Overview
overview
7Static
static
3Shadowsocks.exe
windows7-x64
7Shadowsocks.exe
windows10-2004-x64
7fr/Shadows...es.dll
windows7-x64
1fr/Shadows...es.dll
windows10-2004-x64
1ja/Shadows...es.dll
windows7-x64
1ja/Shadows...es.dll
windows10-2004-x64
1ko/Shadows...es.dll
windows7-x64
1ko/Shadows...es.dll
windows10-2004-x64
1ru/Shadows...es.dll
windows7-x64
1ru/Shadows...es.dll
windows10-2004-x64
5zh-Hans/Sh...es.dll
windows7-x64
1zh-Hans/Sh...es.dll
windows10-2004-x64
1zh-Hant/Sh...es.dll
windows7-x64
1zh-Hant/Sh...es.dll
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2023, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
Shadowsocks.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Shadowsocks.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
fr/Shadowsocks.resources.dll
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
fr/Shadowsocks.resources.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
ja/Shadowsocks.resources.dll
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
ja/Shadowsocks.resources.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
ko/Shadowsocks.resources.dll
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
ko/Shadowsocks.resources.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
ru/Shadowsocks.resources.dll
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
ru/Shadowsocks.resources.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
zh-Hans/Shadowsocks.resources.dll
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
zh-Hans/Shadowsocks.resources.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
zh-Hant/Shadowsocks.resources.dll
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
zh-Hant/Shadowsocks.resources.dll
Resource
win10v2004-20230703-en
General
-
Target
ru/Shadowsocks.resources.dll
-
Size
5KB
-
MD5
9d071acf8d294a1c9522331ecb45354d
-
SHA1
eb48b9bcba782a35e62bb1bd82b32ff23b704920
-
SHA256
1623705e7a5518f15a72ca47cf07d3a484efc8b8b07d8f51e920b81bec9b4a6a
-
SHA512
643745ffe88a3bc49a288a08ea4ece17cfbda2c8aa6fcd2a457140b09ec8b5cc0421f024b0b4621826ca9db428a0daf7f1978e65f0146f7006f21335008b001d
-
SSDEEP
96:YpClkFLuMLHwAw2ctkCp5RdNuad+lPuqSHsf:YposLDCdNuago78
Malware Config
Signatures
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{994B82E9-5BCB-4EF3-9B7F-AA1D1410AFA5}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5032 wrote to memory of 960 5032 rundll32.exe 60 PID 5032 wrote to memory of 960 5032 rundll32.exe 60 PID 5032 wrote to memory of 960 5032 rundll32.exe 60 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ru\Shadowsocks.resources.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ru\Shadowsocks.resources.dll,#12⤵PID:960
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5c01eaa0bdcd7c30a42bbb35a9acbf574
SHA10aee3e1b873e41d040f1991819d0027b6cc68f54
SHA25632297224427103aa1834dba276bf5d49cd5dd6bda0291422e47ad0d0706c6d40
SHA512d26ff775ad39425933cd3df92209faa53ec5b701e65bfbcccc64ce8dd3e79f619a9bad7cc975a98a95f2006ae89e50551877fc315a3050e48d5ab89e0802e2b7