Overview
overview
10Static
static
7About.chm
windows7-x64
1About.chm
windows10-2004-x64
10Setup_s34.exe
windows7-x64
7Setup_s34.exe
windows10-2004-x64
10baid.exe
windows7-x64
7baid.exe
windows10-2004-x64
10bind_8152.exe
windows7-x64
7bind_8152.exe
windows10-2004-x64
10duisc.exe
windows7-x64
8duisc.exe
windows10-2004-x64
10edmtd.exe
windows7-x64
7edmtd.exe
windows10-2004-x64
10itadx.exe
windows7-x64
7itadx.exe
windows10-2004-x64
10ly2_03.exe
windows7-x64
10ly2_03.exe
windows10-2004-x64
10pcast.exe
windows7-x64
10pcast.exe
windows10-2004-x64
10pingtu12.exe
windows7-x64
1pingtu12.exe
windows10-2004-x64
10qqa02_u88setup.exe
windows7-x64
8qqa02_u88setup.exe
windows10-2004-x64
10sdcnc.exe
windows7-x64
8sdcnc.exe
windows10-2004-x64
10sdpig.exe
windows7-x64
7sdpig.exe
windows10-2004-x64
10sdreg.exe
windows7-x64
1sdreg.exe
windows10-2004-x64
10sdset.exe
windows7-x64
10sdset.exe
windows10-2004-x64
10sogoutb_se...ni.exe
windows7-x64
7sogoutb_se...ni.exe
windows10-2004-x64
10Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:27
Behavioral task
behavioral1
Sample
About.chm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
About.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Setup_s34.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Setup_s34.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
baid.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
baid.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
bind_8152.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
bind_8152.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
duisc.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
duisc.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
edmtd.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
edmtd.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
itadx.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
itadx.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
ly2_03.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
ly2_03.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
pcast.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
pcast.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
pingtu12.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
pingtu12.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
qqa02_u88setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
qqa02_u88setup.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
sdcnc.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
sdcnc.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
sdpig.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
sdpig.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
sdreg.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
sdreg.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
sdset.exe
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
sdset.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
sogoutb_setup_pp365sosoft08mini.exe
Resource
win7-20231215-en
General
-
Target
itadx.exe
-
Size
649KB
-
MD5
5e39f718790c8ab61b5fda0607ab046b
-
SHA1
be58a7d81bec145e61b291b9ba07d153b17fdb1d
-
SHA256
40a4758940e1bce888e96d4aa27c24032805a41700d5a0af5bddc174e247c683
-
SHA512
f08366a667eff30a3cb95f5ce37b712c55cbd251449eed0db24fee39f1a412d4924371db7444478fee7d5ee56a1835f5165bd2772fe7a97d3d94d1d96feed67e
-
SSDEEP
12288:L2qoY5sffWpiTHkfRvEwhc5Yh9gH1NcMRoNvia9N0HFW+DgnhLvLQ9WVB57:1GA0HkpvEwh2Yng8MRoAcCfghLLQ9OBV
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral14/files/0x0006000000023213-14.dat acprotect -
resource yara_rule behavioral14/files/0x0006000000023212-7.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation itadx.exe -
Executes dropped EXE 1 IoCs
pid Process 1436 bckmsn.exe -
Loads dropped DLL 1 IoCs
pid Process 1436 bckmsn.exe -
resource yara_rule behavioral14/memory/2324-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral14/memory/2324-12-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral14/files/0x0006000000023213-14.dat upx behavioral14/memory/1436-17-0x0000000010000000-0x00000000100FD000-memory.dmp upx behavioral14/memory/1436-20-0x0000000010000000-0x00000000100FD000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bckmsn = "C:\\Program Files (x86)\\bckmsn\\bckmsn.exe" bckmsn.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\bckmsn itadx.exe File created C:\Program Files (x86)\bckmsn\bckmsn.exe itadx.exe File opened for modification C:\Program Files (x86)\bckmsn\bckmsn.exe itadx.exe File created C:\Program Files (x86)\bckmsn\mpvisdm.dll itadx.exe File opened for modification C:\Program Files (x86)\bckmsn\mpvisdm.dll itadx.exe File created C:\PROGRA~2\bckmsn\200~1.1\dmplayer.dll bckmsn.exe File created C:\Program Files (x86)\bckmsn\info.dat bckmsn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1436 bckmsn.exe 1436 bckmsn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1436 2324 itadx.exe 89 PID 2324 wrote to memory of 1436 2324 itadx.exe 89 PID 2324 wrote to memory of 1436 2324 itadx.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\itadx.exe"C:\Users\Admin\AppData\Local\Temp\itadx.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\bckmsn\bckmsn.exe"C:\Program Files (x86)\bckmsn\bckmsn.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5ef5ec12bc67a3391646e48810dd2bab4
SHA1b57e0aa8ade39642f454c1a179be4ff94f427702
SHA2565fcaee3ea4ff2b50085af85f3ddd7ae9cdcebcb7a819c5b5d744fbe91a4293ae
SHA512504702736ced85c8ca01fd7f36a5cc30706254b5fecdb45c05f494d3130f6af08ebc468923aa89a0f95b7b9091f3aa390ff2d5cc5378bedceaef9b4cdd46fcf0
-
Filesize
4KB
MD5b879cab8736199a150f07f551dfc8f2f
SHA1f09ab4bbd42bbc80d5ea7f1c44b2cb54c3541018
SHA256ef6a059c7165ad3bc6060965eb3440544066c10f920045be0a3793970a8843e1
SHA5127a390cd4ef77f1c1685a9d584873e22288ee4fbe7d64d42b2aff3ccc9a307eea6cc4348798bea64e84dd861c77adb0081c9d1b494fe87d405505a92637f92acf
-
Filesize
379KB
MD5607ce5e3f197f37380660eb252f31366
SHA1784b907bb3b2b4b42f86a200d99c9ba6a2638b58
SHA2561b4b0ac73a1ea1167f91f87f5c901d920dd563b5288f869386a75eb694edb516
SHA5120abcade5dcff4b609a33cb57a3130bb40f729e4a2293b6c50f8b5d84a526b054afdfc5c48239de2f190b2daa8302abef67cc077dfa80df1c20fbecd924c6d761