Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2023 01:13

General

  • Target

    d26a7f2d4f3521827201e6cdcd296f132c7d18c3a1ce70c24b423300cff326fe.exe

  • Size

    1.4MB

  • MD5

    31fee2c73b8d2a8ec979775cd5f5ced7

  • SHA1

    39182a68bc0c1c07d3ddc47cd69fe3692dbac834

  • SHA256

    d26a7f2d4f3521827201e6cdcd296f132c7d18c3a1ce70c24b423300cff326fe

  • SHA512

    db51b602a8675641bc3a0a980a197243787ed12f5e0619cb1d390c91193d7e3447e3e86e2321c3ea273c6732b356003a249241d7d8a5699931810e5a35d5c650

  • SSDEEP

    24576:kL/7n6lbcC8oblv1zj1SqdAGFQZIxvC45UJoe1Z:E6+C8o5tzjYq+ZIxL5UJoeL

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d26a7f2d4f3521827201e6cdcd296f132c7d18c3a1ce70c24b423300cff326fe.exe
    "C:\Users\Admin\AppData\Local\Temp\d26a7f2d4f3521827201e6cdcd296f132c7d18c3a1ce70c24b423300cff326fe.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe" /c:101 /pmode:2
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4528
      • C:\Program Files (x86)\1690334105_0\360TS_Setup.exe
        "C:\Program Files (x86)\1690334105_0\360TS_Setup.exe" /c:101 /pmode:2 /TSinstall
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of SetWindowsHookEx
        PID:4524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\1690334105_0\360TS_Setup.exe

    Filesize

    89.8MB

    MD5

    de6c97a0cc648f4448a89dc9516bb559

    SHA1

    eba736e7ecb765545fbeb5718a128b8bdeff6999

    SHA256

    6865e96c5d7cfbd43430f107a15e2a0aa8de37d9d7d4fba17e67a181b36b4386

    SHA512

    1b721ee90667bd848dd5082938f2a62ac9cd7787f4a0bbc8ec94eed232f362ab26abbd532b47b94a8d46bb72cce16371169331ccf3cbcf2267db040d22337ec1

  • C:\Program Files (x86)\1690334105_0\360TS_Setup.exe

    Filesize

    89.8MB

    MD5

    de6c97a0cc648f4448a89dc9516bb559

    SHA1

    eba736e7ecb765545fbeb5718a128b8bdeff6999

    SHA256

    6865e96c5d7cfbd43430f107a15e2a0aa8de37d9d7d4fba17e67a181b36b4386

    SHA512

    1b721ee90667bd848dd5082938f2a62ac9cd7787f4a0bbc8ec94eed232f362ab26abbd532b47b94a8d46bb72cce16371169331ccf3cbcf2267db040d22337ec1

  • C:\Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    652B

    MD5

    2350168ad3219bc7419a8ddf95ce8090

    SHA1

    9c23a647064cb129e72843191292ff7e5fed8353

    SHA256

    37f4b35cf59ccb931893b61ab6017532f8a8e7749879470afc1269f04aecc621

    SHA512

    0d3ec9852ab2a7e781ba75c54fa8debddd751a4f26bb489e67f0647aec1a99428bd6b4f69c25120fa7c3ca7a0eee24303ff0910a8f190770a7489a6e8eef0b5b

  • C:\Users\Admin\AppData\Local\Temp\[email protected]\setup.ini

    Filesize

    829B

    MD5

    9fccf6f6f2b2d17fe3fa92b82f228c12

    SHA1

    6beed35563a5436e38cd49bdf7a3b4e08dd71805

    SHA256

    c7d5d8baa80aa7f71364ebcc3119dbaac8b2857b4c4803c537489dbaa7e16308

    SHA512

    cc04e60d06ebbf707e22d553fbc648d82f1e158106ce716f826545e744a25144b5497c394f5b53c08198c7ca69f0e59cb5c5f04482e29aa60cd69015f0622d9a

  • C:\Users\Admin\AppData\Local\Temp\1690334104_00000000_base\360base.dll

    Filesize

    884KB

    MD5

    8c42fc725106cf8276e625b4f97861bc

    SHA1

    9c4140730cb031c29fc63e17e1504693d0f21c13

    SHA256

    d1ca92aa0789ee87d45f9f3c63e0e46ad2997b09605cbc2c57da2be6b8488c22

    SHA512

    f3c33dfe8e482692d068bf2185bec7d0d2bb232e6828b0bc8dc867da9e7ca89f9356fde87244fe686e3830f957c052089a87ecff4e44842a1a7848246f0ba105

  • C:\Users\Admin\AppData\Local\Temp\1690334104_00000000_base\360base.dll

    Filesize

    884KB

    MD5

    8c42fc725106cf8276e625b4f97861bc

    SHA1

    9c4140730cb031c29fc63e17e1504693d0f21c13

    SHA256

    d1ca92aa0789ee87d45f9f3c63e0e46ad2997b09605cbc2c57da2be6b8488c22

    SHA512

    f3c33dfe8e482692d068bf2185bec7d0d2bb232e6828b0bc8dc867da9e7ca89f9356fde87244fe686e3830f957c052089a87ecff4e44842a1a7848246f0ba105

  • C:\Users\Admin\AppData\Local\Temp\1690334109_00000000_base\360base.dll

    Filesize

    884KB

    MD5

    8c42fc725106cf8276e625b4f97861bc

    SHA1

    9c4140730cb031c29fc63e17e1504693d0f21c13

    SHA256

    d1ca92aa0789ee87d45f9f3c63e0e46ad2997b09605cbc2c57da2be6b8488c22

    SHA512

    f3c33dfe8e482692d068bf2185bec7d0d2bb232e6828b0bc8dc867da9e7ca89f9356fde87244fe686e3830f957c052089a87ecff4e44842a1a7848246f0ba105

  • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe

    Filesize

    89.8MB

    MD5

    de6c97a0cc648f4448a89dc9516bb559

    SHA1

    eba736e7ecb765545fbeb5718a128b8bdeff6999

    SHA256

    6865e96c5d7cfbd43430f107a15e2a0aa8de37d9d7d4fba17e67a181b36b4386

    SHA512

    1b721ee90667bd848dd5082938f2a62ac9cd7787f4a0bbc8ec94eed232f362ab26abbd532b47b94a8d46bb72cce16371169331ccf3cbcf2267db040d22337ec1

  • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe

    Filesize

    89.8MB

    MD5

    de6c97a0cc648f4448a89dc9516bb559

    SHA1

    eba736e7ecb765545fbeb5718a128b8bdeff6999

    SHA256

    6865e96c5d7cfbd43430f107a15e2a0aa8de37d9d7d4fba17e67a181b36b4386

    SHA512

    1b721ee90667bd848dd5082938f2a62ac9cd7787f4a0bbc8ec94eed232f362ab26abbd532b47b94a8d46bb72cce16371169331ccf3cbcf2267db040d22337ec1

  • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe

    Filesize

    89.8MB

    MD5

    de6c97a0cc648f4448a89dc9516bb559

    SHA1

    eba736e7ecb765545fbeb5718a128b8bdeff6999

    SHA256

    6865e96c5d7cfbd43430f107a15e2a0aa8de37d9d7d4fba17e67a181b36b4386

    SHA512

    1b721ee90667bd848dd5082938f2a62ac9cd7787f4a0bbc8ec94eed232f362ab26abbd532b47b94a8d46bb72cce16371169331ccf3cbcf2267db040d22337ec1

  • C:\Users\Admin\AppData\Local\Temp\{C6927955-0286-426a-99A5-58D2BF7BC8A6}.tmp\360P2SP.dll

    Filesize

    824KB

    MD5

    fc1796add9491ee757e74e65cedd6ae7

    SHA1

    603e87ab8cb45f62ecc7a9ef52d5dedd261ea812

    SHA256

    bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60

    SHA512

    8fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d

  • C:\Users\Admin\AppData\Local\Temp\{C6927955-0286-426a-99A5-58D2BF7BC8A6}.tmp\360P2SP.dll

    Filesize

    824KB

    MD5

    fc1796add9491ee757e74e65cedd6ae7

    SHA1

    603e87ab8cb45f62ecc7a9ef52d5dedd261ea812

    SHA256

    bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60

    SHA512

    8fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d

  • C:\Users\Admin\AppData\Local\Temp\{D15E0559-CC1A-4918-B5AE-AB4528661E52}.tmp

    Filesize

    3KB

    MD5

    b1ddd3b1895d9a3013b843b3702ac2bd

    SHA1

    71349f5c577a3ae8acb5fbce27b18a203bf04ede

    SHA256

    46cda5ad256bf373f5ed0b2a20efa5275c1ffd96864c33f3727e76a3973f4b3c

    SHA512

    93e6c10c4a8465bc2e58f4c7eb300860186ddc5734599bcdad130ff9c8fd324443045eac54bbc667b058ac1fa271e5b7645320c6e3fc2f28cc5f824096830de1

  • memory/1748-173-0x0000000003D50000-0x0000000003D51000-memory.dmp

    Filesize

    4KB

  • memory/1748-145-0x0000000003D50000-0x0000000003D51000-memory.dmp

    Filesize

    4KB