Analysis

  • max time kernel
    393s
  • max time network
    396s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2022 00:48

General

  • Target

    360TS_Setup_Mini.exe

  • Size

    1.5MB

  • MD5

    858ee6ceb590822f57d2d98a32e3c5af

  • SHA1

    0cd9e539e919dd0367c1d04e2644bc3e8ad109e5

  • SHA256

    3d505dd5081824da4517fbdc2a4da8c6133538b72171e260f59d10be5ed20acb

  • SHA512

    ad624bba251a6131471a662e31a676c6facb335aef433b0c2313adb57c2ca4701590845c3c237d190a1817fa43daeaaeb3731c91e19045691523cccf9cbbd198

  • SSDEEP

    24576:AD1YS7FpyUxT3DC2O1zj1SqdAGFQZIxvC45UJoenm9x:TQ5xT3DDWzjYq+ZIxL5UJoew

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\360TS_Setup_Mini.exe
    "C:\Users\Admin\AppData\Local\Temp\360TS_Setup_Mini.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe" /c:101 /pmode:2 /syncid0_1
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Program Files (x86)\1672365028_0\360TS_Setup.exe
        "C:\Program Files (x86)\1672365028_0\360TS_Setup.exe" /c:101 /pmode:2 /syncid0_1 /TSinstall
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Modifies system certificate store
        PID:1876

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\1672365028_0\360TS_Setup.exe
    Filesize

    92.8MB

    MD5

    4b78ca0f2616ea2062401e4aab555433

    SHA1

    c9b3c66e9198f0a8dc640c53dd08af346cc63027

    SHA256

    a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

    SHA512

    978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8
    Filesize

    2KB

    MD5

    f7d1d25a4bb9539426866bd092721c19

    SHA1

    5c2bf9edfdae783797538617e6b453f984d37167

    SHA256

    73783350d643231a95bd81354713994eeb2ebd3cc6e80733922f2ff7e232fd37

    SHA512

    55b08279b76e264847c53396e22c71cea9a8296fe38948fc6f2a44c2af4a3101f072d8038c8a45e934f0000c102dda5ad6c09a4d5d80a4b6f61277aeb8ee61a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    Filesize

    1KB

    MD5

    a2b3de2676790ac64a1bc51ba3e667d1

    SHA1

    2a7f7090fed2ddd299339197428a9fafc3fd349b

    SHA256

    aa8cdcc9c8c19d24037aa62dfb529b22d25a7eb3927d35f59572c153c81c5a4a

    SHA512

    ab9e80a077a2fe486630e4d7fb159994224fce41c6fbc6197cc600e4fac86d504e8b3d1670ca628fb45792498be42a80e1c6b0af4b3e7451bc039222ea123ef5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8
    Filesize

    488B

    MD5

    a9087fd33bec8bfddd7f7f2ea85e9a01

    SHA1

    6a764dda36d82843329b66f912b5e214e226b7d2

    SHA256

    925d3182dc4ba5ffc03dcfbab02ef6ae1f9c5113d754cbed9ec26a4e7ac588a1

    SHA512

    e29f26c5f59f56a1e00e4398537f998fb86e84b042c039a2d4f158e3b919664dffdca0d843aedeaf822f8bd8ed00ae4b335fdaa6136284158ceb0acee88cd845

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    87066b1da02b8edd6c0d3e6eba87248f

    SHA1

    865ec3f67323e5b8ae45ac62566100c77b364fe6

    SHA256

    95f560baf60e6181bcb4879e2b5f96dffed46b9148065146a52a7c58ebbb263b

    SHA512

    bd855ee5ff199d412786a9dfc3a249037aff28d266269eec8da8cd0c1aac4364bb5bc27232793bd5cab6c9f517eaed88428e9af69f1bc397d52508a7986fc166

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    Filesize

    482B

    MD5

    f802b4fc13ffe5b08ba441a0a47b6a6e

    SHA1

    f0ff24bca6895dbfd788a84e3cc897af3a693236

    SHA256

    e2b9e7e43a0a789afb4979b7dda4a876b8b8e0e8661aa1de1c4cd77553f9ffb7

    SHA512

    139957b8d6e1c7400de5e1cc0c98e45fd4200ba125d8240f6d6e16e6513ba5a8fe8cc9cb0ac527db44ea68e87823a61692169555cfdfe40eb6dfa3427079fc25

  • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe
    Filesize

    92.8MB

    MD5

    4b78ca0f2616ea2062401e4aab555433

    SHA1

    c9b3c66e9198f0a8dc640c53dd08af346cc63027

    SHA256

    a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

    SHA512

    978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

  • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe
    Filesize

    92.8MB

    MD5

    4b78ca0f2616ea2062401e4aab555433

    SHA1

    c9b3c66e9198f0a8dc640c53dd08af346cc63027

    SHA256

    a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

    SHA512

    978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

  • \Program Files (x86)\1672365028_0\360TS_Setup.exe
    Filesize

    92.8MB

    MD5

    4b78ca0f2616ea2062401e4aab555433

    SHA1

    c9b3c66e9198f0a8dc640c53dd08af346cc63027

    SHA256

    a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

    SHA512

    978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

  • \Users\Admin\AppData\Local\Temp\1672365027_00000000_base\360base.dll
    Filesize

    884KB

    MD5

    8c42fc725106cf8276e625b4f97861bc

    SHA1

    9c4140730cb031c29fc63e17e1504693d0f21c13

    SHA256

    d1ca92aa0789ee87d45f9f3c63e0e46ad2997b09605cbc2c57da2be6b8488c22

    SHA512

    f3c33dfe8e482692d068bf2185bec7d0d2bb232e6828b0bc8dc867da9e7ca89f9356fde87244fe686e3830f957c052089a87ecff4e44842a1a7848246f0ba105

  • \Users\Admin\AppData\Local\Temp\1672365051_00000000_base\360base.dll
    Filesize

    884KB

    MD5

    8c42fc725106cf8276e625b4f97861bc

    SHA1

    9c4140730cb031c29fc63e17e1504693d0f21c13

    SHA256

    d1ca92aa0789ee87d45f9f3c63e0e46ad2997b09605cbc2c57da2be6b8488c22

    SHA512

    f3c33dfe8e482692d068bf2185bec7d0d2bb232e6828b0bc8dc867da9e7ca89f9356fde87244fe686e3830f957c052089a87ecff4e44842a1a7848246f0ba105

  • \Users\Admin\AppData\Local\Temp\360TS_Setup.exe
    Filesize

    92.8MB

    MD5

    4b78ca0f2616ea2062401e4aab555433

    SHA1

    c9b3c66e9198f0a8dc640c53dd08af346cc63027

    SHA256

    a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

    SHA512

    978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

  • \Users\Admin\AppData\Local\Temp\360TS_Setup.exe
    Filesize

    92.8MB

    MD5

    4b78ca0f2616ea2062401e4aab555433

    SHA1

    c9b3c66e9198f0a8dc640c53dd08af346cc63027

    SHA256

    a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

    SHA512

    978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

  • \Users\Admin\AppData\Local\Temp\360TS_Setup.exe
    Filesize

    92.8MB

    MD5

    4b78ca0f2616ea2062401e4aab555433

    SHA1

    c9b3c66e9198f0a8dc640c53dd08af346cc63027

    SHA256

    a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

    SHA512

    978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

  • \Users\Admin\AppData\Local\Temp\360TS_Setup.exe
    Filesize

    92.8MB

    MD5

    4b78ca0f2616ea2062401e4aab555433

    SHA1

    c9b3c66e9198f0a8dc640c53dd08af346cc63027

    SHA256

    a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

    SHA512

    978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

  • \Users\Admin\AppData\Local\Temp\{30F1C0DF-A3A4-4da8-9316-932375CC66D3}.tmp\360P2SP.dll
    Filesize

    824KB

    MD5

    fc1796add9491ee757e74e65cedd6ae7

    SHA1

    603e87ab8cb45f62ecc7a9ef52d5dedd261ea812

    SHA256

    bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60

    SHA512

    8fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d

  • memory/1632-54-0x00000000761F1000-0x00000000761F3000-memory.dmp
    Filesize

    8KB

  • memory/1736-60-0x0000000000000000-mapping.dmp
  • memory/1876-66-0x0000000000000000-mapping.dmp