Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 04:28
Static task
static1
Behavioral task
behavioral1
Sample
HLLYP_Setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
HLLYP_Setup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
HLLYP_Setup.exe
-
Size
4.0MB
-
MD5
b25a6deaa293d2f5e64924065a5468f4
-
SHA1
ff4dabc435e09076e23032203973b800bec8043d
-
SHA256
832f561cc0abd86316c4aa3440a24ef09901d8754d02674e0502269084fcc193
-
SHA512
f51a758d6ab6af8ea75992c1e3e4951056290cccc6a6a5b99b039574baf3c51b2449b78d347a4640ad448649cd3b584a16825b5d877379a6ab7c4c5451e04911
-
SSDEEP
98304:wZd3dutXJFayKy07VVs4pn/7sY2Tu0xsEzK3Hy:wT3wRayUiuwsw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2180 irsetup.exe -
Loads dropped DLL 4 IoCs
pid Process 2356 HLLYP_Setup.exe 2180 irsetup.exe 2180 irsetup.exe 2180 irsetup.exe -
resource yara_rule behavioral1/files/0x000900000001225c-1.dat upx behavioral1/memory/2180-6-0x0000000000400000-0x0000000000527000-memory.dmp upx behavioral1/memory/2180-23-0x0000000000400000-0x0000000000527000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ºêÀÖ¼ÒôÅï Setup Log.txt irsetup.exe File opened for modification C:\Windows\ºêÀÖ¼ÒôÅï Setup Log.txt irsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2180 irsetup.exe 2180 irsetup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2180 2356 HLLYP_Setup.exe 28 PID 2356 wrote to memory of 2180 2356 HLLYP_Setup.exe 28 PID 2356 wrote to memory of 2180 2356 HLLYP_Setup.exe 28 PID 2356 wrote to memory of 2180 2356 HLLYP_Setup.exe 28 PID 2356 wrote to memory of 2180 2356 HLLYP_Setup.exe 28 PID 2356 wrote to memory of 2180 2356 HLLYP_Setup.exe 28 PID 2356 wrote to memory of 2180 2356 HLLYP_Setup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\HLLYP_Setup.exe"C:\Users\Admin\AppData\Local\Temp\HLLYP_Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe__IRAOFF:520716 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\HLLYP_Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4