Analysis
-
max time kernel
142s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 05:52
Static task
static1
Behavioral task
behavioral1
Sample
photo2scr.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
photo2scr.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
安装说明.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
安装说明.url
Resource
win10v2004-20231215-en
General
-
Target
photo2scr.exe
-
Size
1.5MB
-
MD5
3dd264e94f98b5628efe2e7fec99b5fa
-
SHA1
1e3f5f152da577b0d67fd4f97017e031dde54426
-
SHA256
ef7a5cf8e4c927ea847e966943dd9da773b6698e60c1578913650ae28fac32df
-
SHA512
fec20f9c6d4c0eaccef7e4881d21b968fc080eac2593c92e351408a5f9c1e6d40b1002b3780b8db2f55045e2e8eb9331fb199597de830e84f92be05412e3f434
-
SSDEEP
24576:gpniOA5rBBMPyZ1ZRZBrbn9p6FbMA/i5/AyGyB4v9VfFZjECNpSB2+GIxnsvsdyl:eiOAnBW+XxrBpmK5jGm41jZugBkyl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2064 is-UDKNK.tmp -
Loads dropped DLL 3 IoCs
pid Process 2296 photo2scr.exe 2064 is-UDKNK.tmp 2064 is-UDKNK.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2064 is-UDKNK.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2064 2296 photo2scr.exe 28 PID 2296 wrote to memory of 2064 2296 photo2scr.exe 28 PID 2296 wrote to memory of 2064 2296 photo2scr.exe 28 PID 2296 wrote to memory of 2064 2296 photo2scr.exe 28 PID 2296 wrote to memory of 2064 2296 photo2scr.exe 28 PID 2296 wrote to memory of 2064 2296 photo2scr.exe 28 PID 2296 wrote to memory of 2064 2296 photo2scr.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\photo2scr.exe"C:\Users\Admin\AppData\Local\Temp\photo2scr.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\is-DVAQU.tmp\is-UDKNK.tmp"C:\Users\Admin\AppData\Local\Temp\is-DVAQU.tmp\is-UDKNK.tmp" /SL4 $30150 "C:\Users\Admin\AppData\Local\Temp\photo2scr.exe" 1352839 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD50186461547d0bba32e1fe0b8b33f0895
SHA18fafd9dfff35b3b31a64b79729ed92d0a01044f3
SHA256c470f414af61f873405e96fa11e602cf31c3f45dfc7858fd0b1fb83cb2ca5348
SHA5127c11f6651ad15747577e13763690d6c06d9104e83929bc2a4ae454e8fbbd9226ff5ac296946929c16aeec27d12b779f7f35eac7930f45c5e6c1b1216b70b6787
-
Filesize
642KB
MD53c9f925549a51f9017e08a072332fa47
SHA11bff860e744467a58ef986b1016a4454844f5ad7
SHA2561eb6ba689a47d91d01c9b3caa93daacec49c7b6daafb217678b9ad8f545c8ac2
SHA51286112ec0d9f4254bceb0a576bc03e09384a15a4a5e94b08ca65ddfbc60d9d8d459885138c2644c9309ac86bca0b86d41c92dbc8ed23d7d381cdbeb2d7963ec18