Analysis

  • max time kernel
    128s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2023, 19:40

General

  • Target

    2b1e999cfe34313e80ecf20d81f69bf424c73607cbeed381eb5feceaaabde111.exe

  • Size

    5.7MB

  • MD5

    d8d63bc9bb399c5a9d7500e443bc5b6a

  • SHA1

    bc9cdf0ce27a4cadba2d031776ef77ac08933a9c

  • SHA256

    2b1e999cfe34313e80ecf20d81f69bf424c73607cbeed381eb5feceaaabde111

  • SHA512

    ab40600d5d831768a84bd3f0f6cd0e2d66e0fbbd125192ce9048494a0a1a8a189d05c0396cb29cf487bb7dff604ec5d9333b09f88fe8edee9914f186b6b92317

  • SSDEEP

    98304:wpch+nkYc5bKbe/RYPIUDwmz9jiTo6FQcg7jgnokdaSfZ7VGE5uDBENxFFUMfX3t:wpcIkr5jmtDvJgFQ1gVda8hVGEYDBENZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b1e999cfe34313e80ecf20d81f69bf424c73607cbeed381eb5feceaaabde111.exe
    "C:\Users\Admin\AppData\Local\Temp\2b1e999cfe34313e80ecf20d81f69bf424c73607cbeed381eb5feceaaabde111.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Users\Admin\AppData\Local\Temp\XPrinter_58_76_Drv\打印机驱动安装.exe
      "C:\Users\Admin\AppData\Local\Temp\XPrinter_58_76_Drv\打印机驱动安装.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Windows\SysWOW64\net.exe
        net start spooler
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1636
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 start spooler
          4⤵
            PID:1172
        • C:\Windows\SysWOW64\net.exe
          net start stisvc
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:984
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start stisvc
            4⤵
              PID:1632
          • C:\Windows\SysWOW64\net.exe
            net start DeviceInstall
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2044
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start DeviceInstall
              4⤵
                PID:2040
            • C:\Windows\SysWOW64\net.exe
              net start DsmSvc
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1928
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 start DsmSvc
                4⤵
                  PID:1340

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\XPrinter_58_76_Drv\config.ini

            Filesize

            280B

            MD5

            8a0fa7b64d892e20a1545c66f9983db2

            SHA1

            b7fc646472a3f62927cde24ac8dcd2d8625dda85

            SHA256

            d2946a918dff1eb6f789bb60a42136d62ebc9aa32ef5cbc66ff7835a67b294d1

            SHA512

            deed86c7ef7bf1cfea3917d7c2264990b9166ca13620525efe8cdd1d627996425b0aaa1cb93a736f01961a7e6200ae74e4722851887f406cc1bb87a7d8f6c451

          • C:\Users\Admin\AppData\Local\Temp\XPrinter_58_76_Drv\打印机驱动安装.exe

            Filesize

            1.2MB

            MD5

            60741dfbb32a6f407bfdc187656a2696

            SHA1

            ffbc58973fcf5e141eae966cb8a0a56098211366

            SHA256

            1fe2918fac6b55f7b7ab33791cd6492015aff7ccc1364b63d28ce2aa95136a83

            SHA512

            9041aa2437c4daeb06a2b2e62520e07d9a3dd325196bd81661332a33fe6eb6711491ecf34153c7fdd9c7998a32eb0cde7dda799749ac763621b8d2f1c422e93b

          • C:\Users\Admin\AppData\Local\Temp\XPrinter_58_76_Drv\打印机驱动安装.exe

            Filesize

            1.2MB

            MD5

            60741dfbb32a6f407bfdc187656a2696

            SHA1

            ffbc58973fcf5e141eae966cb8a0a56098211366

            SHA256

            1fe2918fac6b55f7b7ab33791cd6492015aff7ccc1364b63d28ce2aa95136a83

            SHA512

            9041aa2437c4daeb06a2b2e62520e07d9a3dd325196bd81661332a33fe6eb6711491ecf34153c7fdd9c7998a32eb0cde7dda799749ac763621b8d2f1c422e93b

          • \Users\Admin\AppData\Local\Temp\XPrinter_58_76_Drv\打印机驱动安装.exe

            Filesize

            1.2MB

            MD5

            60741dfbb32a6f407bfdc187656a2696

            SHA1

            ffbc58973fcf5e141eae966cb8a0a56098211366

            SHA256

            1fe2918fac6b55f7b7ab33791cd6492015aff7ccc1364b63d28ce2aa95136a83

            SHA512

            9041aa2437c4daeb06a2b2e62520e07d9a3dd325196bd81661332a33fe6eb6711491ecf34153c7fdd9c7998a32eb0cde7dda799749ac763621b8d2f1c422e93b

          • memory/848-54-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/848-170-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB