Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2023, 14:09
Behavioral task
behavioral1
Sample
局域网共享一键修复.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
局域网共享一键修复.exe
Resource
win10v2004-20231020-en
General
-
Target
局域网共享一键修复.exe
-
Size
81KB
-
MD5
bbf058ef4162ca05b150cfb81e2d385f
-
SHA1
67ba02fad823887d2cad84cead65f0e4971ca3d3
-
SHA256
403bfc624363a1fe6ca2a6bbf324ef40ef486d34b6bf846ba831c2ede9ad57a8
-
SHA512
42a556be9530ffc43b4b59f1a989302a153cb1ab3253bb59598f2e3e4b388a05003f2d82a870c7db2f4223a38c0a2c3af6888812a151339dfc671b3b5d207673
-
SSDEEP
1536:ePcVo6r7S/rabtna3/j2i4tpGDNopa9l3qtBJLDLoznouy8rJ6uvzVP:x7cWbEb2i4eDNcarSvLDLoLoutt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation 局域网共享一键修复.exe -
resource yara_rule behavioral2/memory/2536-0-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral2/memory/2536-12-0x0000000000400000-0x0000000000431000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1996 2536 局域网共享一键修复.exe 88 PID 2536 wrote to memory of 1996 2536 局域网共享一键修复.exe 88 PID 2536 wrote to memory of 1996 2536 局域网共享一键修复.exe 88 PID 1996 wrote to memory of 1596 1996 cmd.exe 91 PID 1996 wrote to memory of 1596 1996 cmd.exe 91 PID 1996 wrote to memory of 1596 1996 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\局域网共享一键修复.exe"C:\Users\Admin\AppData\Local\Temp\局域网共享一键修复.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\84C0.tmp\start.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K ok.bat3⤵PID:1596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5e5979e4090809a7f511c270c5b75c611
SHA165e435712c1e46118449eb9a9095cf04f8de1a69
SHA256e8aeee05e2af91e2a41c3a5f5e0a2f676af3c80dc444a170919e0ddd9fad3e40
SHA5129f13a78e04f96fcb44b972d24f77bd411936bba79d1b7aeaf87dff3f2afe05b9252e1bb1f05a65fbd04e724c86531761f915ffa3ac9ac9710f9b564e2b25a68f
-
Filesize
128B
MD5c985b79c0d355e58d8fbf6716a76da37
SHA175414d0f150e62ec28d6654913649b269a233913
SHA2560fb1119a0290c104626040dc8749473c66415c47bcfd877d9eeba89443d491f5
SHA5129ed447d417233953b1f78c433b2b59f16382e1b7a19c7ad271bccdbf3d5cae51e8afd6733a04af5c3c25bfa31d5f9e23b25409561ca69635268a64e9a441a648