Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:28
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
12230a5cbcd429735d5d31b4759bc382.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
12230a5cbcd429735d5d31b4759bc382.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
12230a5cbcd429735d5d31b4759bc382.exe
-
Size
688KB
-
MD5
12230a5cbcd429735d5d31b4759bc382
-
SHA1
f781a19701c374838fcfdae361359977645c9ca2
-
SHA256
e4bf89f0f173f6c293ff297d431102ad00c30ab9592840925715a59b9b2875f0
-
SHA512
47c93c639330cecd85275182cd4f63c5fece6867905c245a9cf0cdb9507ebbb2e1ec7ed6042191aef54a9355be793cd4c1e8dbf21150bffab29935e02066a339
-
SSDEEP
12288:WO5r2SoKqy0Ecw8NQ2ZBaLAhdOSkryZtGUyAoTJa3ONEoTtQsQud:J5rZoPy0Nw8VfaLEdOSlHGvAoTRNptU+
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 864 wnzczs.exe -
Loads dropped DLL 6 IoCs
pid Process 2440 12230a5cbcd429735d5d31b4759bc382.exe 864 wnzczs.exe 864 wnzczs.exe 864 wnzczs.exe 864 wnzczs.exe 864 wnzczs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\{24588FA4-10F1-41D7-B19D-6E22361E47FA}\DisplayName = "°Ù¶È" 12230a5cbcd429735d5d31b4759bc382.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\{24588FA4-10F1-41D7-B19D-6E22361E47FA}\URL = "http://www.baidu.com/s?wd={searchTerms}&tn=site888_1_pg&cl=3&ie=utf-8" 12230a5cbcd429735d5d31b4759bc382.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes 12230a5cbcd429735d5d31b4759bc382.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{24588FA4-10F1-41D7-B19D-6E22361E47FA}" 12230a5cbcd429735d5d31b4759bc382.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\{24588FA4-10F1-41D7-B19D-6E22361E47FA} 12230a5cbcd429735d5d31b4759bc382.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\{24588FA4-10F1-41D7-B19D-6E22361E47FA}\Codepage = "65001" 12230a5cbcd429735d5d31b4759bc382.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 864 wnzczs.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2440 wrote to memory of 864 2440 12230a5cbcd429735d5d31b4759bc382.exe 16 PID 2440 wrote to memory of 864 2440 12230a5cbcd429735d5d31b4759bc382.exe 16 PID 2440 wrote to memory of 864 2440 12230a5cbcd429735d5d31b4759bc382.exe 16 PID 2440 wrote to memory of 864 2440 12230a5cbcd429735d5d31b4759bc382.exe 16 PID 2440 wrote to memory of 864 2440 12230a5cbcd429735d5d31b4759bc382.exe 16 PID 2440 wrote to memory of 864 2440 12230a5cbcd429735d5d31b4759bc382.exe 16 PID 2440 wrote to memory of 864 2440 12230a5cbcd429735d5d31b4759bc382.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\12230a5cbcd429735d5d31b4759bc382.exe"C:\Users\Admin\AppData\Local\Temp\12230a5cbcd429735d5d31b4759bc382.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\nso13FF.tmp\wnzczs.exeC:\Users\Admin\AppData\Local\Temp\nso13FF.tmp\wnzczs.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:864
-