Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 23:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
57727cca8693a00ad8488c45876282b0.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
57727cca8693a00ad8488c45876282b0.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
57727cca8693a00ad8488c45876282b0.exe
-
Size
22KB
-
MD5
57727cca8693a00ad8488c45876282b0
-
SHA1
55ce4f55683ee94eb0fe2c4b6e8ecaf47303765c
-
SHA256
bc04f91db833c92d04bed391c53c8382d86da119d3be0146b6a434fe23eb65d0
-
SHA512
5899904dac8de32e2d3a4d05346cdf707cf297e406e4e9dd5904fe2c14e829ea891b107ff07bb6604c8955da07fbc51614f1f01d455afb046d798c24c0edfee6
-
SSDEEP
384:Piv9NM67LuJP7xaQ0xh5K+BrIyucYetD++xh1iyzknYjc5SamYhNcngkk:P0fMrL0xhNBBYetDxhY1Yjcw3vngH
Score
10/10
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 57727cca8693a00ad8488c45876282b0.exe -
Deletes itself 1 IoCs
pid Process 2592 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2676 taskkill.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\DefaultIcon 57727cca8693a00ad8488c45876282b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.IE 57727cca8693a00ad8488c45876282b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.IE\ = "IE" 57727cca8693a00ad8488c45876282b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\NeverShowExt = "1" 57727cca8693a00ad8488c45876282b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open\command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE " 57727cca8693a00ad8488c45876282b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open\command 57727cca8693a00ad8488c45876282b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" 57727cca8693a00ad8488c45876282b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE 57727cca8693a00ad8488c45876282b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\ = "????" 57727cca8693a00ad8488c45876282b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell 57727cca8693a00ad8488c45876282b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open 57727cca8693a00ad8488c45876282b0.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1728 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2844 57727cca8693a00ad8488c45876282b0.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2844 57727cca8693a00ad8488c45876282b0.exe Token: SeDebugPrivilege 2676 taskkill.exe Token: SeDebugPrivilege 2844 57727cca8693a00ad8488c45876282b0.exe Token: SeDebugPrivilege 2844 57727cca8693a00ad8488c45876282b0.exe Token: SeDebugPrivilege 2844 57727cca8693a00ad8488c45876282b0.exe Token: SeDebugPrivilege 2844 57727cca8693a00ad8488c45876282b0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2844 57727cca8693a00ad8488c45876282b0.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2676 2844 57727cca8693a00ad8488c45876282b0.exe 28 PID 2844 wrote to memory of 2676 2844 57727cca8693a00ad8488c45876282b0.exe 28 PID 2844 wrote to memory of 2676 2844 57727cca8693a00ad8488c45876282b0.exe 28 PID 2844 wrote to memory of 2676 2844 57727cca8693a00ad8488c45876282b0.exe 28 PID 2844 wrote to memory of 2592 2844 57727cca8693a00ad8488c45876282b0.exe 31 PID 2844 wrote to memory of 2592 2844 57727cca8693a00ad8488c45876282b0.exe 31 PID 2844 wrote to memory of 2592 2844 57727cca8693a00ad8488c45876282b0.exe 31 PID 2844 wrote to memory of 2592 2844 57727cca8693a00ad8488c45876282b0.exe 31 PID 2592 wrote to memory of 1728 2592 cmd.exe 34 PID 2592 wrote to memory of 1728 2592 cmd.exe 34 PID 2592 wrote to memory of 1728 2592 cmd.exe 34 PID 2592 wrote to memory of 1728 2592 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\57727cca8693a00ad8488c45876282b0.exe"C:\Users\Admin\AppData\Local\Temp\57727cca8693a00ad8488c45876282b0.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ZhuDongFangyu.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 1 && del "C:\Users\Admin\AppData\Local\Temp\57727cca8693a00ad8488c45876282b0.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 13⤵
- Runs ping.exe
PID:1728
-
-