Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 23:17

General

  • Target

    d285aeb9000d46a392ad798ec3c9de386ee4722830c59c00adefabdc130b0008.exe

  • Size

    38KB

  • MD5

    f382f682f719ae8ca62f4751d76457d2

  • SHA1

    5242253d6ec4747aca8fc90f1df57d1b51e9cfac

  • SHA256

    d285aeb9000d46a392ad798ec3c9de386ee4722830c59c00adefabdc130b0008

  • SHA512

    d330def180c756dd53d32dc996aa0b6b8420048d8d1e26a22ce92b1c1eaf2ec7aa418e7a2197104fb037387ca6597aeee90e0d0a2fa3013b31dbd9551bcc05ff

  • SSDEEP

    384:/TlWZgXJNEWx+GoN870DRBog9WMXjdTqoaVZGXYP+2VKEkI:/5WZc0BR9WMzdnoP+PE9

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d285aeb9000d46a392ad798ec3c9de386ee4722830c59c00adefabdc130b0008.exe
    "C:\Users\Admin\AppData\Local\Temp\d285aeb9000d46a392ad798ec3c9de386ee4722830c59c00adefabdc130b0008.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3368
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://www.baidu.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1052 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2460
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/Loader_jieku_977.html
      2⤵
      • Modifies Internet Explorer settings
      PID:628
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/haozip_tiny.200629.html
      2⤵
        PID:620
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.html
        2⤵
        • Modifies Internet Explorer settings
        PID:1676

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      f8f8086f87156d14091b152fcaadc3ce

      SHA1

      fe3cfbf9e2e871c948300473593dfcf189013386

      SHA256

      8d92f28b70ed5265fafad8b37ce049b0b8ecad038745173acc35a21b8222bf56

      SHA512

      1235be77513694a1478459e999631920be42183a6993dc1f93333831eaa54ea60c7d8617029289c95fed2f861fc7aa79da551c128df4428d23752044eb68ba7a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      8c031d83d535240eb6cab816a3f596eb

      SHA1

      faff41af22cc5801d5e172e6e7b95d818ea6ef74

      SHA256

      154319c1d9556c73f589c010ced67100fc67913ac141886a5a5108c197538119

      SHA512

      574df7731b3ab03cbbe327c1f4dcda3be1f9240ee78a265ed1506c00968d784703a88d8ee7859cddafe7cb1acc40d845b714ad594c5b5fa5e1b5c3275fef136f

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

      Filesize

      16KB

      MD5

      725dd971179666e4e9e6304420539e03

      SHA1

      0e9e669c3050ed6f5c1f14352ed9af2d5c3cbadd

      SHA256

      8920f4b8c6bb2b7212ef070e1fb5df0cdda3f6157e374993728cef9a9f245876

      SHA512

      40e75f3ae572d510447ad8a4699d5e66e67884b9a893f37743cb5a83972876f95ec2a22b5b453562822a52a7abf453ac4a63f9ca8e486ef6a52726e4e6bdb04b

    • memory/3368-132-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3368-135-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB