1140 简單挂免曊版⒔1.exe 1140 简單挂免曊版⒔1.exe 1140 简單挂免曊版⒔1.exe 1052 iexplore.exe 1052 iexplore.exe 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
简單挂免曊版⒔1.exeiexplore.exedescription pid process target process PID 1140 wrote to memory of 1052 1140 简單挂免曊版⒔1.exe iexplore.exe PID 1140 wrote to memory of 1052 1140 简單挂免曊版⒔1.exe iexplore.exe PID 1140 wrote to memory of 1052 1140 简單挂免曊版⒔1.exe iexplore.exe PID 1140 wrote to memory of 1052 1140 简單挂免曊版⒔1.exe iexplore.exe PID 1052 wrote to memory of 1912 1052 iexplore.exe IEXPLORE.EXE PID 1052 wrote to memory of 1912 1052 iexplore.exe IEXPLORE.EXE PID 1052 wrote to memory of 1912 1052 iexplore.exe IEXPLORE.EXE PID 1052 wrote to memory of 1912 1052 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\简單挂免曊版⒔1\简單挂免曊版⒔1.exe"C:\Users\Admin\AppData\Local\Temp\简單挂免曊版⒔1\简單挂免曊版⒔1.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.jdcqg.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1052 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1140-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmpFilesize
8KB
-
memory/1140-55-0x00000000000A0000-0x000000000097B000-memory.dmpFilesize
8.9MB
-
memory/1140-56-0x00000000000A0000-0x000000000097B000-memory.dmpFilesize
8.9MB
-
memory/1140-58-0x00000000000A0000-0x000000000097B000-memory.dmpFilesize
8.9MB
-
memory/1140-59-0x00000000000A0000-0x000000000097B000-memory.dmpFilesize
8.9MB
-
memory/1140-60-0x0000000001030000-0x0000000001040000-memory.dmpFilesize
64KB