Analysis
-
max time kernel
39s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.exe
Resource
win10v2004-20221111-en
General
-
Target
e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.exe
-
Size
294KB
-
MD5
218fb36acbcea6b58f23e4fd0f819b5c
-
SHA1
22f00ef1d9e3719922dda34db5a014c6aae9447f
-
SHA256
e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf
-
SHA512
765b46b67c65c2e74aeaf3854ad698e3449bf9faf2b2afbb615b5256d60c66e8847d8052a76f44658dac899c7d4a309544a6b8be5403919c34a825e84ec47412
-
SSDEEP
6144:cdYgxDExluzMm2mBiXS6S9JSelDyX2UFLstcAyXRU0ODDon:tgxDEvuLTKSH9flD74sK60ODDon
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1504 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp -
Deletes itself 1 IoCs
pid Process 1928 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 2016 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.exe 1504 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp 1504 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Progra~1\TaoBao\is-GMBR9.tmp e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main regedit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.hae123.com" regedit.exe -
Runs regedit.exe 1 IoCs
pid Process 588 regedit.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1504 2016 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.exe 28 PID 2016 wrote to memory of 1504 2016 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.exe 28 PID 2016 wrote to memory of 1504 2016 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.exe 28 PID 2016 wrote to memory of 1504 2016 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.exe 28 PID 1504 wrote to memory of 588 1504 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp 29 PID 1504 wrote to memory of 588 1504 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp 29 PID 1504 wrote to memory of 588 1504 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp 29 PID 1504 wrote to memory of 588 1504 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp 29 PID 1504 wrote to memory of 1928 1504 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp 30 PID 1504 wrote to memory of 1928 1504 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp 30 PID 1504 wrote to memory of 1928 1504 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp 30 PID 1504 wrote to memory of 1928 1504 e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.exe"C:\Users\Admin\AppData\Local\Temp\e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\is-K5EQ4.tmp\e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp"C:\Users\Admin\AppData\Local\Temp\is-K5EQ4.tmp\e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp" /SL5="$70122,51915,51712,C:\Users\Admin\AppData\Local\Temp\e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\Regedit.exe" -s C:\Progra~1\TaoBao\info.desc3⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Runs regedit.exe
PID:588
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.exe"3⤵
- Deletes itself
PID:1928
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5a0fd44bf16c285a195d371ba2404dc0a
SHA11880991f3f49d2f35e86ce2575d7535517a10f28
SHA256686ea1ff46449d5412e6454ca7329a6f03e777714e35d502640c61ac16849613
SHA5123477a190eda4b3fd79319ebeab24c3a62cdaffeb4d58f65488713f23e370f8a906365985dad5a8bd39a5d2e047c6f1da40af1d952cb3899c9809a32fb03b970a
-
C:\Users\Admin\AppData\Local\Temp\is-K5EQ4.tmp\e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp
Filesize706KB
MD51a6c2b578c69b9388e22d38afa16a7fb
SHA1186370d5438b1f5f3d75891aa8412e8edd00981c
SHA25686ac18632bfdca026df9fe12a1d4df2de64bbdc1d2d7e42d2dcbf7809cbbebb3
SHA512fb868c629cd0255b7620c9260bb5712b6622f53f0b7de3d6125c295e02d16f03584ce3a90eccb02b65ce9825885aa1bca5f68c7cc09dc0c09e7c208fcef54714
-
\Users\Admin\AppData\Local\Temp\is-K5EQ4.tmp\e24eeb6b7bf9a4ebf42cbaaa8974604ad7e7ec14460455496f40c37eb6b9a8cf.tmp
Filesize706KB
MD51a6c2b578c69b9388e22d38afa16a7fb
SHA1186370d5438b1f5f3d75891aa8412e8edd00981c
SHA25686ac18632bfdca026df9fe12a1d4df2de64bbdc1d2d7e42d2dcbf7809cbbebb3
SHA512fb868c629cd0255b7620c9260bb5712b6622f53f0b7de3d6125c295e02d16f03584ce3a90eccb02b65ce9825885aa1bca5f68c7cc09dc0c09e7c208fcef54714
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3