Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:04
Behavioral task
behavioral1
Sample
276322009f25397cd905e6e1556d6a82.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
276322009f25397cd905e6e1556d6a82.exe
Resource
win10v2004-20231215-en
General
-
Target
276322009f25397cd905e6e1556d6a82.exe
-
Size
329KB
-
MD5
276322009f25397cd905e6e1556d6a82
-
SHA1
455fa30101bfe8bb68626e6f6fea1577c40bfbb1
-
SHA256
0498e79ffc309b964c9f1860166d3f490763113834de66ef270542138b76c4cc
-
SHA512
f9f8455236e49a7344b19298c863273520df2c5b883a853b0c758f5cb749e572558152917e4820e5dbb38c80874ab1531c6b8f1a7779520f5d7be058e8269125
-
SSDEEP
6144:ANskv0fTaA3SfgRpvEHPEFjxwjL6WvJjNCzWQmX7CLgDEi:207aVfgfMEnwXxjNCzWQYCLMEi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3064 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2588 huaxia.exe -
Loads dropped DLL 2 IoCs
pid Process 2360 276322009f25397cd905e6e1556d6a82.exe 2360 276322009f25397cd905e6e1556d6a82.exe -
resource yara_rule behavioral1/memory/2360-0-0x0000000000400000-0x00000000004EA000-memory.dmp upx behavioral1/files/0x000b000000012238-4.dat upx behavioral1/memory/2588-12-0x0000000000400000-0x00000000004EA000-memory.dmp upx behavioral1/memory/2360-21-0x0000000000400000-0x00000000004EA000-memory.dmp upx behavioral1/memory/2588-23-0x0000000000400000-0x00000000004EA000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\huaxia.exe 276322009f25397cd905e6e1556d6a82.exe File created C:\Windows\SysWOW64\Deleteme.bat 276322009f25397cd905e6e1556d6a82.exe File opened for modification C:\Windows\SysWOW64\huaxia.exe huaxia.exe File created C:\Windows\SysWOW64\huaxia.exe 276322009f25397cd905e6e1556d6a82.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2724 2360 276322009f25397cd905e6e1556d6a82.exe 28 PID 2360 wrote to memory of 2724 2360 276322009f25397cd905e6e1556d6a82.exe 28 PID 2360 wrote to memory of 2724 2360 276322009f25397cd905e6e1556d6a82.exe 28 PID 2360 wrote to memory of 2724 2360 276322009f25397cd905e6e1556d6a82.exe 28 PID 2724 wrote to memory of 2840 2724 cmd.exe 30 PID 2724 wrote to memory of 2840 2724 cmd.exe 30 PID 2724 wrote to memory of 2840 2724 cmd.exe 30 PID 2724 wrote to memory of 2840 2724 cmd.exe 30 PID 2840 wrote to memory of 2708 2840 net.exe 31 PID 2840 wrote to memory of 2708 2840 net.exe 31 PID 2840 wrote to memory of 2708 2840 net.exe 31 PID 2840 wrote to memory of 2708 2840 net.exe 31 PID 2360 wrote to memory of 2588 2360 276322009f25397cd905e6e1556d6a82.exe 32 PID 2360 wrote to memory of 2588 2360 276322009f25397cd905e6e1556d6a82.exe 32 PID 2360 wrote to memory of 2588 2360 276322009f25397cd905e6e1556d6a82.exe 32 PID 2360 wrote to memory of 2588 2360 276322009f25397cd905e6e1556d6a82.exe 32 PID 2360 wrote to memory of 3064 2360 276322009f25397cd905e6e1556d6a82.exe 33 PID 2360 wrote to memory of 3064 2360 276322009f25397cd905e6e1556d6a82.exe 33 PID 2360 wrote to memory of 3064 2360 276322009f25397cd905e6e1556d6a82.exe 33 PID 2360 wrote to memory of 3064 2360 276322009f25397cd905e6e1556d6a82.exe 33 PID 2588 wrote to memory of 2776 2588 huaxia.exe 34 PID 2588 wrote to memory of 2776 2588 huaxia.exe 34 PID 2588 wrote to memory of 2776 2588 huaxia.exe 34 PID 2588 wrote to memory of 2776 2588 huaxia.exe 34 PID 2776 wrote to memory of 2600 2776 cmd.exe 37 PID 2776 wrote to memory of 2600 2776 cmd.exe 37 PID 2776 wrote to memory of 2600 2776 cmd.exe 37 PID 2776 wrote to memory of 2600 2776 cmd.exe 37 PID 2600 wrote to memory of 2624 2600 net.exe 38 PID 2600 wrote to memory of 2624 2600 net.exe 38 PID 2600 wrote to memory of 2624 2600 net.exe 38 PID 2600 wrote to memory of 2624 2600 net.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\276322009f25397cd905e6e1556d6a82.exe"C:\Users\Admin\AppData\Local\Temp\276322009f25397cd905e6e1556d6a82.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop sharedaccess2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵PID:2708
-
-
-
-
C:\Windows\SysWOW64\huaxia.exeC:\Windows\system32\huaxia.exe -NetSata2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop sharedaccess3⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess4⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess5⤵PID:2624
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deleteme.bat2⤵
- Deletes itself
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5fc080e3fa5e0d5536ddcacecc9a3ae8d
SHA150cd58b794ad759ffc585400f87fd09857d26feb
SHA2568b7938ebafd0815bd024aeb39e2ac4fb266380c094d01af1c3e0d560d5d16e21
SHA512e3c9725cdcea527ee663024d7c824427a8b1e8918c47a2af82a14e0b6c6d64ef295d51fbbf92bc9a755cdc11eba3655c5f6b30b8e324658a16c136c977ed6d55
-
Filesize
329KB
MD5276322009f25397cd905e6e1556d6a82
SHA1455fa30101bfe8bb68626e6f6fea1577c40bfbb1
SHA2560498e79ffc309b964c9f1860166d3f490763113834de66ef270542138b76c4cc
SHA512f9f8455236e49a7344b19298c863273520df2c5b883a853b0c758f5cb749e572558152917e4820e5dbb38c80874ab1531c6b8f1a7779520f5d7be058e8269125