Analysis

  • max time kernel
    131s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 12:18

General

  • Target

    69ceb6c58c37c36e6608cb3e9cf60265c5ec787eb3e0e778f9a7219718e7cb31.exe

  • Size

    11.6MB

  • MD5

    cda5fd050f3e83d1ef81d3a7687c6059

  • SHA1

    257d5e4404c04fe00ffecfe0a443881a2d5235d8

  • SHA256

    69ceb6c58c37c36e6608cb3e9cf60265c5ec787eb3e0e778f9a7219718e7cb31

  • SHA512

    dd86615a45aab5fca4fd6f3ab97a74d2672f64796dd0d8335073b6bb59836d730303bfc6a04b86a02f407b3d57c2a161e10b11a08b7bcc0e10c257f3fa3f8f56

  • SSDEEP

    196608:KHtH/2biu9WpiapQ46dAtb9SZxWqd7uB+JUFQYZPhUFJbgCfYbCJvCn1WZeLl+J3:KHVeiu9WodLZIqd74+sPeJbmbCJ21WZv

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 9 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69ceb6c58c37c36e6608cb3e9cf60265c5ec787eb3e0e778f9a7219718e7cb31.exe
    "C:\Users\Admin\AppData\Local\Temp\69ceb6c58c37c36e6608cb3e9cf60265c5ec787eb3e0e778f9a7219718e7cb31.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1984
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 56B2C15E544317A7DBCF8EF4A8DD001B C
      2⤵
      • Loads dropped DLL
      PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_1984\EFS_Info.png_1

    Filesize

    269KB

    MD5

    1621d6c4107cc24e1cd6c0fa86a76688

    SHA1

    25000c635bc9217f8a814cb4e429d632ec8256dd

    SHA256

    9c36e488bac31dea4dc689cc3752f3c7ee4efdcc3c0213cf2f4c4063c1683aee

    SHA512

    ec055cb81d7d89cfd30fadcf71b2d3b6103ef770221f3ed4f9a24f8c4da40bb920377a1f785ef41b6df1c75b6e1ab72fa39200b3250604134bb467879d89dde1

  • C:\Users\Admin\AppData\Local\Temp\CabD2FA.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\MSID4D0.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • C:\Users\Admin\AppData\Local\Temp\MSID667.tmp

    Filesize

    945KB

    MD5

    75fdd4bafba5d7082126be37eef2598a

    SHA1

    73cb2823016ecb1ce287da67e135e02c13c556c6

    SHA256

    4ecd8241776a95987927cc7cc4854f2d1b4ce3e0631aed33c7639e931921ba15

    SHA512

    00bd76d4bb9ac5cb5ded051d37e8df5e4a9c6209e747b2b399f7744d833fad0e957fd4fa897db02bc3ea9ae1da8d25e29623ef19c968c7791481e51fd6a7f891

  • C:\Users\Admin\AppData\Local\Temp\MSID704.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • C:\Users\Admin\AppData\Local\Temp\MSID791.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • C:\Users\Admin\AppData\Local\Temp\MSID791.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • C:\Users\Admin\AppData\Local\Temp\MSID85D.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • C:\Users\Admin\AppData\Local\Temp\MSID9A6.tmp

    Filesize

    945KB

    MD5

    75fdd4bafba5d7082126be37eef2598a

    SHA1

    73cb2823016ecb1ce287da67e135e02c13c556c6

    SHA256

    4ecd8241776a95987927cc7cc4854f2d1b4ce3e0631aed33c7639e931921ba15

    SHA512

    00bd76d4bb9ac5cb5ded051d37e8df5e4a9c6209e747b2b399f7744d833fad0e957fd4fa897db02bc3ea9ae1da8d25e29623ef19c968c7791481e51fd6a7f891

  • C:\Users\Admin\AppData\Local\Temp\MSIDA43.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • C:\Users\Admin\AppData\Roaming\上海项腾信息技术有限公司\PlanForce 1.20927.2\install\CFF9AE2\PlanForce.msi

    Filesize

    3.9MB

    MD5

    afb4a87f5e2f40e845e689191604a6ca

    SHA1

    d7414e5c2f012bef76d983033c9d391c930a3961

    SHA256

    0a058c7f8d83a335c9a6c2d84f1e3a4c64bab31127b62398049e30dda21d808e

    SHA512

    0bf603b0eff6b6121410697a6335adb3389cd26bfc146f00e7c5b16b38fbe38c0f0a13cb3ff6825a230d2bb33d0d0e1208dda13865402090c26b4595b0e395d8

  • C:\Users\Admin\AppData\Roaming\上海项腾信息技术有限公司\PlanForce 1.20927.2\install\decoder.dll

    Filesize

    215KB

    MD5

    bc00325b004cf04b852429f5b9e71ce0

    SHA1

    3584b23ae9f7e82be20a223afa15d7696449a60e

    SHA256

    23131f8af5f06ddf022cea7456430a41368f747f1eec276d93c872019b909456

    SHA512

    809a907a5633615cb142c3c003fd0dc713137aa86b167b5b2263cfd021f15ea7cdae5fa441e861b86559626b0b78e9225b833c6a9fb23651736b076afe906847

  • \Users\Admin\AppData\Local\Temp\MSID4D0.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • \Users\Admin\AppData\Local\Temp\MSID667.tmp

    Filesize

    945KB

    MD5

    75fdd4bafba5d7082126be37eef2598a

    SHA1

    73cb2823016ecb1ce287da67e135e02c13c556c6

    SHA256

    4ecd8241776a95987927cc7cc4854f2d1b4ce3e0631aed33c7639e931921ba15

    SHA512

    00bd76d4bb9ac5cb5ded051d37e8df5e4a9c6209e747b2b399f7744d833fad0e957fd4fa897db02bc3ea9ae1da8d25e29623ef19c968c7791481e51fd6a7f891

  • \Users\Admin\AppData\Local\Temp\MSID704.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • \Users\Admin\AppData\Local\Temp\MSID791.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • \Users\Admin\AppData\Local\Temp\MSID85D.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • \Users\Admin\AppData\Local\Temp\MSID9A6.tmp

    Filesize

    945KB

    MD5

    75fdd4bafba5d7082126be37eef2598a

    SHA1

    73cb2823016ecb1ce287da67e135e02c13c556c6

    SHA256

    4ecd8241776a95987927cc7cc4854f2d1b4ce3e0631aed33c7639e931921ba15

    SHA512

    00bd76d4bb9ac5cb5ded051d37e8df5e4a9c6209e747b2b399f7744d833fad0e957fd4fa897db02bc3ea9ae1da8d25e29623ef19c968c7791481e51fd6a7f891

  • \Users\Admin\AppData\Local\Temp\MSIDA43.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • \Users\Admin\AppData\Roaming\上海项腾信息技术有限公司\PlanForce 1.20927.2\install\decoder.dll

    Filesize

    215KB

    MD5

    bc00325b004cf04b852429f5b9e71ce0

    SHA1

    3584b23ae9f7e82be20a223afa15d7696449a60e

    SHA256

    23131f8af5f06ddf022cea7456430a41368f747f1eec276d93c872019b909456

    SHA512

    809a907a5633615cb142c3c003fd0dc713137aa86b167b5b2263cfd021f15ea7cdae5fa441e861b86559626b0b78e9225b833c6a9fb23651736b076afe906847

  • \Users\Admin\AppData\Roaming\上海项腾信息技术有限公司\PlanForce 1.20927.2\install\decoder.dll

    Filesize

    215KB

    MD5

    bc00325b004cf04b852429f5b9e71ce0

    SHA1

    3584b23ae9f7e82be20a223afa15d7696449a60e

    SHA256

    23131f8af5f06ddf022cea7456430a41368f747f1eec276d93c872019b909456

    SHA512

    809a907a5633615cb142c3c003fd0dc713137aa86b167b5b2263cfd021f15ea7cdae5fa441e861b86559626b0b78e9225b833c6a9fb23651736b076afe906847

  • memory/1984-0-0x0000000000580000-0x0000000000581000-memory.dmp

    Filesize

    4KB

  • memory/1984-95-0x0000000000580000-0x0000000000581000-memory.dmp

    Filesize

    4KB