Analysis

  • max time kernel
    84s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2023 17:21

General

  • Target

    NEAS.48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e_JC.exe

  • Size

    1.1MB

  • MD5

    71732eb5647b8cd8a12cd8cd68502255

  • SHA1

    f262f14249059df102414bfeaa5d61beffe13b40

  • SHA256

    48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e

  • SHA512

    b6df55e57e2c785bc713f92e1b1c6743810c0eebe7967c344f1a5a70ae9dc0c9a8843ff69903623a4b359b15ba9c121f6722f902dfd0b661d6ccb9f1853f790d

  • SSDEEP

    24576:Y7IvpH41Cl36RgrO/+6WdKHsJYrrg0H+2UbDC:Y72mVpOY3gH2UbD

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 4 IoCs
  • Modifies data under HKEY_USERS 54 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3216
      • C:\Users\Admin\AppData\Local\Temp\NEAS.48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e_JC.exe
        "C:\Users\Admin\AppData\Local\Temp\NEAS.48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e_JC.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6D7F.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2284
          • C:\Users\Admin\AppData\Local\Temp\NEAS.48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e_JC.exe
            "C:\Users\Admin\AppData\Local\Temp\NEAS.48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e_JC.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1320
            • C:\Users\Admin\AppData\Roaming\tencent\QQPCMgr\Download\QQPCMgr_Setup.exe
              "C:\Users\Admin\AppData\Roaming\tencent\QQPCMgr\Download\QQPCMgr_Setup.exe" /S ##silence=1&handle=524388&update=1&supply=79401&forceinstall=1&qqpcmgr=0&DownloadSetupInOne=1
              5⤵
              • Executes dropped EXE
              • Modifies data under HKEY_USERS
              PID:3948
              • C:\Windows\SysWOW64\cacls.exe
                "cacls" "C:\Program Files (x86)\Tencent\QQPCMgr\16.8.24468.211" /t /e /c /g SYSTEM:f
                6⤵
                  PID:4120
                • C:\Program Files (x86)\Tencent\QQPCMgr\16.8.24468.211\QQPCSoftCmd.exe
                  "C:\Program Files (x86)\Tencent\QQPCMgr\16.8.24468.211\QQPCSoftCmd.exe" /command=SetSimpleVersionConfig /SimpleVersion=2 /From=Installer
                  6⤵
                    PID:1988
            • C:\Windows\Logo1_.exe
              C:\Windows\Logo1_.exe
              3⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2896
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1212
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:1196

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$$a6D7F.bat

            Filesize

            770B

            MD5

            186ba0436e5c57366aeb9218bbf22edc

            SHA1

            7fc38a5acd723ea54b950eaa8acb514eecbccef6

            SHA256

            f32cf941a4e0b02d1e5298f33a104579f6f83d8a8bb07c28b9410d08b2e41a40

            SHA512

            a66bce2527d015bb929cfddf1780293f5b85f0acfb700314cd919c1aa19e5677b720ad29150f7ee9e23b157e7636406dd92e196b8b2df6a04b02e41e74a6c0cb

          • C:\Users\Admin\AppData\Local\Temp\NEAS.48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e_JC.exe

            Filesize

            1.1MB

            MD5

            72a20a60da7293a8df665ae07c4121a0

            SHA1

            e8f46a54aaff502d5de46eb9ee17bbba5f58e301

            SHA256

            08aa61ff4a66962e89a9774c3a9e7922ede89bbcd294ac87cd75aae5a600c151

            SHA512

            54de2877f9a414fd0047a44b07c27e1acf76795cb4c1ac9eccfd1f9e9f3c98093d3c051ab935d47c8c53ad42d8e4728143fbdaefe82713ea687937bfc6d6e9ed

          • C:\Users\Admin\AppData\Local\Temp\NEAS.48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e_JC.exe.exe

            Filesize

            1.1MB

            MD5

            72a20a60da7293a8df665ae07c4121a0

            SHA1

            e8f46a54aaff502d5de46eb9ee17bbba5f58e301

            SHA256

            08aa61ff4a66962e89a9774c3a9e7922ede89bbcd294ac87cd75aae5a600c151

            SHA512

            54de2877f9a414fd0047a44b07c27e1acf76795cb4c1ac9eccfd1f9e9f3c98093d3c051ab935d47c8c53ad42d8e4728143fbdaefe82713ea687937bfc6d6e9ed

          • C:\Users\Admin\AppData\Local\Temp\TencentDownload\~e576f92\QQPCDownload.dll

            Filesize

            1.3MB

            MD5

            8eac6c3146f7d8db62a773e32bc6cf53

            SHA1

            a5d3ad50eac345e298cdb3b7f80f4966fb4234c1

            SHA256

            28d2477926de5d5a8ffcb708cb0c95c3aa9808d757f77b92f82ad4aa50a05cc8

            SHA512

            c3b9a21e0f649699401b5def8b3ec4939a336086d8f470d1d79c69ebccf9ffeafbe9133303d89bc6d0beb713624be52d93ce3bc3204bf62f91fedb2879f868fe

          • C:\Users\Admin\AppData\Roaming\Tencent\QQPCMgr\Download\QQPCMgr_Setup.exe

            Filesize

            127.3MB

            MD5

            0413e55c76011e621c33a1fabe1813c9

            SHA1

            8eb43d6099da96d9e6a3728316c145d170f9f63c

            SHA256

            df5b41891e00ddf4b56116202dc005b880f6380dab5f82d5e63f3b20778ee123

            SHA512

            f9a4d6239639e412634602cdd67a2bedb4e817ac7fc6ab14b01c8b6a39a42ffc9487e0d94a83e57c4d941f0c09f03c4a995cfd3cb9ffa7551b8a44974064ab91

          • C:\Windows\Logo1_.exe

            Filesize

            26KB

            MD5

            1a720367f885df1bd4420e96237a0013

            SHA1

            ab2a15dc7b967975af194d5abc757b67b884b72c

            SHA256

            4ae58b687ef04bc7901a3c74108f5c580ee2e085b287fd50fabaf1512a42ad86

            SHA512

            f44f03ec6f12a418a2ac541df4f4dd5414b89d6b80b818ee4792fa87e0831aa83e86a4ab9e888322a10f573fc8e68155fe0c6bb2636c8e7edc0679dcf5449d54

          • C:\Windows\Logo1_.exe

            Filesize

            26KB

            MD5

            1a720367f885df1bd4420e96237a0013

            SHA1

            ab2a15dc7b967975af194d5abc757b67b884b72c

            SHA256

            4ae58b687ef04bc7901a3c74108f5c580ee2e085b287fd50fabaf1512a42ad86

            SHA512

            f44f03ec6f12a418a2ac541df4f4dd5414b89d6b80b818ee4792fa87e0831aa83e86a4ab9e888322a10f573fc8e68155fe0c6bb2636c8e7edc0679dcf5449d54

          • C:\Windows\rundl132.exe

            Filesize

            26KB

            MD5

            1a720367f885df1bd4420e96237a0013

            SHA1

            ab2a15dc7b967975af194d5abc757b67b884b72c

            SHA256

            4ae58b687ef04bc7901a3c74108f5c580ee2e085b287fd50fabaf1512a42ad86

            SHA512

            f44f03ec6f12a418a2ac541df4f4dd5414b89d6b80b818ee4792fa87e0831aa83e86a4ab9e888322a10f573fc8e68155fe0c6bb2636c8e7edc0679dcf5449d54

          • F:\$RECYCLE.BIN\S-1-5-21-1926387074-3400613176-3566796709-1000\_desktop.ini

            Filesize

            9B

            MD5

            a2fae4db32159548a9fccda46ab88233

            SHA1

            d57c64b9dac9f95995c9012ecc5165d9d3e97fd0

            SHA256

            893642ba8870266e4c26cd6a2dee47512d3ed2ac89ac9b020e23c6e1c05e3d3f

            SHA512

            83aa09a389ee5b3ecbc624b3d50be3aa0a44690f3cd20256db57a30b004e8da096bd628bbb09f8067930c62be2b9a126ec6a7b22236aedbfe6769443d6f08486

          • memory/1988-92-0x0000000076630000-0x0000000076720000-memory.dmp

            Filesize

            960KB

          • memory/1988-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

            Filesize

            64KB

          • memory/1988-91-0x0000000076630000-0x0000000076720000-memory.dmp

            Filesize

            960KB

          • memory/2036-10-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2036-0-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2896-42-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2896-77-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2896-66-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2896-55-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2896-8-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3948-84-0x0000000073B30000-0x0000000073B45000-memory.dmp

            Filesize

            84KB

          • memory/3948-85-0x0000000073B30000-0x0000000073B44000-memory.dmp

            Filesize

            80KB

          • memory/3948-86-0x0000000073BA0000-0x0000000073BB2000-memory.dmp

            Filesize

            72KB