Analysis
-
max time kernel
111s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2023 20:10
Behavioral task
behavioral1
Sample
8e95662f91072d3c95aa126e7ad3c7fd094390029200cd0fa1c3a20a87b9eeae.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8e95662f91072d3c95aa126e7ad3c7fd094390029200cd0fa1c3a20a87b9eeae.exe
Resource
win10v2004-20221111-en
General
-
Target
8e95662f91072d3c95aa126e7ad3c7fd094390029200cd0fa1c3a20a87b9eeae.exe
-
Size
4.4MB
-
MD5
5155f6e7f8362c85a6d0fa09f76bbd20
-
SHA1
a44bd20487e1e8ce6b2c0307289318c2876f6417
-
SHA256
8e95662f91072d3c95aa126e7ad3c7fd094390029200cd0fa1c3a20a87b9eeae
-
SHA512
45b26844d1d06d42aeeeeec72ac72f54332bf30f7c2e0e4d6a85240c36b970dacf423a74eeaac4292ba741d6bd28c5eeb756bcef46a28ff114568eb4917c4bb3
-
SSDEEP
98304:Wl4xQfRdFhh2Xl5QuB4ZSmF5oPSSz9tyF/pr/Tc97TCWa+cA:Wl4xQfjFb2IRqPSS3GBr2WA
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\temp0\3DVIAPlayer.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\temp0\3DVIAPlayer.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
3DVIAPlayer.exepid process 3360 3DVIAPlayer.exe -
Loads dropped DLL 1 IoCs
Processes:
3DVIAPlayer.exepid process 3360 3DVIAPlayer.exe -
Processes:
3DVIAPlayer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\International\CpMRU 3DVIAPlayer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" 3DVIAPlayer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" 3DVIAPlayer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" 3DVIAPlayer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" 3DVIAPlayer.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
3DVIAPlayer.exepid process 3360 3DVIAPlayer.exe 3360 3DVIAPlayer.exe 3360 3DVIAPlayer.exe 3360 3DVIAPlayer.exe 3360 3DVIAPlayer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
8e95662f91072d3c95aa126e7ad3c7fd094390029200cd0fa1c3a20a87b9eeae.exedescription pid process target process PID 2124 wrote to memory of 3360 2124 8e95662f91072d3c95aa126e7ad3c7fd094390029200cd0fa1c3a20a87b9eeae.exe 3DVIAPlayer.exe PID 2124 wrote to memory of 3360 2124 8e95662f91072d3c95aa126e7ad3c7fd094390029200cd0fa1c3a20a87b9eeae.exe 3DVIAPlayer.exe PID 2124 wrote to memory of 3360 2124 8e95662f91072d3c95aa126e7ad3c7fd094390029200cd0fa1c3a20a87b9eeae.exe 3DVIAPlayer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e95662f91072d3c95aa126e7ad3c7fd094390029200cd0fa1c3a20a87b9eeae.exe"C:\Users\Admin\AppData\Local\Temp\8e95662f91072d3c95aa126e7ad3c7fd094390029200cd0fa1c3a20a87b9eeae.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\temp0\3DVIAPlayer.exeC:\Users\Admin\AppData\Local\Temp\temp0\3DVIAPlayer.exe "C:\Users\Admin\AppData\Local\Temp\temp0\380AL_KongTiaoHuanQiXiTong.smg"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\temp0\3DVIAPlayer.exeFilesize
3.3MB
MD517ca7ab45cbdc724f1db8a1b16270fe6
SHA17f7cc9f76a7e1edf7bc501b8fd6b099e04354d30
SHA256e28b3915bc4ef2191c9ce480742cc3f403903a068bf2b32e66e21da8c55c9b00
SHA512b51ee7bf684e97e0e1036c1f23fa41388d7c81974914df5312059ed402a755d62b1c91860ad50351158cb6f47374b5f1202b66ddb9ce32b1599e6a383483fb4e
-
C:\Users\Admin\AppData\Local\Temp\temp0\3DVIAPlayer.exeFilesize
3.3MB
MD517ca7ab45cbdc724f1db8a1b16270fe6
SHA17f7cc9f76a7e1edf7bc501b8fd6b099e04354d30
SHA256e28b3915bc4ef2191c9ce480742cc3f403903a068bf2b32e66e21da8c55c9b00
SHA512b51ee7bf684e97e0e1036c1f23fa41388d7c81974914df5312059ed402a755d62b1c91860ad50351158cb6f47374b5f1202b66ddb9ce32b1599e6a383483fb4e
-
C:\Users\Admin\AppData\Local\Temp\temp0\3DVIAPlayerCHS.dllFilesize
2.8MB
MD5b09496cfd04e9b5b703694ff957c6200
SHA193584840aeeb325c70320554c8fa340e15770cfb
SHA2565dc17f3c76e03c73fb942e8b6221fd51a5074f787003cc498a6a7ee0ceb85ed8
SHA512fc41dfe70b909cb4cfffd96b51d046c3d4ef6e9be0c1e7fa3c36665e5128ddac6a2a03a41d75975977c5f2b765c53fda58eb8903efea5d92a76b657368cd4107
-
C:\Users\Admin\AppData\Local\Temp\temp0\3DVIAPlayerCHS.dllFilesize
2.8MB
MD5b09496cfd04e9b5b703694ff957c6200
SHA193584840aeeb325c70320554c8fa340e15770cfb
SHA2565dc17f3c76e03c73fb942e8b6221fd51a5074f787003cc498a6a7ee0ceb85ed8
SHA512fc41dfe70b909cb4cfffd96b51d046c3d4ef6e9be0c1e7fa3c36665e5128ddac6a2a03a41d75975977c5f2b765c53fda58eb8903efea5d92a76b657368cd4107
-
memory/2124-133-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/2124-134-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/2124-135-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/2124-132-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/2124-146-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/3360-136-0x0000000000000000-mapping.dmp
-
memory/3360-142-0x0000000000400000-0x0000000001043000-memory.dmpFilesize
12.3MB
-
memory/3360-143-0x0000000000400000-0x0000000001043000-memory.dmpFilesize
12.3MB
-
memory/3360-141-0x0000000000400000-0x0000000001043000-memory.dmpFilesize
12.3MB
-
memory/3360-140-0x0000000000400000-0x0000000001043000-memory.dmpFilesize
12.3MB
-
memory/3360-139-0x0000000000400000-0x0000000001043000-memory.dmpFilesize
12.3MB
-
memory/3360-147-0x0000000000400000-0x0000000001043000-memory.dmpFilesize
12.3MB