Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2023 17:09

General

  • Target

    修炼爱情@3242(20230703).exe

  • Size

    7.4MB

  • MD5

    b021f92833fbdca828de039b66714b73

  • SHA1

    65250efa5df8a8d918e2180b8601902b30137546

  • SHA256

    18e98ce9e4c78cc015ccb5da278ae07e0a61c9f6306b6b1d0d405c7d6fec5e3f

  • SHA512

    83f22b9819f27a79932d392ff4002ad4840340b1dfe17456adc989793e37895298c4f839ae9bc91d0cb93ec427c7714f8fe4891ff2f93f73c8d0a2de14af14d7

  • SSDEEP

    98304:IRJLoezZMrR5raOZ7LuOY1j/J4aXa1NB6kN2J344OiZrq1DfPHNADtV6v+8:arwrWOYd/yaYT6kAI4O7NADtV6v+8

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\修炼爱情@3242(20230703).exe
    "C:\Users\Admin\AppData\Local\Temp\修炼爱情@3242(20230703).exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Users\Public\zd.exe
      "C:\Users\Public\zd.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2612
    • C:\Users\Public\md.exe
      "C:\Users\Public\md.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Documents\md.jpg

    Filesize

    2KB

    MD5

    1dbf0ef2693e5f526ba67901ca4ddb57

    SHA1

    83c043da6f34b84914c43d1ff9437c0b67c1e919

    SHA256

    55662d88fdbe36dbae824a50ac377e31133f227cae86c2239f0bf0a5bb147563

    SHA512

    fb54436707a6a452f5a2e99d0b0c64520359f4d62ac29e2b2bfb4aca0d9befe9181c70e1f4f8f9a669ee3dd105a49073e1f7fa2d21ea5385a2e9e98963d757e0

  • C:\Users\Public\md.exe

    Filesize

    5.6MB

    MD5

    6de8c16361f599f7c384d33c08e74375

    SHA1

    8985e0a025426a1ebd39f79099c243385cae5f5f

    SHA256

    578fda41f49abf9bcfa713d55e02ec71996ef291c9c3a0bf9344862c1e85acf3

    SHA512

    98f10e98bc9ccdbc072a426e8feaf2f4be727df0e99132a1f8bc0e2a8fc596844f5ea3994d9d22aa3f232bbdf4e1be5418e484caf60f2d7fe9fbd00012f05a2c

  • C:\Users\Public\md.exe

    Filesize

    5.6MB

    MD5

    6de8c16361f599f7c384d33c08e74375

    SHA1

    8985e0a025426a1ebd39f79099c243385cae5f5f

    SHA256

    578fda41f49abf9bcfa713d55e02ec71996ef291c9c3a0bf9344862c1e85acf3

    SHA512

    98f10e98bc9ccdbc072a426e8feaf2f4be727df0e99132a1f8bc0e2a8fc596844f5ea3994d9d22aa3f232bbdf4e1be5418e484caf60f2d7fe9fbd00012f05a2c

  • C:\Users\Public\md.jpg

    Filesize

    2KB

    MD5

    1dbf0ef2693e5f526ba67901ca4ddb57

    SHA1

    83c043da6f34b84914c43d1ff9437c0b67c1e919

    SHA256

    55662d88fdbe36dbae824a50ac377e31133f227cae86c2239f0bf0a5bb147563

    SHA512

    fb54436707a6a452f5a2e99d0b0c64520359f4d62ac29e2b2bfb4aca0d9befe9181c70e1f4f8f9a669ee3dd105a49073e1f7fa2d21ea5385a2e9e98963d757e0

  • C:\Users\Public\zd.exe

    Filesize

    4.3MB

    MD5

    1221d5b0b59fdd3746f0cdf8b2ff922d

    SHA1

    a2ebb8c1cfe08ecf850234bfd084f020cf90b69b

    SHA256

    2eddf8f298fba10de9a20b175f2eefe3a613c715f7b69ac4deab87df72d2b15d

    SHA512

    e555b3432e416b83cc456444293f7b6e673e13768bbde390bc8fc4d666a718137dc57848aaaa94b7b5a52a5682d30ec52ffcddb876b022a72a3a1feca1255734

  • C:\Users\Public\zd.exe

    Filesize

    4.3MB

    MD5

    1221d5b0b59fdd3746f0cdf8b2ff922d

    SHA1

    a2ebb8c1cfe08ecf850234bfd084f020cf90b69b

    SHA256

    2eddf8f298fba10de9a20b175f2eefe3a613c715f7b69ac4deab87df72d2b15d

    SHA512

    e555b3432e416b83cc456444293f7b6e673e13768bbde390bc8fc4d666a718137dc57848aaaa94b7b5a52a5682d30ec52ffcddb876b022a72a3a1feca1255734

  • C:\Users\Public\zd.jpg

    Filesize

    2KB

    MD5

    7c4e2ed20f9be4b00c984507aa92dd16

    SHA1

    dae599890a22dc8dd2630bf151de2384db301d14

    SHA256

    faaef69cfcfe3ab80e39ad77dc9f48bbc1c526f1f8d0c410ec22590ad038e4d6

    SHA512

    ca936149987c8bbed744c71388792e5745d4de47763206abb4a70069567ed397d09ff817411fe12370953772806b7592cc82665c5fb6997c7d8e617fccef8fbb

  • \Users\Public\md.exe

    Filesize

    5.6MB

    MD5

    6de8c16361f599f7c384d33c08e74375

    SHA1

    8985e0a025426a1ebd39f79099c243385cae5f5f

    SHA256

    578fda41f49abf9bcfa713d55e02ec71996ef291c9c3a0bf9344862c1e85acf3

    SHA512

    98f10e98bc9ccdbc072a426e8feaf2f4be727df0e99132a1f8bc0e2a8fc596844f5ea3994d9d22aa3f232bbdf4e1be5418e484caf60f2d7fe9fbd00012f05a2c

  • \Users\Public\zd.exe

    Filesize

    4.3MB

    MD5

    1221d5b0b59fdd3746f0cdf8b2ff922d

    SHA1

    a2ebb8c1cfe08ecf850234bfd084f020cf90b69b

    SHA256

    2eddf8f298fba10de9a20b175f2eefe3a613c715f7b69ac4deab87df72d2b15d

    SHA512

    e555b3432e416b83cc456444293f7b6e673e13768bbde390bc8fc4d666a718137dc57848aaaa94b7b5a52a5682d30ec52ffcddb876b022a72a3a1feca1255734

  • memory/2612-122-0x0000000001EF0000-0x0000000001EF1000-memory.dmp

    Filesize

    4KB

  • memory/2824-76-0x0000000004A30000-0x0000000004D79000-memory.dmp

    Filesize

    3.3MB

  • memory/2824-93-0x0000000180000000-0x000000018034E000-memory.dmp

    Filesize

    3.3MB

  • memory/2824-92-0x0000000180000000-0x000000018034E000-memory.dmp

    Filesize

    3.3MB

  • memory/2824-87-0x0000000180000000-0x000000018034E000-memory.dmp

    Filesize

    3.3MB

  • memory/2824-75-0x0000000180000000-0x000000018034E000-memory.dmp

    Filesize

    3.3MB

  • memory/2824-68-0x0000000180000000-0x000000018034E000-memory.dmp

    Filesize

    3.3MB

  • memory/2824-86-0x0000000180000000-0x000000018034E000-memory.dmp

    Filesize

    3.3MB

  • memory/2824-108-0x0000000004F60000-0x0000000005C33000-memory.dmp

    Filesize

    12.8MB

  • memory/2824-96-0x0000000180000000-0x000000018034E000-memory.dmp

    Filesize

    3.3MB

  • memory/2824-77-0x0000000180000000-0x000000018034E000-memory.dmp

    Filesize

    3.3MB

  • memory/2824-95-0x0000000180000000-0x000000018034E000-memory.dmp

    Filesize

    3.3MB

  • memory/2840-115-0x000007FEFD830000-0x000007FEFD831000-memory.dmp

    Filesize

    4KB

  • memory/2840-128-0x0000000001FC0000-0x0000000002026000-memory.dmp

    Filesize

    408KB

  • memory/2840-114-0x0000000077B10000-0x0000000077B11000-memory.dmp

    Filesize

    4KB

  • memory/2840-112-0x0000000077B10000-0x0000000077B11000-memory.dmp

    Filesize

    4KB

  • memory/2840-116-0x000007FEFD830000-0x000007FEFD831000-memory.dmp

    Filesize

    4KB

  • memory/2840-117-0x000007FEFD830000-0x000007FEFD831000-memory.dmp

    Filesize

    4KB

  • memory/2840-118-0x000007FEFD830000-0x000007FEFD831000-memory.dmp

    Filesize

    4KB

  • memory/2840-110-0x0000000077B10000-0x0000000077B11000-memory.dmp

    Filesize

    4KB

  • memory/2840-123-0x0000000077B10000-0x0000000077B11000-memory.dmp

    Filesize

    4KB

  • memory/2840-111-0x000000013F760000-0x0000000140433000-memory.dmp

    Filesize

    12.8MB

  • memory/2840-125-0x0000000001E00000-0x0000000001E01000-memory.dmp

    Filesize

    4KB

  • memory/2840-127-0x0000000001FC0000-0x0000000002026000-memory.dmp

    Filesize

    408KB

  • memory/2840-126-0x0000000001FC0000-0x0000000002026000-memory.dmp

    Filesize

    408KB

  • memory/2840-113-0x0000000077B10000-0x0000000077B11000-memory.dmp

    Filesize

    4KB

  • memory/2840-130-0x0000000002140000-0x00000000021C1000-memory.dmp

    Filesize

    516KB

  • memory/2840-131-0x0000000001FC0000-0x0000000002026000-memory.dmp

    Filesize

    408KB

  • memory/2840-132-0x0000000001FC0000-0x0000000002026000-memory.dmp

    Filesize

    408KB

  • memory/2840-133-0x0000000001FC0000-0x0000000002026000-memory.dmp

    Filesize

    408KB

  • memory/2840-134-0x0000000003130000-0x0000000003172000-memory.dmp

    Filesize

    264KB

  • memory/2840-135-0x00000000030F0000-0x000000000312B000-memory.dmp

    Filesize

    236KB

  • memory/2840-136-0x0000000003130000-0x0000000003172000-memory.dmp

    Filesize

    264KB

  • memory/2840-137-0x0000000003130000-0x0000000003172000-memory.dmp

    Filesize

    264KB

  • memory/2840-138-0x0000000003130000-0x0000000003172000-memory.dmp

    Filesize

    264KB

  • memory/2840-139-0x0000000003130000-0x0000000003172000-memory.dmp

    Filesize

    264KB

  • memory/2840-140-0x0000000001FC0000-0x0000000002026000-memory.dmp

    Filesize

    408KB

  • memory/2840-141-0x0000000001FC0000-0x0000000002026000-memory.dmp

    Filesize

    408KB

  • memory/2840-142-0x000000013F760000-0x0000000140433000-memory.dmp

    Filesize

    12.8MB

  • memory/2840-144-0x0000000003130000-0x0000000003172000-memory.dmp

    Filesize

    264KB