Overview
overview
10Static
static
7About.chm
windows7-x64
1About.chm
windows10-2004-x64
10Setup_s34.exe
windows7-x64
7Setup_s34.exe
windows10-2004-x64
10baid.exe
windows7-x64
7baid.exe
windows10-2004-x64
10bind_8152.exe
windows7-x64
7bind_8152.exe
windows10-2004-x64
10duisc.exe
windows7-x64
8duisc.exe
windows10-2004-x64
10edmtd.exe
windows7-x64
7edmtd.exe
windows10-2004-x64
10itadx.exe
windows7-x64
7itadx.exe
windows10-2004-x64
10ly2_03.exe
windows7-x64
10ly2_03.exe
windows10-2004-x64
10pcast.exe
windows7-x64
10pcast.exe
windows10-2004-x64
10pingtu12.exe
windows7-x64
1pingtu12.exe
windows10-2004-x64
10qqa02_u88setup.exe
windows7-x64
8qqa02_u88setup.exe
windows10-2004-x64
10sdcnc.exe
windows7-x64
8sdcnc.exe
windows10-2004-x64
10sdpig.exe
windows7-x64
7sdpig.exe
windows10-2004-x64
10sdreg.exe
windows7-x64
1sdreg.exe
windows10-2004-x64
10sdset.exe
windows7-x64
10sdset.exe
windows10-2004-x64
10sogoutb_se...ni.exe
windows7-x64
7sogoutb_se...ni.exe
windows10-2004-x64
10Analysis
-
max time kernel
93s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:27
Behavioral task
behavioral1
Sample
About.chm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
About.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Setup_s34.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Setup_s34.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
baid.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
baid.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
bind_8152.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
bind_8152.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
duisc.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
duisc.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
edmtd.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
edmtd.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
itadx.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
itadx.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
ly2_03.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
ly2_03.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
pcast.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
pcast.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
pingtu12.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
pingtu12.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
qqa02_u88setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
qqa02_u88setup.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
sdcnc.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
sdcnc.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
sdpig.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
sdpig.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
sdreg.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
sdreg.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
sdset.exe
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
sdset.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
sogoutb_setup_pp365sosoft08mini.exe
Resource
win7-20231215-en
General
-
Target
edmtd.exe
-
Size
68KB
-
MD5
206bdf1db7e2ffe38950ac59aaa20ea1
-
SHA1
43a814f9093e9c58c3ae285bdd2cd511f5435012
-
SHA256
3b7cd3479ddf35d5d803a14db014a6e7a1748afc8574e95b38e72990245fb473
-
SHA512
a5a141801a33c5e3bbfb02a0153457a480bee35706c3f5598e5509c958424b058d5934eaeb6f4dbfa0a624f2f5f387af6bbd54f726f1ae1641e98b344f9f933c
-
SSDEEP
1536:e3EAK3nQW/XNrcvkN4koAhdqp+e6ulcIgsuN9mB:HtnQW/XokN4koAhdq1cFsKmB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
edmtd.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation edmtd.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 4768 regsvr32.exe -
Processes:
resource yara_rule behavioral12/memory/4364-0-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral12/memory/4364-5-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
Processes:
regsvr32.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A474BD59-F29A-4559-95B9-B4E13FA51FAA}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RarSFX0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A474BD59-F29A-4559-95B9-B4E13FA51FAA}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A474BD59-F29A-4559-95B9-B4E13FA51FAA}\1.0\ = "DTService 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A474BD59-F29A-4559-95B9-B4E13FA51FAA}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A474BD59-F29A-4559-95B9-B4E13FA51FAA}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A474BD59-F29A-4559-95B9-B4E13FA51FAA}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A474BD59-F29A-4559-95B9-B4E13FA51FAA}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RarSFX0\\dtservice.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A474BD59-F29A-4559-95B9-B4E13FA51FAA}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A474BD59-F29A-4559-95B9-B4E13FA51FAA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A474BD59-F29A-4559-95B9-B4E13FA51FAA}\1.0\0 regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
regsvr32.exepid Process 4768 regsvr32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
regsvr32.exepid Process 4768 regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
regsvr32.exepid Process 4768 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
edmtd.exedescription pid Process procid_target PID 4364 wrote to memory of 4768 4364 edmtd.exe 86 PID 4364 wrote to memory of 4768 4364 edmtd.exe 86 PID 4364 wrote to memory of 4768 4364 edmtd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\edmtd.exe"C:\Users\Admin\AppData\Local\Temp\edmtd.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s dtservice.dll2⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5fb4e5543f8eb5a10f324b6f549b7af73
SHA1e7342ceeb93b53d42a40174c6801a104f1e20a1f
SHA256c796a8e4fed7c57ecf7c00193a1356175f18446541947244b84d777b079e4444
SHA5120febd58aa3e92a0836491628821cc3e3e4d6e62be2776608ca121238fceb62621b99072918fe093e7d2a204051ac8715d1713e86c1d296e9e96aad1f4866b13b