Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 01:13

General

  • Target

    48585673bc326c4e4e5bcf11cec16a54.exe

  • Size

    2.9MB

  • MD5

    48585673bc326c4e4e5bcf11cec16a54

  • SHA1

    2478bbf870c21568d3cf5348dab7a4ef46b31d99

  • SHA256

    0aff7bffd67ee87b6505d2cb5fcec2b65a797a8eadcf6820558e55f6ee00708d

  • SHA512

    ef2279dcf9c1c4988d590128e9b9b5730d06ea6f47bf258e6c256c1a337b62d25b133a6f95343731005d8c848309c13fc61bce404e43c3b4588970d4e61f41cf

  • SSDEEP

    49152:A8Jie4sELb9UHgckhzU3oYD7rn1f3L2iPNJZkjVxYleAQ6xcs7+JuzE8IOkV59la:A8iLEMU3oYl3L2iPNrkjEleAewuaula

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • UPX packed file 48 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48585673bc326c4e4e5bcf11cec16a54.exe
    "C:\Users\Admin\AppData\Local\Temp\48585673bc326c4e4e5bcf11cec16a54.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2856
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 36
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1992
    • C:\Users\Admin\AppData\Local\Temp\¸´¼þ 3-2HOMEÏ¡·¹.exe
      "C:\Users\Admin\AppData\Local\Temp\¸´¼þ 3-2HOMEÏ¡·¹.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\¸´¼þ 3-2HOMEÏ¡·¹.exe

    Filesize

    193KB

    MD5

    7d28dbe2f2cb64a5b9920eb21ce65dfd

    SHA1

    ef4420af0d83f70995d8930bbcadcb77f6bf1a9c

    SHA256

    00c445b26e8b9cf94457b351c5e9d5e897d1060a1647123799ce5d31cafb89b1

    SHA512

    9dc2559291176be85472de5e3a88519104fcea742d75b01b65f3da4f4aa2decfaf5ee244d45bf59d7e7f867f6ee16f22d7e8d9fb2425f7c02d8b8b0174f33b4c

  • C:\Users\Admin\AppData\Local\Temp\¸´¼þ 3-2HOMEÏ¡·¹.exe

    Filesize

    641KB

    MD5

    e0b8043a81eb02354d3327cdf3854275

    SHA1

    6fc12dd8ae74d5ade1a7af3da7beac90e8b0f579

    SHA256

    5fa1b1a9ab92b948abefe3a81f15fa88f7d37957a17d7a25a73ec35a84beafcc

    SHA512

    08825f38460a9ffcbc9c9aaa02417dcefe10919992b3ebec43f50fee4be1ebba8fadf5a35c533fc42ed64e998a3896060560d8b975314a532a792921d4e3a4ea

  • C:\Users\Admin\Favorites\Íâ¹Ò×÷·»¹Ù·½Õ¾ [www.zuowg.com].url

    Filesize

    110B

    MD5

    7c8c531ff6a158742da186b1fad6e00e

    SHA1

    98d4551e0d6ac034838a17437640f3335edfaa86

    SHA256

    00ddbc71282fdbf74b8a02cc75b2c3d66529fe7664c148cc0ca79576a883c501

    SHA512

    1788173da6e9cf7e5421c02854ca9122d0825927f33fc64bafb76377ee80c0e1a8112c36ee40b1cbce86e121f864777e8ddf9aecd282f3cc82b70e12cc904805

  • \Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    20KB

    MD5

    32bbcad8a5617af8ad36bf63223ff784

    SHA1

    3e6a4b384d81dc9f244675666a224e081a22bc66

    SHA256

    86a919da6a9c3b3129c933e034cd67a418de208cbfe347942a1f565f12c4587f

    SHA512

    3068c2e899ab4a3b423d942fc41743976fbe6034877f67ee5bcea14074ff5048e93e700fb703909772ee723949517b7296c12fe4712862ef9b0205d4c87bfc1d

  • \Users\Admin\AppData\Local\Temp\¸´¼þ 3-2HOMEÏ¡·¹.exe

    Filesize

    1.0MB

    MD5

    34083cfe1ee79d1f5c554727d380748a

    SHA1

    07d315cfcc25e3298a8991317a9aedd35028c0ba

    SHA256

    13d80022227aed98fb931e013ff54f8eab012b1407bd5c3fa375d778b5aaab08

    SHA512

    634f556553cfd4b3e749a8e0e2701870ca3d5027997697a19eb683f8dca627aad415d75086fe2cf24b88382e0462be03fb08722f6a6e22835bd87afc6f221d04

  • \Users\Admin\AppData\Local\Temp\¸´¼þ 3-2HOMEÏ¡·¹.exe

    Filesize

    1.2MB

    MD5

    26a6354350290240d94b349b36ed4ede

    SHA1

    e570d9be660e4c51f52acb36a8d52ebf124cc1a6

    SHA256

    065332faa978933175569e614639cc1193506244b98bbe756115cf9f4b5842fe

    SHA512

    9ddd432ee426953440ec761a03e814650c5a3eda4f4056ace38e5cd418c10c1a57f74a85eb861f9a1ff6eed5e5014622c5ba5495d5cf4476c3db700a3fd97a39

  • memory/2568-59-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-53-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-43-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-44-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-61-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-70-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-91-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-90-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-89-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-87-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-85-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-83-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-81-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-79-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-77-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-75-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-73-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-68-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-66-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-64-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-23-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-57-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-55-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-40-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-51-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-49-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-47-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-46-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-42-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2568-100-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-101-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-102-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-103-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-104-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-105-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-106-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-107-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-108-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-109-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-110-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-111-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-112-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-113-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2568-114-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2996-4-0x00000000024E0000-0x00000000024EF000-memory.dmp

    Filesize

    60KB

  • memory/2996-21-0x00000000030B0000-0x00000000034FA000-memory.dmp

    Filesize

    4.3MB

  • memory/2996-20-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB