Analysis

  • max time kernel
    136s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 22:17

General

  • Target

    05676168e4ed43f6ea3cb1783b735283.exe

  • Size

    292KB

  • MD5

    05676168e4ed43f6ea3cb1783b735283

  • SHA1

    7ed674ae3f4f9393a155b132dec7b39800b38367

  • SHA256

    86552fba77400f1359af00f97a27e7820e1b6c1469b598ea499152f450a2095c

  • SHA512

    db4fdfd54f7387e7f1125eb90eae56e96ef1cf0d885fc3903046fb5e2067086ffc3062e1b9d60a089845b82c558b0454e00bd3c8047e09a66ce8ecf4414ad485

  • SSDEEP

    6144:H+b/aw1CWomVowlPBrt8yJn3ZG6zhbJbABGuT9XHZO6lqUzqB:cFsHmPpaqpnzhbBNuT9X5O6Ne

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05676168e4ed43f6ea3cb1783b735283.exe
    "C:\Users\Admin\AppData\Local\Temp\05676168e4ed43f6ea3cb1783b735283.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      PID:2000
  • C:\Windows\Hacker.com.cn.ini
    C:\Windows\Hacker.com.cn.ini
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:1540

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\Hacker.com.cn.ini

            Filesize

            292KB

            MD5

            05676168e4ed43f6ea3cb1783b735283

            SHA1

            7ed674ae3f4f9393a155b132dec7b39800b38367

            SHA256

            86552fba77400f1359af00f97a27e7820e1b6c1469b598ea499152f450a2095c

            SHA512

            db4fdfd54f7387e7f1125eb90eae56e96ef1cf0d885fc3903046fb5e2067086ffc3062e1b9d60a089845b82c558b0454e00bd3c8047e09a66ce8ecf4414ad485

          • C:\Windows\uninstal.bat

            Filesize

            190B

            MD5

            dfe981ff29435fddabf543fb62cd9d17

            SHA1

            057b65f12cb8db226450dad9c36ac17b72e853b9

            SHA256

            0371329badc63ef1356d62babf8231a408085f85cb2dd604a1ea67112f515374

            SHA512

            50dfd417d3399b4fab831a7416adbd89e92eeb85bac61a5bee72c0340258d5720c58ee3e25a63a24316e54e91dfad85c0d268917883b86577d1d9ffa60f86d0d

          • memory/1964-0-0x0000000000400000-0x000000000055A000-memory.dmp

            Filesize

            1.4MB

          • memory/1964-1-0x0000000000220000-0x0000000000221000-memory.dmp

            Filesize

            4KB

          • memory/1964-2-0x0000000000240000-0x0000000000241000-memory.dmp

            Filesize

            4KB

          • memory/1964-15-0x0000000000400000-0x000000000055A000-memory.dmp

            Filesize

            1.4MB

          • memory/2196-7-0x0000000000240000-0x0000000000241000-memory.dmp

            Filesize

            4KB

          • memory/2196-17-0x0000000000400000-0x000000000055A000-memory.dmp

            Filesize

            1.4MB

          • memory/2196-18-0x0000000000220000-0x0000000000221000-memory.dmp

            Filesize

            4KB

          • memory/2196-19-0x0000000000240000-0x0000000000241000-memory.dmp

            Filesize

            4KB