Analysis

  • max time kernel
    157s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 08:02

General

  • Target

    信息安全管理实施细则.exe

  • Size

    1.3MB

  • MD5

    42f8aef43bdf1db96aa974db567fa67f

  • SHA1

    967ca10ab717a1b989e94dac7abf0a2f99144acb

  • SHA256

    32168245643b7c3a031e8dfa38703411db3ad83e064c301fa23d8e1119088500

  • SHA512

    81111d8bc061de13ebea12f2a4284ddff03ccf3cc27a4345e0fd6a2d664f02143a01a76ed8864f4adfb29a157a130e93b6bc596e8280035c61764ab8568e156c

  • SSDEEP

    24576:9IeEzndE+GIqsVsVlIK3WtQcFbJVJ7Bc7/nkVET9Cqxxcv/eYvNwsOfZ:C5dhqsV9Bg8VG9Cocv3vNws4

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\信息安全管理实施细则.exe
    "C:\Users\Admin\AppData\Local\Temp\信息安全管理实施细则.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3820
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c %windir%\Microsoft.NET\Framework64\v4.0.30319\csc /out:C:\Windows\Temp\setupcl.exe C:\Windows\Temp\setupcl.cs
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc /out:C:\Windows\Temp\setupcl.exe C:\Windows\Temp\setupcl.cs
        3⤵
          PID:2060
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8DA5.tmp" "c:\Windows\Temp\CSC517B82A84CAA4B4AB9D27B442A84EED.TMP"
            4⤵
              PID:3604
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Windows\Temp\setupcl.exe&& move mimi.exe C:\Windows\Temp\
          2⤵
            PID:3076
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c cd C:\Windows\Temp&&C:\Windows\Temp\mimi.exe
            2⤵
              PID:4596
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Windows\Temp\ÐÅÏ¢°²È«¹ÜÀíʵʩϸÔò.pdf
              2⤵
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1428
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa82eb46f8,0x7ffa82eb4708,0x7ffa82eb4718
                3⤵
                  PID:764
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:2
                  3⤵
                    PID:1328
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:3
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3976
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:8
                    3⤵
                      PID:1712
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                      3⤵
                        PID:4220
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
                        3⤵
                          PID:2400
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:1
                          3⤵
                            PID:4796
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=5320 /prefetch:6
                            3⤵
                              PID:3816
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:8
                              3⤵
                                PID:1632
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:8
                                3⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3804
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:1
                                3⤵
                                  PID:4988
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:1
                                  3⤵
                                    PID:4432
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                                    3⤵
                                      PID:1464
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:1
                                      3⤵
                                        PID:948
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,11579101452543177865,14602114993919485463,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 /prefetch:2
                                        3⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:744
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3388
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:4144

                                      Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              3d8f4eadb68a3e3d1bf2fa3006af5510

                                              SHA1

                                              d5d8239ec8a3bf5dadf52360350251d90d9e0142

                                              SHA256

                                              85a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c

                                              SHA512

                                              554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              111B

                                              MD5

                                              285252a2f6327d41eab203dc2f402c67

                                              SHA1

                                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                              SHA256

                                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                              SHA512

                                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              4d2603042d1fa24a4a1f290efeb719c2

                                              SHA1

                                              6d9a61e4f6429038006c24032881df651b9c440f

                                              SHA256

                                              abba36642eec029110b8abeb752f2290823439b7361fbe19419645fdc42c8619

                                              SHA512

                                              f6a120f8c003cf1bbbcf1edd46d2242d5b7744ac538dfdbac865f0e3942056cab5216b08e70870454afae78e7308e9ce4651790a8dd410ff9a3e25475ab3e0fd

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              57f7b2fb3db262f16b0cca1098932b3c

                                              SHA1

                                              c0c9792f4344dd32372679bb53d01a6aef85e199

                                              SHA256

                                              f3604d73771e2131c6bacaca241c056e5700a4aea1aca978619687522c8a82a5

                                              SHA512

                                              630c64aa3647ec6b219c0f454d95eb207f9fa28d047bbf5fbd878d232d99a279cad589cd828c5db10b7c1a1ad07c1eb237fdf17e85dab8a96574d91f725d8805

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                              Filesize

                                              24KB

                                              MD5

                                              d985875547ce8936a14b00d1e571365f

                                              SHA1

                                              040d8e5bd318357941fca03b49f66a1470824cb3

                                              SHA256

                                              8455a012296a7f4b10ade39e1300cda1b04fd0fc1832ffc043e66f48c6aecfbf

                                              SHA512

                                              ca31d3d6c44d52a1f817731da2e7ac98402cd19eeb4b48906950a2f22f961c8b1f665c3eaa62bf73cd44eb94ea377f7e2ceff9ef682a543771344dab9dbf5a38

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              6752a1d65b201c13b62ea44016eb221f

                                              SHA1

                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                              SHA256

                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                              SHA512

                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              6d14cc4be40b573c0d311acae4a7f14d

                                              SHA1

                                              9910af171de99ec54f119a6154812bf4e1fed28b

                                              SHA256

                                              acdb9a873ea705f7e24f073ad003fef51e549706adfaf91cc17d2a7bbbeef592

                                              SHA512

                                              b64a7f7e063d88b91c2dc70e9bd6c3657c6be86a22e5423929cf2eaf7208da77ecb10fbdba414736e9e81318b691cf61ea3d9380d9598b97fb589c04bcbf80f7

                                            • C:\Users\Admin\AppData\Local\Temp\RES8DA5.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              e23b9fc066d269b3b093d136b7e472e3

                                              SHA1

                                              fc6d2191405bbe80d42ca1ef6f3274584f51ad53

                                              SHA256

                                              9d1955402e6a7ef84515970e1be4956ae1e1ce8ce167d8b6e11aa631f358a342

                                              SHA512

                                              381cced155033531d7e0fdf518ed987866135d6fdab3b41236045651742e282dbf21fe428f6a6909bb40c926e05334c9cdf24ea454a07ac624f6fe4b6fcde92e

                                            • C:\Windows\Temp\ÐÅÏ¢°²È«¹ÜÀíʵʩϸÔò.pdf

                                              Filesize

                                              518KB

                                              MD5

                                              db9f395bb0f4e2dce1de4c6abe3e3943

                                              SHA1

                                              8cf9986417ba3d563bc42d4b9adb584d842c631e

                                              SHA256

                                              a3ffa8b080ab03f921508586b5234e0f464239720fe8038496ad80917f750e4d

                                              SHA512

                                              b0a61558221d573ea5b09ede20b0049c6d932a7f25d2d286e4c4352512619ee0c8988d0dbb73b507c0b489ddd80f5d720a306c5ec643699b9117db844a755a34

                                            • \??\c:\Windows\Temp\CSC517B82A84CAA4B4AB9D27B442A84EED.TMP

                                              Filesize

                                              1KB

                                              MD5

                                              2634c7e2497c1c9bd19489ab2e0d80ae

                                              SHA1

                                              58338ed347871a1677901f77855e5322876354ff

                                              SHA256

                                              44fd73e43f76d7e8430c4ab982b800caf3e5fdcce2cebc469ca451dee9d5fbda

                                              SHA512

                                              0b82e93be45c9f4af516cb3588c64ac22d21e031f78184a34b54a778e639dc9649ed4cf63b8af2958c123201094bec10fa42b64bddb3fad30f069882f7cf301d

                                            • \??\c:\Windows\Temp\setupcl.cs

                                              Filesize

                                              166B

                                              MD5

                                              d2fe9db7df7d2f922b1cb8b5b6f6631e

                                              SHA1

                                              b83429f3f7eed19620491b8123b4409098bd5245

                                              SHA256

                                              8c403de09f293d226dbb1004639fb70fa874c2887fbf127e897f2850ee24e266

                                              SHA512

                                              ab3a3779517981ced84dd616b200501bd62731afaefe3471dd80164448f6467bc82919340fbb7606fafd62574b8c2cae36c1b5709c5d6725d089ecdf5a0e60fe