Overview
overview
9Static
static
9RrPrivateA...um.exe
windows7-x64
9RrPrivateA...um.exe
windows10-2004-x64
9RrPrivateA...��.exe
windows7-x64
9RrPrivateA...��.exe
windows10-2004-x64
9RrPrivateA...e.html
windows7-x64
1RrPrivateA...e.html
windows10-2004-x64
1rrprivatea...10.dll
windows7-x64
1rrprivatea...10.dll
windows10-2004-x64
1使用必读.url
windows7-x64
1使用必读.url
windows10-2004-x64
1华彩软件站.url
windows7-x64
1华彩软件站.url
windows10-2004-x64
1Analysis
-
max time kernel
249s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 20:09
Behavioral task
behavioral1
Sample
RrPrivateAlbum/RrPrivateAlbum.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RrPrivateAlbum/RrPrivateAlbum.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
RrPrivateAlbum/补丁.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
RrPrivateAlbum/补丁.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
RrPrivateAlbum/说明_Readme.html
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
RrPrivateAlbum/说明_Readme.html
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
rrprivatealbum/Usp10.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
rrprivatealbum/Usp10.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
使用必读.url
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
使用必读.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
华彩软件站.url
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
华彩软件站.url
Resource
win10v2004-20220812-en
General
-
Target
RrPrivateAlbum/补丁.exe
-
Size
481KB
-
MD5
709d802d7c22098de139072fcbdec43d
-
SHA1
f19a320ed081ded88c9b151e73dcac113bd22802
-
SHA256
c1d1c73ccbdd2734f497f75e6de06074cad53a28d7a9bd5e9c99480c9d7517e5
-
SHA512
cc6ea816125742f6e08239b0949c7e59bfeba42055905da4ac1147fa2f8ec843786f846b86714f26fd58572372605e369e290bbc23ccbe456923d74b22bea213
-
SSDEEP
12288:mx6jZWFpuVa0AfRAqNH+K/lGRgOUqmq9kR6lhKXYOI1CASk:mEsRbp+K/cRgOnmq9g6RCg
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral3/files/0x000b000000012335-88.dat acprotect -
resource yara_rule behavioral3/files/0x000b000000012335-88.dat upx behavioral3/memory/1472-90-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral3/memory/1472-92-0x0000000010000000-0x000000001003C000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RrPrivateAlbum.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Wine RrPrivateAlbum.exe -
Loads dropped DLL 1 IoCs
pid Process 1472 RrPrivateAlbum.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1472 RrPrivateAlbum.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\renren.com RrPrivateAlbum.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage RrPrivateAlbum.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\renren.com\NumberOfSubdomains = "1" RrPrivateAlbum.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" RrPrivateAlbum.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.renren.com RrPrivateAlbum.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.renren.com\ = "63" RrPrivateAlbum.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main RrPrivateAlbum.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total RrPrivateAlbum.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\renren.com\Total = "63" RrPrivateAlbum.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1472 RrPrivateAlbum.exe 1472 RrPrivateAlbum.exe 1472 RrPrivateAlbum.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1472 RrPrivateAlbum.exe 1472 RrPrivateAlbum.exe 1472 RrPrivateAlbum.exe 1472 RrPrivateAlbum.exe 1472 RrPrivateAlbum.exe 1472 RrPrivateAlbum.exe 1472 RrPrivateAlbum.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 868 wrote to memory of 1472 868 补丁.exe 28 PID 868 wrote to memory of 1472 868 补丁.exe 28 PID 868 wrote to memory of 1472 868 补丁.exe 28 PID 868 wrote to memory of 1472 868 补丁.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\RrPrivateAlbum\补丁.exe"C:\Users\Admin\AppData\Local\Temp\RrPrivateAlbum\补丁.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\RrPrivateAlbum\RrPrivateAlbum.exe"RrPrivateAlbum.exe"2⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1472
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5a00c474dc4ced90b8f5a692108c45dce
SHA1e02722d30a6218523e9ddef287817788a4a9b9fc
SHA2566504e515cbcf89cb98fd9f1a310125bfdf93e1f6a6bf0c64c0229e5670cac9b1
SHA512e81b001379f94fabb71f1d6a019b81202e00da7338048b77d1728b40427689a32801419377d3e86c51c5e418cc3ccc328ee00adc69eaa575267bcaac8f477abd