Analysis

  • max time kernel
    130s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 16:31

General

  • Target

    05d65b036e9203631dbbe39b8de16acf.exe

  • Size

    47KB

  • MD5

    05d65b036e9203631dbbe39b8de16acf

  • SHA1

    241b11b6ad8685865807040731369158c51bd76d

  • SHA256

    44f1100f3e7707d03d8603d02ef5d5aea44d76e93386db4b2a1b10e2f4a2db81

  • SHA512

    c81f62c63096cfd9fd33df0fe2140154bc417ac9ef12605a12345685806b6eb915c0d1201d3ec16759d18d354d58a82ea9196cb601c1e0fe60d7e46a22ddb443

  • SSDEEP

    768:x1cVhpQI2EQK0iPDh84nScF15GYbWjXO3XJ0VsUUhgdCVVpS/grZsS4rp8ZD18b7:fQpQ5EP0ijnRTXJ0VUh4CVVpC+nKG8b7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05d65b036e9203631dbbe39b8de16acf.exe
    "C:\Users\Admin\AppData\Local\Temp\05d65b036e9203631dbbe39b8de16acf.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpa.load-code.meibu.com/down.asp?users=gh&°²×°Í³¼Æ
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpa.load-code.meibu.com/down.asp?users=gh&°²×°Í³¼Æ
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4912
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4912 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4456
    • C:\Users\Admin\AppData\Local\Temp\uninst.exe
      "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
        "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
        3⤵
        • Deletes itself
        • Executes dropped EXE
        PID:4480

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QSO8CY24\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Temp\nsz44DB.tmp\InetLoad.dll

          Filesize

          18KB

          MD5

          994669c5737b25c26642c94180e92fa2

          SHA1

          d8a1836914a446b0e06881ce1be8631554adafde

          SHA256

          bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c

          SHA512

          d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563

        • C:\Users\Admin\AppData\Local\Temp\nsz44DB.tmp\System.dll

          Filesize

          11KB

          MD5

          c17103ae9072a06da581dec998343fc1

          SHA1

          b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

          SHA256

          dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

          SHA512

          d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

        • C:\Users\Admin\AppData\Local\Temp\temp.ini

          Filesize

          88B

          MD5

          64d650c161ef50d95d818c80ad83115e

          SHA1

          cd2b53a5c6d21d44410335c82411700772920c26

          SHA256

          d1a655fc57dddb83ff06ce57905e291038eee3cc1689b369f4d7781ed4829b36

          SHA512

          c8e4dea61b4d6989b107eae65708b252b70bcd40fb99f41230d49c54a6c63d5ec394358ca7ff4eb70c9a1cc4a5f10fba423bfa2c9b4346e2cd54b3ea206d4617

        • C:\Users\Admin\AppData\Local\Temp\uninst.exe

          Filesize

          32KB

          MD5

          11cc266b171797fee29484a788869fe5

          SHA1

          cdf477b7e5806489770171facf5cfb1f398edc71

          SHA256

          f58ea93b8ae34346580e011388efdc4e0175d5104455a4d963ff4359e53b81ec

          SHA512

          cebcb323108eca0ff28ecae978b5eae1654d42a8ec30f824a18cb151200d32e2d9b7dbc6a1977e30f0994c669567865501a5312aa34f1a26f11a19d0eb995ac4

        • C:\Users\Admin\Favorites\µçÆ÷ƵµÀ.lnk

          Filesize

          2KB

          MD5

          46e91d516a06ff7487b277295430316c

          SHA1

          cc2ee64b37295f8c024e9d47a19cff1317e8ff69

          SHA256

          684f056111506b81b060dd0bf780895cfa46e0b80a1af59ca91ec72feb64dd98

          SHA512

          0a671072aedc25bd8f10da5e24842a3b38c99b7827cb602f3be35782bb9225f3858b7e5642116a720bd4c7622ef5d9d56ee75e71de5bd0ae151e6459a9ba7ca3

        • C:\Users\Admin\Favorites\¼ÒװƵµÀ.lnk

          Filesize

          2KB

          MD5

          06235427feb50571fb45cff559c364a8

          SHA1

          e2e43ff04116be44fdec6be397302b9f0de6a3bf

          SHA256

          3385c7ea3d39686ac918a7d094c51c8b187a4deaa9d438429a674a0ebd6c98ce

          SHA512

          c5341e3a4e6d9c54bb9964424bb1face0a5ef07ec1212a1aa501013cd2da7e3b3a07439107e60fc91a7e98c425412b8d0258391829c9be2bb7a8ad0d427987d0

        • C:\Users\Admin\Favorites\¾Ó¼ÒÍæ¾ß.lnk

          Filesize

          2KB

          MD5

          42f778d200cde7c63bd58347da50bb4f

          SHA1

          986ac2f69317e61ccd603bc363b925dd43b71d3b

          SHA256

          98f688708580060bfc4dc6f2143abc00aebc1af67a963c7ed158f55f268725f9

          SHA512

          3b05be667d3581d1ef645b0b10875124b9d74141e098153a8fd2e0d27c098e9fdc53ab6a45a362dd8df3a1d3ef9cef469466b1b3aaf6c0c7d5f1666a15c82151

        • C:\Users\Admin\Favorites\ÃÀÈÝÆµµÀ.lnk

          Filesize

          2KB

          MD5

          b6e6f4d6711b11ed19a08f6834e495ec

          SHA1

          bb0fb012f6f5043281087b7c013d965e41805b1b

          SHA256

          74702869b8f3c3a58f848753513c96af2738824b97e206523634a57a70ee6487

          SHA512

          97b13b08922f4b8b7adc7103ec0ad8063cf746a22afd1a4adcaab6b8ef89b7b65757fa7bb61222463179ad9911f6e9000d8c98fbb7373faef276b6c09357cc1c

        • C:\Users\Admin\Favorites\ÄÐÈËÆµµÀ.lnk

          Filesize

          2KB

          MD5

          4152778c36b84576401aa014a959d29d

          SHA1

          8845faab185412ebd1f6c175661e37e0372f1f9c

          SHA256

          97616c5b3394ac2271859536eb6a9ed56668e49256ff620feed6f90a123a6a1e

          SHA512

          69017b4b19b8a60a33f1bdddac3c18c25e59e8fc996e0c29f42b5e2b951c5355ab657015bf8a207e1f5fd1cc806b37ad42490f1a90cc26908570fa4a9dbc6d09

        • C:\Users\Admin\Favorites\Å®ÈËÆµµÀ.lnk

          Filesize

          2KB

          MD5

          d594a3637aa331d829d58d3ce203ce65

          SHA1

          2c57bc51d08d372dc898fa82a04cf0163bd66f20

          SHA256

          89026c8cd42059d1daccdc56d0e9a0b3e921b8103eb8123ff8a5916e1340db90

          SHA512

          4489c794370695c4e29cf43619b56437b857238417e6c3ca1990e4b3ccb4c9aaa314243e4b2679b4cca7b4e62921033db5ea0e438ccbb25a35b728613501f1c1

        • C:\Users\Admin\Favorites\ÉÌ³ÇÆµµÀ.lnk

          Filesize

          2KB

          MD5

          e18df05f9fc40826a4f75081df7b70a5

          SHA1

          607293e597ebafcf14c29947d4d3d8ce91764025

          SHA256

          e52d6b5276d831baa6ccceb032869bdef46a25a4290e8dde7d210aa990ce5919

          SHA512

          22fca044fcec5f391e4b175dd1c503c5ef7262fad13cd62c621583a3d030909251ebc247fed1d735037ece5c7641e9098efd94e0bbc4beb92f2c4a9fc091767d

        • C:\Users\Admin\Favorites\ʳƷƵµÀ.lnk

          Filesize

          2KB

          MD5

          d42aaea23c864ecd9036e2b1d495a535

          SHA1

          729d24d231127bfb6b3c686246c8cc54e467b382

          SHA256

          46560d64f3a4ea6dfdcefdd14a39194d414b9f57dc2b177b378765e2360b8104

          SHA512

          69c98beacde62d31e0c249985f92d20b3dcfdff2e12403ee6fc9689213dee5aed370c00c7945ede52c75fb337a3953580393273fa4cc0ab3ce1bf5b96aaf7421

        • C:\Users\Admin\Favorites\ÊÎÆ·Ð¬°ü.lnk

          Filesize

          2KB

          MD5

          dd502f6a24dfa7c1f2f132b55dadcbc1

          SHA1

          d661cbe7e2e81e7f5664bcf841660db87c18577b

          SHA256

          f63ed16a4ee9198f0d4e1bfacde360d38d525ff6fae2d6e62f3a7a69a0e88f02

          SHA512

          c792935dde75839a56ee00a4574250942bf506fd33f859124723de8caf7964b7aaefca9f257c175458f5cbfd490f2e85fd4cf9cae066a1db3875bec781580f06

        • C:\Users\Admin\Favorites\ÊýÂëÆµµÀ.lnk

          Filesize

          2KB

          MD5

          c2372bbc97da4c47d5a2a4f654497475

          SHA1

          f4455ffe0ee141acce22fb340d33bf9c160534e8

          SHA256

          141cc554c9962e343fcee5f4b9576bfd089150062e83abce2223ecb79f3c0465

          SHA512

          270719f7d7e010ae9489ba796b14204bc2b716e6558b9b63bd894138298e74201cce10258de195efd47c5414983e5ac191516b0692edf66c03056c5776457d79

        • C:\Users\Admin\Favorites\̨Í寵µÀ.lnk

          Filesize

          2KB

          MD5

          88085bc63576a2d2d0a6bdd42cb19993

          SHA1

          54966e9fabffb56a6f0c0ab218184243d78ec408

          SHA256

          ad28b2f19fe3bac791c787a67a839c4d056b2d17056cc641a3f1d2858353b523

          SHA512

          94896d5d2cc660527fadc8966afb1f66997887bcd5a8a2ad04471f58e8243ad6c7c03267199138537dcda13aede821e871c2b3339a4fbb87ad97043419db9627

        • C:\Users\Admin\Favorites\ÌÔ±¦»Ê¹Ú.lnk

          Filesize

          2KB

          MD5

          03119fc5c47e058477ee3b88c08a7e6b

          SHA1

          028995e84e419c02b3943f6a34b5636d3413f292

          SHA256

          20b2245d17dc96e724dd656b037d1405b805a942417e5fbb198b36afed4e0aa8

          SHA512

          2b7c043a50a1845841b44b763d70c1b8a0478a72124179bd852e2511abe76ca3fe9217f68f64083a40eca48f01253bdfb928f9145ffc6d56890db9063a8295f1

        • C:\Users\Admin\Favorites\ÌÔ±¦ÈÈÂô.lnk

          Filesize

          2KB

          MD5

          38d9b53f70e92806bd62640aa80d6b2c

          SHA1

          6b0845cd0a4a8b51081271b7e3e7572ad567c73b

          SHA256

          5ad61a08e869b62a8bad7e1cf858281d33460e06c3914d4899f0cb810f747c58

          SHA512

          ed2afde58c6170a0c5f02a6c1ff8374a7ae37464f65b48b33c68160d0984d880a7a71e930ed90df8eda015e7988dbaeadbb7e2b774d40c773a817577e15d990d

        • C:\Users\Admin\Favorites\×ÛºÏÆµµÀ.lnk

          Filesize

          2KB

          MD5

          1dc22fee1c473b257b9dd5d382f04fa0

          SHA1

          a8c069f9e2d05e107351970d2349fa9ea6210e23

          SHA256

          3b46814419093978752694e2c5bdff9d814ea1867800534a9ef6f2629ff027fb

          SHA512

          b85673507d0c5dc613cadaebcf23b88ce9429a5e324f7c91b3da92243d48a8068ebb07cbe1d5118c79fc79b847cfa7534a260148ec8e5639cec5efac05c69500