Analysis

  • max time kernel
    210s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2023 02:17

General

  • Target

    360TS_Setup_Mini.exe

  • Size

    1.5MB

  • MD5

    858ee6ceb590822f57d2d98a32e3c5af

  • SHA1

    0cd9e539e919dd0367c1d04e2644bc3e8ad109e5

  • SHA256

    3d505dd5081824da4517fbdc2a4da8c6133538b72171e260f59d10be5ed20acb

  • SHA512

    ad624bba251a6131471a662e31a676c6facb335aef433b0c2313adb57c2ca4701590845c3c237d190a1817fa43daeaaeb3731c91e19045691523cccf9cbbd198

  • SSDEEP

    24576:AD1YS7FpyUxT3DC2O1zj1SqdAGFQZIxvC45UJoenm9x:TQ5xT3DDWzjYq+ZIxL5UJoew

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\360TS_Setup_Mini.exe
    "C:\Users\Admin\AppData\Local\Temp\360TS_Setup_Mini.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe" /c:101 /pmode:2 /syncid0_1
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1268
      • C:\Program Files (x86)\1674703093_0\360TS_Setup.exe
        "C:\Program Files (x86)\1674703093_0\360TS_Setup.exe" /c:101 /pmode:2 /syncid0_1 /TSinstall
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Drops file in Program Files directory
        • Modifies system certificate store
        • Suspicious behavior: GetForegroundWindowSpam
        PID:768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\1674703093_0\360TS_Setup.exe

    Filesize

    89.4MB

    MD5

    57c374e2356d0013cff1711b74e6baad

    SHA1

    3b914bc60de43eaa9255441b76d6b92ff25fab9c

    SHA256

    ae2cf3e5f83742de8b33124403b295559a1aa814dc5f0e26eddbcc3ac94c55fe

    SHA512

    88da3108e668099b99b5506a0904ba48122357687ec14e26763df8138f66cbc060975f85e6f812cd06229cdca90eac5cdd77a95de30570b9553ac869fe614f92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8

    Filesize

    2KB

    MD5

    4db89abdc1fe97e8fad3a251978b870d

    SHA1

    a86ae12b59e082efef0b788e374ea789e05c7578

    SHA256

    a8e6937ef8b34398817e4b2cd716890b7cafa2a095139d1e101434e1b68d095c

    SHA512

    84aebf9c7d04aa81761f461350ddfbd20d4a5fd5256c80f0a3e513c64734a378bc2d119ad03303e97fb96f5f767788fa0d073393fb867e33c307768fba1cbb1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    5f37048de717939db22879d186493d92

    SHA1

    f2fac6a9a6261397d648aec0d3f7f2ead3ae023d

    SHA256

    31f3c6aa02743ff82e7fe54bcf5c3005406d9dc4858993cc4762f33f13198c37

    SHA512

    1188df5bbfa21db355b5bf124db2949ac6d75fa95d8aa03158b1b1bd17dd5077ee1a68691ea5e8ca866f5bb4bd8dacdba80a0d1e4005de6bfc5d9499b770acc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8

    Filesize

    488B

    MD5

    eaa6639443ad92bbf86016bc5a76e6d5

    SHA1

    caa08ebbf52f2a8a0fafd991bb21df16e578629a

    SHA256

    80108ae353d06aef2d080c19cb79106f2bdc6fab61aa0039c64637a5dd289e10

    SHA512

    4dc99335cb5ba605c8aff760b988894ced678cca13d6da7245561f6c9775a89b5380dc5026338a05368956ad5a293e1a214b2ea3400c62c1d32d6de499cd2227

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    989dc394632f7a1f1222d4432330d21c

    SHA1

    88d216c63867f5d7bb9ffd5affb934e7f71080d9

    SHA256

    62e8988b6ba8316a07f1a18c81c2a32c61bfcb9ff7e7aeb231518d459aa0e5ea

    SHA512

    f5f23c12e296cb172766f40a0a37665006be4b1ead8cd4c775e16e298c16f80ca73575f610f2c3d0d131e2cb7220a81e8b93275d3af657a990d16b5bd34a37c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    281df4d44fd526826080f2def2a417ba

    SHA1

    c442b04f3c5f424fcb9c85e6fc4544177ebf0533

    SHA256

    d2bebd9058ddee725cd29e4da74dad8faa9054699ed0f89de7a49da922b3537e

    SHA512

    9afca193e24f853cd087a08d1e28930d643775e82eaae4757b0f6862ca705149094c2f6d35a907798a386c3d546dd349a6ad298a9a4f1555b2e601d720f3ea82

  • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe

    Filesize

    89.4MB

    MD5

    57c374e2356d0013cff1711b74e6baad

    SHA1

    3b914bc60de43eaa9255441b76d6b92ff25fab9c

    SHA256

    ae2cf3e5f83742de8b33124403b295559a1aa814dc5f0e26eddbcc3ac94c55fe

    SHA512

    88da3108e668099b99b5506a0904ba48122357687ec14e26763df8138f66cbc060975f85e6f812cd06229cdca90eac5cdd77a95de30570b9553ac869fe614f92

  • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe

    Filesize

    89.4MB

    MD5

    57c374e2356d0013cff1711b74e6baad

    SHA1

    3b914bc60de43eaa9255441b76d6b92ff25fab9c

    SHA256

    ae2cf3e5f83742de8b33124403b295559a1aa814dc5f0e26eddbcc3ac94c55fe

    SHA512

    88da3108e668099b99b5506a0904ba48122357687ec14e26763df8138f66cbc060975f85e6f812cd06229cdca90eac5cdd77a95de30570b9553ac869fe614f92

  • \Program Files (x86)\1674703093_0\360TS_Setup.exe

    Filesize

    89.4MB

    MD5

    57c374e2356d0013cff1711b74e6baad

    SHA1

    3b914bc60de43eaa9255441b76d6b92ff25fab9c

    SHA256

    ae2cf3e5f83742de8b33124403b295559a1aa814dc5f0e26eddbcc3ac94c55fe

    SHA512

    88da3108e668099b99b5506a0904ba48122357687ec14e26763df8138f66cbc060975f85e6f812cd06229cdca90eac5cdd77a95de30570b9553ac869fe614f92

  • \Users\Admin\AppData\Local\Temp\1674703093_00000000_base\360base.dll

    Filesize

    884KB

    MD5

    8c42fc725106cf8276e625b4f97861bc

    SHA1

    9c4140730cb031c29fc63e17e1504693d0f21c13

    SHA256

    d1ca92aa0789ee87d45f9f3c63e0e46ad2997b09605cbc2c57da2be6b8488c22

    SHA512

    f3c33dfe8e482692d068bf2185bec7d0d2bb232e6828b0bc8dc867da9e7ca89f9356fde87244fe686e3830f957c052089a87ecff4e44842a1a7848246f0ba105

  • \Users\Admin\AppData\Local\Temp\1674703099_00000000_base\360base.dll

    Filesize

    884KB

    MD5

    8c42fc725106cf8276e625b4f97861bc

    SHA1

    9c4140730cb031c29fc63e17e1504693d0f21c13

    SHA256

    d1ca92aa0789ee87d45f9f3c63e0e46ad2997b09605cbc2c57da2be6b8488c22

    SHA512

    f3c33dfe8e482692d068bf2185bec7d0d2bb232e6828b0bc8dc867da9e7ca89f9356fde87244fe686e3830f957c052089a87ecff4e44842a1a7848246f0ba105

  • \Users\Admin\AppData\Local\Temp\360TS_Setup.exe

    Filesize

    89.4MB

    MD5

    57c374e2356d0013cff1711b74e6baad

    SHA1

    3b914bc60de43eaa9255441b76d6b92ff25fab9c

    SHA256

    ae2cf3e5f83742de8b33124403b295559a1aa814dc5f0e26eddbcc3ac94c55fe

    SHA512

    88da3108e668099b99b5506a0904ba48122357687ec14e26763df8138f66cbc060975f85e6f812cd06229cdca90eac5cdd77a95de30570b9553ac869fe614f92

  • \Users\Admin\AppData\Local\Temp\360TS_Setup.exe

    Filesize

    89.4MB

    MD5

    57c374e2356d0013cff1711b74e6baad

    SHA1

    3b914bc60de43eaa9255441b76d6b92ff25fab9c

    SHA256

    ae2cf3e5f83742de8b33124403b295559a1aa814dc5f0e26eddbcc3ac94c55fe

    SHA512

    88da3108e668099b99b5506a0904ba48122357687ec14e26763df8138f66cbc060975f85e6f812cd06229cdca90eac5cdd77a95de30570b9553ac869fe614f92

  • \Users\Admin\AppData\Local\Temp\360TS_Setup.exe

    Filesize

    89.4MB

    MD5

    57c374e2356d0013cff1711b74e6baad

    SHA1

    3b914bc60de43eaa9255441b76d6b92ff25fab9c

    SHA256

    ae2cf3e5f83742de8b33124403b295559a1aa814dc5f0e26eddbcc3ac94c55fe

    SHA512

    88da3108e668099b99b5506a0904ba48122357687ec14e26763df8138f66cbc060975f85e6f812cd06229cdca90eac5cdd77a95de30570b9553ac869fe614f92

  • \Users\Admin\AppData\Local\Temp\360TS_Setup.exe

    Filesize

    89.4MB

    MD5

    57c374e2356d0013cff1711b74e6baad

    SHA1

    3b914bc60de43eaa9255441b76d6b92ff25fab9c

    SHA256

    ae2cf3e5f83742de8b33124403b295559a1aa814dc5f0e26eddbcc3ac94c55fe

    SHA512

    88da3108e668099b99b5506a0904ba48122357687ec14e26763df8138f66cbc060975f85e6f812cd06229cdca90eac5cdd77a95de30570b9553ac869fe614f92

  • \Users\Admin\AppData\Local\Temp\360_install_20230126031819_7133629\7z.dll

    Filesize

    1.1MB

    MD5

    e74067bfda81cd82fe3a5fc2fdb87e2b

    SHA1

    de961204751d9af1bab9c2a9ba16edc7a4ae7388

    SHA256

    898bf5db34d9997b3d90b87091f34ae4e3e9cf34b6f2ae7fb8fd86e8a1bb684e

    SHA512

    c0b1d851d97df2635b865d7f0a252881eef622363e08190e1f45ec308fdbd81f94ece53a6c2b1b36c38fcb82c2b8262f31a936a399cee567631b9146cf3ef60a

  • \Users\Admin\AppData\Local\Temp\{60F8B18B-A3D4-4384-B97D-78EB4F1EB1CB}.tmp\360P2SP.dll

    Filesize

    824KB

    MD5

    fc1796add9491ee757e74e65cedd6ae7

    SHA1

    603e87ab8cb45f62ecc7a9ef52d5dedd261ea812

    SHA256

    bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60

    SHA512

    8fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d

  • memory/768-66-0x0000000000000000-mapping.dmp

  • memory/1268-60-0x0000000000000000-mapping.dmp

  • memory/1308-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB