Analysis

  • max time kernel
    135s
  • max time network
    161s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-09-2023 15:05

General

  • Target

    zh-cn.exe

  • Size

    38.5MB

  • MD5

    755deb2968530a262c5b5bc220b593dc

  • SHA1

    5de68bf47828a4da1ccf3d40296266c13f1df22f

  • SHA256

    f7bd8bb72bf3c0d499f2d5e4b6dee8fd294c92ac3c6356a20727afd25b63dc11

  • SHA512

    2d9f8e01396ad25b471a5b8027dc4376c5af3cb9a13c6e6cdb9cdc3e3424078514e1ba748c53efc6d843f49706237032a8ab4261f65ccf0a400c24d59c18b885

  • SSDEEP

    786432:WYHm2mH6FUMRI5b+op6Oxg18AztN0a4TwmgWaIPTBYBIwQA9:WYHNFsAgxOzP0aBlWRTCB51

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\zh-cn.exe
    "C:\Users\Admin\AppData\Local\Temp\zh-cn.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Users\Admin\AppData\Local\Temp\is-MLL9G.tmp\zh-cn.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-MLL9G.tmp\zh-cn.tmp" /SL5="$700C6,39440345,811008,C:\Users\Admin\AppData\Local\Temp\zh-cn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4064
      • C:\Users\Admin\AppData\Roaming\Telegram Desktop\Telegram.exe
        "C:\Users\Admin\AppData\Roaming\Telegram Desktop\Telegram.exe"
        3⤵
        • Executes dropped EXE
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2396
      • C:\Users\Admin\AppData\Roaming\Telegram Desktop\tdata\Z.T-GApp_xh.Gn.exe
        "C:\Users\Admin\AppData\Roaming\Telegram Desktop\tdata\Z.T-GApp_xh.Gn.exe"
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:5064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-MLL9G.tmp\zh-cn.tmp

    Filesize

    3.0MB

    MD5

    ed2781559c9e4dcecf2286a1bfde093d

    SHA1

    cdb08fbf76389238361556e3ff676a72722abaaa

    SHA256

    066a8e965583021073b58b6ff14308cfbc6acd7566ac4f0c86ff9161a05bbb0e

    SHA512

    20e8299e1b8b47ef08899bdad16bdb6a56ba2fce623864b8604e33e687fdec6437f4d608fc23338028d7f31bb74cd23ee08af835846b197f6cb30d6233d76fe9

  • C:\Users\Admin\AppData\Local\Temp\is-MLL9G.tmp\zh-cn.tmp

    Filesize

    3.0MB

    MD5

    ed2781559c9e4dcecf2286a1bfde093d

    SHA1

    cdb08fbf76389238361556e3ff676a72722abaaa

    SHA256

    066a8e965583021073b58b6ff14308cfbc6acd7566ac4f0c86ff9161a05bbb0e

    SHA512

    20e8299e1b8b47ef08899bdad16bdb6a56ba2fce623864b8604e33e687fdec6437f4d608fc23338028d7f31bb74cd23ee08af835846b197f6cb30d6233d76fe9

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\Telegram.exe

    Filesize

    124.4MB

    MD5

    2f75f8bbce26fdb4f10f4e7351b04dda

    SHA1

    53a8c3a363b3c8d036c8ebb8f5bed90835c4559a

    SHA256

    3d02ac50fef8c1f758c3438b37a9526019e903d3246d8e2929f9f3c9d5bb0c88

    SHA512

    493cc8e8d380f52944cb55f92b7028762bf607f095f3e451754ba762685f079319d7f1a7cc4182ddebc74f26938286e33429f04909853f22104c414cf02ef486

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\Telegram.exe

    Filesize

    124.4MB

    MD5

    2f75f8bbce26fdb4f10f4e7351b04dda

    SHA1

    53a8c3a363b3c8d036c8ebb8f5bed90835c4559a

    SHA256

    3d02ac50fef8c1f758c3438b37a9526019e903d3246d8e2929f9f3c9d5bb0c88

    SHA512

    493cc8e8d380f52944cb55f92b7028762bf607f095f3e451754ba762685f079319d7f1a7cc4182ddebc74f26938286e33429f04909853f22104c414cf02ef486

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\Telegram.exe

    Filesize

    124.4MB

    MD5

    2f75f8bbce26fdb4f10f4e7351b04dda

    SHA1

    53a8c3a363b3c8d036c8ebb8f5bed90835c4559a

    SHA256

    3d02ac50fef8c1f758c3438b37a9526019e903d3246d8e2929f9f3c9d5bb0c88

    SHA512

    493cc8e8d380f52944cb55f92b7028762bf607f095f3e451754ba762685f079319d7f1a7cc4182ddebc74f26938286e33429f04909853f22104c414cf02ef486

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\tdata\7517DFA7E0C3774Ds

    Filesize

    140B

    MD5

    dacd883d532bc8ba8d7698f12bc9bca8

    SHA1

    5ea60f395a1746312794fac47354e359a52a705f

    SHA256

    3ff1e11e729cd21b81f3ebe5bcf24514754ad559e7048d5fad01b8575b5ada13

    SHA512

    02fa5f4b0872510e3385912677aacef3eea793046b6eeec1cb2008d9212cbc00a47b613e7f78d916364d2052594b7acc33e0c6aaf07b2bf64711b9f35cf70ef6

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\tdata\99F8F64E02BD9548s

    Filesize

    442KB

    MD5

    b21a77f8bfa27bb7d190f2145f66b063

    SHA1

    88ca12861abd52abcfc5341db04b689b6ecab725

    SHA256

    8284d796464b47b02190aa469f4769a5b04d43644c871fc5c82aef82cd59e482

    SHA512

    398db19fa1b60c995dd3b04065bc7212f4b21f7c784ed245a31f3c05bb1e44190555314eaf06f2838cdadeedf662b06d17aea13a4f490ca77af2baa0bc6ffe72

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\tdata\Z.T-GApp_xh.Gn.exe

    Filesize

    2.5MB

    MD5

    62234d0042b32491536e15dc78b0e588

    SHA1

    ff1cd9d6b66ed260137ee8adbfe04e92b53a6f17

    SHA256

    ad790dd9ce0033df8e212b2776bfd28e1279299b5b75f70051d1b58410933228

    SHA512

    808d058533806b5d3160180e4e5c85f4a1bd1e97840ff07a191357408b9fcaf04a9562b5e474b9ac146e028531c8003e61c0f91f589a53414e343222a61e46ca

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\tdata\Z.T-GApp_xh.Gn.exe

    Filesize

    2.5MB

    MD5

    62234d0042b32491536e15dc78b0e588

    SHA1

    ff1cd9d6b66ed260137ee8adbfe04e92b53a6f17

    SHA256

    ad790dd9ce0033df8e212b2776bfd28e1279299b5b75f70051d1b58410933228

    SHA512

    808d058533806b5d3160180e4e5c85f4a1bd1e97840ff07a191357408b9fcaf04a9562b5e474b9ac146e028531c8003e61c0f91f589a53414e343222a61e46ca

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\tdata\countries

    Filesize

    20KB

    MD5

    56db96207472444836ca9968d78444aa

    SHA1

    35d004f126306c6cd3fa2e9aa6e0973141ed1a55

    SHA256

    8ff6f29185d067a820ea8b94644c61ddc8153a5aef97a87cecfca71b930255f9

    SHA512

    442d9d2636c57328af98cfdb8142a372a948c10e1714e30f4ec43d44e15e474e3cc05419a8448a7ef138350b9ddcd0b34ca45dd88003fbbf1b6d4ebae60e7973

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\tdata\key_datas

    Filesize

    388B

    MD5

    b132a17e853f29531160ff55f9988826

    SHA1

    3f3b22729d6e1f52e4b54b15ba1c38617e77923e

    SHA256

    f1b284b51bdf87dc748422ae698a8599a7acdd679624e2d3437c3b31f6d38611

    SHA512

    04f338ce5061510177c3b501889c562641fe2555feae60e468c6f63f2aa799297179e9c78c9dcf51dbdb76e19949a6c001472c3a4e7af602479ecf2487f6acdb

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\tdata\prefix

    Filesize

    24B

    MD5

    3fb9de9c3edf4abc3a42deaf14dfa8d6

    SHA1

    d02d2382706bffb38831acfcce62e720a6d55733

    SHA256

    84af1d24b024a1e1670302510fc140e55eb009ed5ab8b8e89bb42fb7f184be28

    SHA512

    7e60951c5c5cff7f623808e1afa098faff020f000ee4a8fc9af5f848204b8c54fe13f9a32e10bfbc618e41b1be437bb08a775b4b2e10a19122c336b55d093692

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\tdata\settingss

    Filesize

    1KB

    MD5

    aa56bbd89a1a51683a0665653a4ca12d

    SHA1

    99d368b7e7ce38d77f2b4292bacc4385d74b0502

    SHA256

    bda563911e593a48f12ae89425fac2e0163e59cf42031b40c657dfc74490f908

    SHA512

    894f411b2831c9e370e383e9a30c0a0c008f0aabbd36e935d16b82d51b4f8abbfce0d3a9d81ff8d0010965a2b545ef24d50aef04df991cb20255f5f4cbe0fa9f

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\tdata\shortcuts-custom.json

    Filesize

    404B

    MD5

    874b930b4c2fddc8043f59113c044a14

    SHA1

    75b14a96fe1194f27913a096e484283b172b1749

    SHA256

    f4f666f4b831e84710983b0e9e905e87342b669f61109fd693688d89c12309d8

    SHA512

    f4b0337fba5c5f4d7e7a02aa5d4538334edd38f5df179e4f1701fa2f1c4d3d856a074fa55ea724c4e2a6c5a1ac1dbfc7e9966c814475c7cd2c65cd44fca14621

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\tdata\shortcuts-default.json

    Filesize

    2KB

    MD5

    9659e451ac100713429a3116644250ce

    SHA1

    8825a66fef3c76f57aac29d9f3622037bc6ecadd

    SHA256

    b002b36119821299aaf94c7d1dcd112ab0fdd6008c3f23429a92b03aa79a3147

    SHA512

    12d4f9cc6e72d67e31aa94f81d67a1de353314617b25568d113c4484108f8a609c2ec26bd6146d31148556ea214f1587cded79bb51bbc5a26d88682786c46a7f

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop\tdata\usertag

    Filesize

    8B

    MD5

    36ea4b2c04e42167ffaa5a0d36ee2cd9

    SHA1

    60ee8fea8fbcdc259dc6c0641a8283d8ee8dcaf1

    SHA256

    0d5655d19406467696275deea8ae1d19b651fc70ada0c7d66af98db442c370fb

    SHA512

    0536684386296d5cf070c7ba07935a07e0efbf4b888586bdc65b0640cc0baa39119d3f68756d2301a8e7fff31fb1ff4675a6f53e471c1a352a87df001d945733

  • memory/2396-74-0x00000209BD690000-0x00000209BD6A0000-memory.dmp

    Filesize

    64KB

  • memory/2396-101-0x00000209BD690000-0x00000209BD6A0000-memory.dmp

    Filesize

    64KB

  • memory/4064-86-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4064-55-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4064-12-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4064-10-0x0000000000870000-0x0000000000871000-memory.dmp

    Filesize

    4KB

  • memory/4064-9-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4064-6-0x0000000000870000-0x0000000000871000-memory.dmp

    Filesize

    4KB

  • memory/5064-110-0x0000000002910000-0x0000000002933000-memory.dmp

    Filesize

    140KB

  • memory/5064-159-0x0000000002910000-0x0000000002933000-memory.dmp

    Filesize

    140KB

  • memory/5064-98-0x0000000002910000-0x0000000002933000-memory.dmp

    Filesize

    140KB

  • memory/5064-97-0x0000000002C30000-0x0000000002CB1000-memory.dmp

    Filesize

    516KB

  • memory/5064-90-0x0000000002810000-0x0000000002811000-memory.dmp

    Filesize

    4KB

  • memory/5064-102-0x0000000002B10000-0x0000000002B11000-memory.dmp

    Filesize

    4KB

  • memory/5064-190-0x0000000003B30000-0x0000000003B68000-memory.dmp

    Filesize

    224KB

  • memory/5064-111-0x0000000002910000-0x0000000002933000-memory.dmp

    Filesize

    140KB

  • memory/5064-116-0x0000000003370000-0x0000000003393000-memory.dmp

    Filesize

    140KB

  • memory/5064-189-0x0000000003B30000-0x0000000003B68000-memory.dmp

    Filesize

    224KB

  • memory/5064-117-0x0000000002910000-0x0000000002933000-memory.dmp

    Filesize

    140KB

  • memory/5064-181-0x0000000010000000-0x00000000100AE000-memory.dmp

    Filesize

    696KB

  • memory/5064-121-0x00000000038A0000-0x00000000038D2000-memory.dmp

    Filesize

    200KB

  • memory/5064-122-0x0000000003B30000-0x0000000003B68000-memory.dmp

    Filesize

    224KB

  • memory/5064-123-0x0000000003B30000-0x0000000003B68000-memory.dmp

    Filesize

    224KB

  • memory/5064-152-0x0000000003B30000-0x0000000003B68000-memory.dmp

    Filesize

    224KB

  • memory/5064-153-0x0000000003B30000-0x0000000003B68000-memory.dmp

    Filesize

    224KB

  • memory/5064-154-0x0000000003B30000-0x0000000003B68000-memory.dmp

    Filesize

    224KB

  • memory/5064-155-0x0000000002910000-0x0000000002933000-memory.dmp

    Filesize

    140KB

  • memory/5064-96-0x0000000002910000-0x0000000002933000-memory.dmp

    Filesize

    140KB

  • memory/5064-160-0x0000000003370000-0x0000000003393000-memory.dmp

    Filesize

    140KB

  • memory/5064-161-0x0000000003370000-0x0000000003393000-memory.dmp

    Filesize

    140KB

  • memory/5064-162-0x0000000003370000-0x0000000003393000-memory.dmp

    Filesize

    140KB

  • memory/5064-164-0x0000000003F40000-0x0000000003F78000-memory.dmp

    Filesize

    224KB

  • memory/5064-165-0x0000000003EC0000-0x0000000003EF2000-memory.dmp

    Filesize

    200KB

  • memory/5064-166-0x0000000003F40000-0x0000000003F78000-memory.dmp

    Filesize

    224KB

  • memory/5064-169-0x0000000003B30000-0x0000000003B68000-memory.dmp

    Filesize

    224KB

  • memory/5064-170-0x0000000003F40000-0x0000000003F78000-memory.dmp

    Filesize

    224KB

  • memory/5064-171-0x0000000003F40000-0x0000000003F78000-memory.dmp

    Filesize

    224KB

  • memory/5064-172-0x0000000003F40000-0x0000000003F78000-memory.dmp

    Filesize

    224KB

  • memory/5064-175-0x0000000003F40000-0x0000000003F78000-memory.dmp

    Filesize

    224KB

  • memory/5064-176-0x0000000003370000-0x0000000003393000-memory.dmp

    Filesize

    140KB

  • memory/5064-177-0x0000000003370000-0x0000000003393000-memory.dmp

    Filesize

    140KB

  • memory/5064-178-0x0000000003B30000-0x0000000003B68000-memory.dmp

    Filesize

    224KB

  • memory/5072-1-0x0000000000400000-0x00000000004D3000-memory.dmp

    Filesize

    844KB

  • memory/5072-8-0x0000000000400000-0x00000000004D3000-memory.dmp

    Filesize

    844KB

  • memory/5072-87-0x0000000000400000-0x00000000004D3000-memory.dmp

    Filesize

    844KB