Overview
overview
10Static
static
7infected20...1).chm
windows7-x64
1infected20...1).chm
windows10-2004-x64
7infected20...df.exe
windows7-x64
7infected20...df.exe
windows10-2004-x64
7infected20...�1.exe
windows7-x64
1infected20...�1.exe
windows10-2004-x64
1infected20...ls.exe
windows7-x64
7infected20...ls.exe
windows10-2004-x64
7infected20...fo.exe
windows7-x64
7infected20...fo.exe
windows10-2004-x64
7infected20...od.exe
windows7-x64
7infected20...od.exe
windows10-2004-x64
7infected20...25.exe
windows7-x64
7infected20...25.exe
windows10-2004-x64
7infected20...��.exe
windows7-x64
1infected20...��.exe
windows10-2004-x64
1infected20...nd.exe
windows7-x64
1infected20...nd.exe
windows10-2004-x64
1infected20...eg.exe
windows7-x64
10infected20...eg.exe
windows10-2004-x64
10infected20...#r.exe
windows7-x64
7infected20...#r.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 15:30
Behavioral task
behavioral1
Sample
infected2023042501/Downloads/-252871022_150(1).chm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
infected2023042501/Downloads/-252871022_150(1).chm
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
infected2023042501/Downloads/2021-2022年度民航青年文明号拟命名集体名单.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
infected2023042501/Downloads/2021-2022年度民航青年文明号拟命名集体名单.pdf.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
infected2023042501/Downloads/2023企业个人最新版所得税缴纳标准1.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
infected2023042501/Downloads/2023企业个人最新版所得税缴纳标准1.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
infected2023042501/Downloads/Quotation_copy_xls.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
infected2023042501/Downloads/Quotation_copy_xls.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
infected2023042501/Downloads/getsysteminfo.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
infected2023042501/Downloads/getsysteminfo.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
infected2023042501/Downloads/中航信移动科技有限公司〔2023〕7号.xcod.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
infected2023042501/Downloads/中航信移动科技有限公司〔2023〕7号.xcod.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral13
Sample
infected2023042501/Downloads/公积金信息_20230425.exe
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
infected2023042501/Downloads/公积金信息_20230425.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
infected2023042501/Downloads/工号:YC01198-工作邮箱:[email protected]使用工位网口异常反馈.exe
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
infected2023042501/Downloads/工号:YC01198-工作邮箱:[email protected]使用工位网口异常反馈.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
infected2023042501/Downloads/永赢基金管理有限公司客户相关的投诉信件内容_maxwealthfund.exe
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
infected2023042501/Downloads/永赢基金管理有限公司客户相关的投诉信件内容_maxwealthfund.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
infected2023042501/Downloads/深圳智园总部饭堂吃出小蟑螂食品安全事件图片证据jpeg.exe
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
infected2023042501/Downloads/深圳智园总部饭堂吃出小蟑螂食品安全事件图片证据jpeg.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
infected2023042501/Downloads/资金账户对账单导出#r.exe
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
infected2023042501/Downloads/资金账户对账单导出#r.exe
Resource
win10v2004-20230221-en
General
-
Target
infected2023042501/Downloads/Quotation_copy_xls.exe
-
Size
628KB
-
MD5
36a23e46ba1e833c84e33f7501cd0f4b
-
SHA1
6900ac5e88907e8b90f5b59841252df36b2b2676
-
SHA256
a639434c17b727128c5ac246dc77417a27ad769f901979cd797cbd87ecf5fb30
-
SHA512
56e66d18ed56dce55ff3724e296bdacaf9fd0aab1971c67137536248868e1c273423ede5df3665bbdb44c5f5422f1c26b1e1a171cd2d1b6c10fc90eab7007b5f
-
SSDEEP
12288:jY6cc7i+L9CVZW4uJaRkBrPmD9NwjmgcpN2W33K6UGBWlZxe+15gwh:jY6c/QCVZaJPPY9+Tcpx66XB002
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation gfbwkdyta.exe -
Executes dropped EXE 2 IoCs
pid Process 4272 gfbwkdyta.exe 5108 gfbwkdyta.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4272 set thread context of 5108 4272 gfbwkdyta.exe 85 PID 5108 set thread context of 3188 5108 gfbwkdyta.exe 55 PID 2496 set thread context of 3188 2496 ipconfig.exe 55 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4980 4784 WerFault.exe 93 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2496 ipconfig.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5108 gfbwkdyta.exe 5108 gfbwkdyta.exe 5108 gfbwkdyta.exe 5108 gfbwkdyta.exe 5108 gfbwkdyta.exe 5108 gfbwkdyta.exe 5108 gfbwkdyta.exe 5108 gfbwkdyta.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3188 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4272 gfbwkdyta.exe 5108 gfbwkdyta.exe 5108 gfbwkdyta.exe 5108 gfbwkdyta.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe 2496 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5108 gfbwkdyta.exe Token: SeDebugPrivilege 2496 ipconfig.exe Token: SeShutdownPrivilege 3188 Explorer.EXE Token: SeCreatePagefilePrivilege 3188 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4272 gfbwkdyta.exe 4272 gfbwkdyta.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4272 gfbwkdyta.exe 4272 gfbwkdyta.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4180 wrote to memory of 4272 4180 Quotation_copy_xls.exe 84 PID 4180 wrote to memory of 4272 4180 Quotation_copy_xls.exe 84 PID 4180 wrote to memory of 4272 4180 Quotation_copy_xls.exe 84 PID 4272 wrote to memory of 5108 4272 gfbwkdyta.exe 85 PID 4272 wrote to memory of 5108 4272 gfbwkdyta.exe 85 PID 4272 wrote to memory of 5108 4272 gfbwkdyta.exe 85 PID 4272 wrote to memory of 5108 4272 gfbwkdyta.exe 85 PID 3188 wrote to memory of 2496 3188 Explorer.EXE 86 PID 3188 wrote to memory of 2496 3188 Explorer.EXE 86 PID 3188 wrote to memory of 2496 3188 Explorer.EXE 86 PID 2496 wrote to memory of 4784 2496 ipconfig.exe 93 PID 2496 wrote to memory of 4784 2496 ipconfig.exe 93 PID 2496 wrote to memory of 4784 2496 ipconfig.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\infected2023042501\Downloads\Quotation_copy_xls.exe"C:\Users\Admin\AppData\Local\Temp\infected2023042501\Downloads\Quotation_copy_xls.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\gfbwkdyta.exe"C:\Users\Admin\AppData\Local\Temp\gfbwkdyta.exe" "C:\Users\Admin\AppData\Local\Temp\oodkao.au3"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\gfbwkdyta.exe"C:\Users\Admin\AppData\Local\Temp\gfbwkdyta.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4784
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4784 -s 1484⤵
- Program crash
PID:4980
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 476 -p 4784 -ip 47841⤵PID:1460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
4KB
MD5262136142a94213d41a606c221ca0353
SHA199b45a1fcbd3b3a4833afbfdf76b1255864038ab
SHA2562c9c2c13f6cdc263a68136066966a66d7719d9a39dc83a2a329e65f87b9504f7
SHA5129739d7e69486410ab73532cbdc7dd56f5e4b41e355b68f46ef3a4038ad20e821887c3640dc48a98dd5dc15229380a993aaf68e8ae2f82e9ba95a0626a87e76e8
-
Filesize
53KB
MD513520465fafe3d19b336514bd7657fdd
SHA1ce307cb30a31a0e98ec60a352d3a1dbf33c834e2
SHA2566aa731332aa2c8417e9e1cc08536ad80b63a48aa23de9372926538fb25503d5d
SHA512a33eaa8a7a6f3cd66490b20fa5a43eb63d9b65072f724b64ea84663d16b1a630295bcb8bc17a22daade2f05a8b1e5edf3c1951be4415cd5ed841c72cb5dd8182
-
Filesize
205KB
MD569c9166467b2d9fad11b1ff4a204c7fb
SHA14ddde4fad534b33a73a901216314fe8b81e77f15
SHA256c2f8d0b92c9eb58183fca0ce03c97ac84581320c0afb6db46613d29db4e1b6fc
SHA5120be167164fef678997dac23ba2fbf4233c12e93fcdbd96bab7ebceb4f90ca528e8278177f1e72771ea18c326063a62cffe7f0819c81f32a75058114146503695