Analysis
-
max time kernel
125s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2023 17:51
Static task
static1
Behavioral task
behavioral1
Sample
UU加速(3.17更新).exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
UU加速(3.17更新).exe
Resource
win10v2004-20230703-en
General
-
Target
UU加速(3.17更新).exe
-
Size
77.2MB
-
MD5
74f0b4a8aeab459736ee1603e66377e8
-
SHA1
7b421b19bf61c80291313b43a37958e3cb1a9452
-
SHA256
32945f754ade9cb363d63a47c3c4da4e8a1b9432c5afac2bb524710689ae4e1d
-
SHA512
85a58b47c2c82b37e72156986ee34f88785bd20410896e73993c3f87b2397ec0c846c2c43e3a6203a561b8fae0e63f2a7ec462dc5393376d348ec248e2fcdd4f
-
SSDEEP
1572864:61BwbRLg9IQ1YZKy/PWSTjlUiTdNXb7vjQenqY7QSOgs/In7U:6aCt1I/PPBU4dNXbbjvnqYESO4
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1852 UU加速(3.17更新).exe 1852 UU加速(3.17更新).exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\nfapi.dll UU加速(3.17更新).exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1852 UU加速(3.17更新).exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\HPSocket4C\HPSocket4C.dll UU加速(3.17更新).exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3280 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1852 UU加速(3.17更新).exe 1852 UU加速(3.17更新).exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1852 UU加速(3.17更新).exe 1852 UU加速(3.17更新).exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2260 1852 UU加速(3.17更新).exe 83 PID 1852 wrote to memory of 2260 1852 UU加速(3.17更新).exe 83 PID 1852 wrote to memory of 2260 1852 UU加速(3.17更新).exe 83 PID 2260 wrote to memory of 3280 2260 cmd.exe 87 PID 2260 wrote to memory of 3280 2260 cmd.exe 87 PID 2260 wrote to memory of 3280 2260 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\UU加速(3.17更新).exe"C:\Users\Admin\AppData\Local\Temp\UU加速(3.17更新).exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 171.115.223.1742⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\PING.EXEping 171.115.223.1743⤵
- Runs ping.exe
PID:3280
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD548687c7d7917b7b5ab05654666ae4cad
SHA1161a9346a35c857ee630113edafe890532b887c1
SHA256f729294b309a1f8ff9eb4ffd7d0840873c1046f461158c038a8ae17bb93b2b0f
SHA512938a34048876610736e7d2d7e33a48add32834dd40166b291edc345f83cf67612329dad2b9d99985485d1e75225180e66891d5f68dbb3fd338de403ec3590f40
-
Filesize
319KB
MD504c8fd959d24500d4bbc4498b23019ba
SHA165c909165efd4b64755e670c15b6cf9b138026d4
SHA2564de7c0c0bf283e28ba953c541630d70bedfc7e74293e94a9d39cf1438832f118
SHA512bb49a8b8f6b089ca4d66e777e5a8c2863b1343f2a81ae6cfce9cca9d44a0adcc88e9a7906569bc9f740e864403b9b5a81222749861cb59ad10d9eae47ed6d2ec