Analysis
-
max time kernel
156s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2023, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
修炼爱情@3242(20230703).exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
修炼爱情@3242(20230703).exe
Resource
win10v2004-20230703-en
General
-
Target
修炼爱情@3242(20230703).exe
-
Size
7.4MB
-
MD5
b021f92833fbdca828de039b66714b73
-
SHA1
65250efa5df8a8d918e2180b8601902b30137546
-
SHA256
18e98ce9e4c78cc015ccb5da278ae07e0a61c9f6306b6b1d0d405c7d6fec5e3f
-
SHA512
83f22b9819f27a79932d392ff4002ad4840340b1dfe17456adc989793e37895298c4f839ae9bc91d0cb93ec427c7714f8fe4891ff2f93f73c8d0a2de14af14d7
-
SSDEEP
98304:IRJLoezZMrR5raOZ7LuOY1j/J4aXa1NB6kN2J344OiZrq1DfPHNADtV6v+8:arwrWOYd/yaYT6kAI4O7NADtV6v+8
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation 修炼爱情@3242(20230703).exe -
Executes dropped EXE 2 IoCs
pid Process 4952 zd.exe 4572 md.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: md.exe File opened (read-only) \??\I: md.exe File opened (read-only) \??\J: md.exe File opened (read-only) \??\P: md.exe File opened (read-only) \??\T: md.exe File opened (read-only) \??\X: md.exe File opened (read-only) \??\Z: md.exe File opened (read-only) \??\Y: md.exe File opened (read-only) \??\H: md.exe File opened (read-only) \??\M: md.exe File opened (read-only) \??\O: md.exe File opened (read-only) \??\Q: md.exe File opened (read-only) \??\R: md.exe File opened (read-only) \??\S: md.exe File opened (read-only) \??\V: md.exe File opened (read-only) \??\G: md.exe File opened (read-only) \??\W: md.exe File opened (read-only) \??\B: md.exe File opened (read-only) \??\K: md.exe File opened (read-only) \??\L: md.exe File opened (read-only) \??\N: md.exe File opened (read-only) \??\U: md.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe 4572 md.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1200 修炼爱情@3242(20230703).exe 1200 修炼爱情@3242(20230703).exe 4952 zd.exe 4952 zd.exe 4572 md.exe 4572 md.exe 4572 md.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 4952 1200 修炼爱情@3242(20230703).exe 90 PID 1200 wrote to memory of 4952 1200 修炼爱情@3242(20230703).exe 90 PID 1200 wrote to memory of 4572 1200 修炼爱情@3242(20230703).exe 91 PID 1200 wrote to memory of 4572 1200 修炼爱情@3242(20230703).exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\修炼爱情@3242(20230703).exe"C:\Users\Admin\AppData\Local\Temp\修炼爱情@3242(20230703).exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Public\zd.exe"C:\Users\Public\zd.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4952
-
-
C:\Users\Public\md.exe"C:\Users\Public\md.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4572
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51dbf0ef2693e5f526ba67901ca4ddb57
SHA183c043da6f34b84914c43d1ff9437c0b67c1e919
SHA25655662d88fdbe36dbae824a50ac377e31133f227cae86c2239f0bf0a5bb147563
SHA512fb54436707a6a452f5a2e99d0b0c64520359f4d62ac29e2b2bfb4aca0d9befe9181c70e1f4f8f9a669ee3dd105a49073e1f7fa2d21ea5385a2e9e98963d757e0
-
Filesize
5.6MB
MD56de8c16361f599f7c384d33c08e74375
SHA18985e0a025426a1ebd39f79099c243385cae5f5f
SHA256578fda41f49abf9bcfa713d55e02ec71996ef291c9c3a0bf9344862c1e85acf3
SHA51298f10e98bc9ccdbc072a426e8feaf2f4be727df0e99132a1f8bc0e2a8fc596844f5ea3994d9d22aa3f232bbdf4e1be5418e484caf60f2d7fe9fbd00012f05a2c
-
Filesize
5.6MB
MD56de8c16361f599f7c384d33c08e74375
SHA18985e0a025426a1ebd39f79099c243385cae5f5f
SHA256578fda41f49abf9bcfa713d55e02ec71996ef291c9c3a0bf9344862c1e85acf3
SHA51298f10e98bc9ccdbc072a426e8feaf2f4be727df0e99132a1f8bc0e2a8fc596844f5ea3994d9d22aa3f232bbdf4e1be5418e484caf60f2d7fe9fbd00012f05a2c
-
Filesize
5.6MB
MD56de8c16361f599f7c384d33c08e74375
SHA18985e0a025426a1ebd39f79099c243385cae5f5f
SHA256578fda41f49abf9bcfa713d55e02ec71996ef291c9c3a0bf9344862c1e85acf3
SHA51298f10e98bc9ccdbc072a426e8feaf2f4be727df0e99132a1f8bc0e2a8fc596844f5ea3994d9d22aa3f232bbdf4e1be5418e484caf60f2d7fe9fbd00012f05a2c
-
Filesize
2KB
MD51dbf0ef2693e5f526ba67901ca4ddb57
SHA183c043da6f34b84914c43d1ff9437c0b67c1e919
SHA25655662d88fdbe36dbae824a50ac377e31133f227cae86c2239f0bf0a5bb147563
SHA512fb54436707a6a452f5a2e99d0b0c64520359f4d62ac29e2b2bfb4aca0d9befe9181c70e1f4f8f9a669ee3dd105a49073e1f7fa2d21ea5385a2e9e98963d757e0
-
Filesize
4.3MB
MD51221d5b0b59fdd3746f0cdf8b2ff922d
SHA1a2ebb8c1cfe08ecf850234bfd084f020cf90b69b
SHA2562eddf8f298fba10de9a20b175f2eefe3a613c715f7b69ac4deab87df72d2b15d
SHA512e555b3432e416b83cc456444293f7b6e673e13768bbde390bc8fc4d666a718137dc57848aaaa94b7b5a52a5682d30ec52ffcddb876b022a72a3a1feca1255734
-
Filesize
4.3MB
MD51221d5b0b59fdd3746f0cdf8b2ff922d
SHA1a2ebb8c1cfe08ecf850234bfd084f020cf90b69b
SHA2562eddf8f298fba10de9a20b175f2eefe3a613c715f7b69ac4deab87df72d2b15d
SHA512e555b3432e416b83cc456444293f7b6e673e13768bbde390bc8fc4d666a718137dc57848aaaa94b7b5a52a5682d30ec52ffcddb876b022a72a3a1feca1255734
-
Filesize
4.3MB
MD51221d5b0b59fdd3746f0cdf8b2ff922d
SHA1a2ebb8c1cfe08ecf850234bfd084f020cf90b69b
SHA2562eddf8f298fba10de9a20b175f2eefe3a613c715f7b69ac4deab87df72d2b15d
SHA512e555b3432e416b83cc456444293f7b6e673e13768bbde390bc8fc4d666a718137dc57848aaaa94b7b5a52a5682d30ec52ffcddb876b022a72a3a1feca1255734
-
Filesize
2KB
MD57c4e2ed20f9be4b00c984507aa92dd16
SHA1dae599890a22dc8dd2630bf151de2384db301d14
SHA256faaef69cfcfe3ab80e39ad77dc9f48bbc1c526f1f8d0c410ec22590ad038e4d6
SHA512ca936149987c8bbed744c71388792e5745d4de47763206abb4a70069567ed397d09ff817411fe12370953772806b7592cc82665c5fb6997c7d8e617fccef8fbb