Overview
overview
10Static
static
10081899c525...89.dll
windows7-x64
1082060e332...76.exe
windows7-x64
1009d22d6340...64.exe
windows7-x64
11f4e927f6e...a4.exe
windows7-x64
820efc37efc...db.dll
windows7-x64
623b5ce252f...5b.exe
windows7-x64
1035fdad147c...8f.exe
windows7-x64
136bfd9f40c...07.exe
windows7-x64
156ec95785f...a4.exe
windows7-x64
1675e7e38d9...a8.exe
windows7-x64
96b4df38111...7a.exe
windows7-x64
76b4f6a820d...96.exe
windows7-x64
1721ccbb780...29.exe
windows7-x64
375a9ade196...1d.exe
windows7-x64
1079271d57c5...61.exe
windows7-x64
7*.*/update.exe
windows7-x64
6*.*/˫�...��.bat
windows7-x64
1847001fe67...7e.exe
windows7-x64
197d846563e...3b.exe
windows7-x64
19a5a08d7a4...4a.exe
windows7-x64
109da42140ca...70.exe
windows7-x64
6ac7da11c38...e2.exe
windows7-x64
10b3489810af...5f.exe
windows7-x64
1bf11915a5a...55.dll
windows7-x64
6c453aa991f...3e.dll
windows7-x64
6c97d9bbc80...15.exe
windows7-x64
10cfe55dc501...48.exe
windows7-x64
6d2a120aa4a...78.exe
windows7-x64
10db97db6b03...1b.dll
windows7-x64
6dc276b7ca4...cf.exe
windows7-x64
10e714a8c576...a4.exe
windows7-x64
1f0c2927859...a6.exe
windows7-x64
7Analysis
-
max time kernel
178s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 14:27
Behavioral task
behavioral1
Sample
081899c5257cdf6b27b238f9114b9151a755a2044cb463eb2214fa9101c4cd89.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
082060e3320870d1d576083e0ee65c06a1104913ae866137f8ca45891c059a76.exe
Resource
win7-20240215-en
Behavioral task
behavioral3
Sample
09d22d634084239df510d088dd1685886fdba2810df4067771142fb2204cef64.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
1f4e927f6e5ff4ae660f4d99194a9a7c05d5d829c6c3dbe1ee52a00fc740d6a4.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
20efc37efcb36bc4a7cdf75ff667d3193959bf1858a4c115fd4301ca11ce8ddb.dll
Resource
win7-20240319-en
Behavioral task
behavioral6
Sample
23b5ce252f1cb3ff40a3bcb3ea53dd674175c3ad782b00e33ae45c8c87fa265b.exe
Resource
win7-20231129-en
Behavioral task
behavioral7
Sample
35fdad147c2ab2c36dd7fd1ad1ae26b80be6c501bb22120b741be3ab34be168f.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
36bfd9f40ce0043c878b28ca80dda5315cf681215baf4e1d539456d89b907807.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
56ec95785f91418751ad5788f9076af108ae19e03d2e0c0551ae8f8d8f5acba4.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
675e7e38d969e9c0af164337a180b2941d4a676b7e0c345da1de1b2d42ed31a8.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
6b4df381119ee2beac0fb75184addb6cdd045ddd5e0fa09365a51331a484cd7a.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
6b4f6a820d415a88ee156607b13450cbe0bedad4eb05961c55f5926f86262296.exe
Resource
win7-20240319-en
Behavioral task
behavioral13
Sample
721ccbb780b308c6c40817749b6764ad06cd2e56389bba1618a0dadc362d6429.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
75a9ade19696be512a894b659c4bebd174a868f404da5479f4fd96494e04c71d.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
*.*/update.exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
*.*/˫ǩ.bat
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
847001fe67b260c91fdc360297f6758598c41eb78fc4aae6adc4a4e2dd813b7e.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
97d846563e9c5da173d27fd11a6f182709c665dba0cb3f85a882c7b3e9cd9a3b.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
9da42140cab695b77cde560dd1109d2b96d263e25c21bba0e70604f0717bf270.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
ac7da11c38cce3b21137e629d76614f6350cbc96db41bede9029c83d9dfa98e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
b3489810af4e4d0d953eb438e3550ace5d52a5c8818a6cae7af6d30ba5482e5f.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
bf11915a5a5f8e1de827676250505e7f503c0744da757f8290f077d3d5d81655.dll
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
c453aa991f1fb96ec3aebf334f8d9f5a5256dcdf90e697a007575771705be23e.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.exe
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
cfe55dc501afeb1e83c683ec596be33878597e8d318f8e9739557af1f208b348.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
d2a120aa4a8aeb87408828d4e7e0da615cb83e32ca5fccc79eee70bca3ea4d78.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
db97db6b0367434c2170eb34f828ec6b99032a4722ea55dc14a72883d8af1c1b.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
dc276b7ca4a980cf487b73b4ef9c40fb93f1b00b5c757a726057ab21a0372ecf.exe
Resource
win7-20240215-en
Behavioral task
behavioral31
Sample
e714a8c576d7e04c2a8c6f4f8aa6627543524e61f4e3fc402a24d6981bad03a4.exe
Resource
win7-20231129-en
General
-
Target
*.*/update.exe
-
Size
744KB
-
MD5
288ad7c14b2e9cbfc8432d3d41d62164
-
SHA1
2138ba33796ed343fb01c03f4abfdbed30bfe151
-
SHA256
7e24716b753efa564cf6ace4abbe687a2ede68180140e4aaab8279b3328ababe
-
SHA512
6f045adea1a9d4c1a0ec414a77c1611687a7ec4ed23ffc1fda426a396ca4244f5b212a1189dc6fb804268a5d29cec3226ccd6d3418e7e5a9923cb0733caac70c
-
SSDEEP
12288:Yzki5f8eM8n7X0tYAY4+5684WFh5ecvSrW3yNdkeemwtuS9:OkE8eJnL02AYw84Wj5evNl0u
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 SinBa.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SinBa.INI SinBa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SinBa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SinBa.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_GPU_RENDERING\SinBa.exe = "1" SinBa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main SinBa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT\SinBa.exe = "0" SinBa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT SinBa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT SinBa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\SinBa.exe = "0" SinBa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING SinBa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" SinBa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION SinBa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT SinBa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT\SinBa.exe = "1" SinBa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN SinBa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch SinBa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION\SinBa.exe = "10000" SinBa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_Cross_Domain_Redirect_Mitigation\SinBa.exe = "1" SinBa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_Cross_Domain_Redirect_Mitigation SinBa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" SinBa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" SinBa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_IMG SinBa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BLOCK_LMZ_IMG\SinBa.exe = "0" SinBa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT\SinBa.exe = "0" SinBa.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1132 efsui.exe 1132 efsui.exe 1132 efsui.exe 1132 efsui.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1132 efsui.exe 1132 efsui.exe 1132 efsui.exe 1132 efsui.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2972 SinBa.exe 2972 SinBa.exe 2972 SinBa.exe 2972 SinBa.exe 2972 SinBa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2972 2508 update.exe 28 PID 2508 wrote to memory of 2972 2508 update.exe 28 PID 2508 wrote to memory of 2972 2508 update.exe 28 PID 2508 wrote to memory of 2972 2508 update.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\_._\update.exe"C:\Users\Admin\AppData\Local\Temp\_._\update.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\_._\SinBa.exe"C:\Users\Admin\AppData\Local\Temp\_._\SinBa.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
-
C:\Windows\system32\efsui.exeefsui.exe /efs /keybackup1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD5c401bac2d2a86b224fb1dd1640998958
SHA1a34169c5a35ed141b61641a11c00f3d09cc382cb
SHA2561e64fc6e9dee17e504699cbd4035564f6b00dfe927d8066c9f4abc89fd06b87c
SHA5129ebd9cc8c68c1bec06477fcdb1f3e0cc7b22d471a4d4fa8fe78c145a82fc828a22f33b791602ffcaa7c7bc7bf7f4161aa2d50f006fc055ce278366ff83434402
-
Filesize
453B
MD5ad19e6ad5b02145efd35ef5563cc303b
SHA145fff7a10ce07e1978ed96212efbae8a5cb1d75c
SHA25623bd1f5c43e0580d2f1f80df3dcaf7d5620ae09fc57b314f5a3fa470c1c330a6
SHA512e4a4e0d846a426dfff9616124f04e040a00b779b18b5d0bc71ef613e9ba24e5f22cf45d518cb883731ceb8368714ede8b276488b7f3417855cd0ddf5af7e2a53
-
Filesize
748B
MD5837fdb188d6087b76e3f1b9eda177f18
SHA11781ad7569b617f6f74a57c812403e994f9b77ce
SHA256ceea2c6c0a73e14fa3baee956e0a15721996d00b6c88ebfa2312fee6c4eb0cc3
SHA5125d2cd8ad01315d753324a1c12165d3bccef3de438754d06699d6f88b9e367f50d6d2d561d226f884a8e00ad5f481f33f769e8b63376df1eb70e445349d519900
-
Filesize
1KB
MD527c96f87b64b794e9ae43a7fb279344e
SHA1d2bf26e6171cf80918b0af0c68c1ce80d5777b34
SHA256253b37bfbb2ba5df0e7ef3bb1179766205a2a26220f31550ef1968b7999465b7
SHA51226b9ae0837cdecea0c64d47827141c9f1547d2f4aef7ba02a818911f36b204bc117139368c4c2773563aef11694895b585af95e3112efe84d807d58c523f29f3
-
Filesize
1KB
MD5f43d1c6209dc542d2d416f00fbc6ff1a
SHA1544bf9b84626a60527c24bbaf082fde63b9f652b
SHA256c68225f244dfdf21822a46905d75e7c223a55e0e3f75caca55aeca808d473339
SHA512d137707ac85d2cb1420c64b5ced0474b63aee71f2fcd18b7868d115a471e98bc79628b59d3eaf986b91f649b73a18041606051b0b83a20d8f48d06a91efdefcb
-
Filesize
785B
MD5c8a53e693ca4fb5d58b99aad262f9d8b
SHA1531d1feeb81887ffe99906093137d73391dcc977
SHA256774993c2f43b81361c7eec7d77767a2bdccc18eb704fc2c46310973a4810ad1f
SHA512acd26eb988210113ac728b1c146764cc41787e27d6ff9b6d7b3667c260f0450251b38b716f8ce24d55a649b7252bbe9064f03cb3b49783641b26fa273e5d5ee5
-
Filesize
127B
MD5b29e2cbfa269c80bc8ae1f5c9df7f787
SHA122b9f84793f2e56a116822943ba31419ef728730
SHA2568b9a18f8ab7cc377151deb7ddf3ff83435cd697aae1283dc2fa50e5298e3e1bc
SHA512c64c7881b0c62b63ad92629772f070c0d4c2b99b97d303f4e294ab14061e8d421d24c5440615b5cd720a861854984a1e8b919fb7dae911e265db105cbe9255f5
-
Filesize
179B
MD5cc80322245b5c9dd7271708f22d612dd
SHA10345e4c6c2e692e26583285664f32f6cc7dd10cb
SHA2569411a789d7206633d2eb3e3f261106223cc09624fa9efa92b9817b7ea67e11a4
SHA51292532d5680206fd7d1d7a32ae639f02bd2ddd524d7b2cb45a42070842eaa5a3cbf4c1ca11978b8e34047afff19e5a961ec1b57f6f26ae7ff24f420cc69189b19
-
Filesize
92B
MD5e36c9f2f02078a73cfc83634f7eff8df
SHA12a450bb4696d13cbd2f7813fbe9825a9cdbebaee
SHA2566dde63a1882f7e8aeaca623bfe518e88210177045b9728c0e5d8f4c747fabf59
SHA512db0994441883e7c1743e9eb0ee5b3794d3cd15b1253fd1004f080ea6d831f85b910169a6422189816f776a76aa162edbc57ad9e681e2af03e41bf952a15c4b89
-
Filesize
389B
MD5a7d8ec35df9ee486a7a6bebe4a3288fa
SHA14e891491a2655bf5ddf920bd21b298358ee6f1b5
SHA2568de9657c4d7bd04266e88434ce46d60e2e9664a992c3b2fcabb62f4e8103e9cc
SHA5123f7bc6ce3f26ac5e90dfc51937005a09a8279c2f24b46d847a491a5629551bf6c37f1f4bd33755c7cd2a7989df49f960b3ea38cf014e6f891b8006658b2ff45c
-
Filesize
388B
MD51dce0cd82690197520a85895984ff20b
SHA19a9ac720bcba626daa07d13ce33a332c07ab0ed3
SHA25634db6731822b8892a311c30740b3722e599cc1ebe8ed9aec63d5c84b8a5b3cf5
SHA512d24d2a8642468fa400fb6ba08ce1fb1d852c3dfa5fc3c35e506ddfaad8534840cfcd858ea7754a617a1b23502057071d41d304594eb3fdae2d6edc64208c1978
-
Filesize
387B
MD533c529d1d4420be2e766df28de142f9f
SHA1e2805cacf300f41bf370ae4bc527a58552965cad
SHA256f2809d1fc77adc2f97c83817634429d4165a736a3aca9b8bb717b9691e573ace
SHA51226ef99a424d7ffb4fc9d1c3f2926adf5409909297760cf0654b610958417fc23ffcc72209383392c32a96365695a3600d3f6872eff6b1bfe9b477e860f3e9123
-
Filesize
387B
MD5712bc2f464ccef3f6b9a323f0a8ea81b
SHA1b19b68dc0a67aa76fedd823c9f643aeb3ff044f1
SHA2564d860d473fb6788bc5ed914a5357a7dcb45827f7b7bf47464e129ce70e920ca9
SHA5129e6917eab5d026a06ba8cb6722d9038980b97f99026138007d877cbedf14b0929c544a5b35bd4a8a026280f85fbea520d1ab033e624d639264e005bd585f3912
-
Filesize
386B
MD53707fe7933c99b0e8e1992599e5732ce
SHA1cdc8ef2b213e6fd5eda3df205663d7b6caa24f4b
SHA256ff05ea11550914328a42d054d45bd1c54c1337f3e23875f4d3886f7e193d1cb7
SHA5120ab3c0bdcb242fddca20b5ccf59ee49eca0d5ac253e2c1a115dca84ba837e8a95572599f44ce0ac902502bdc8a897cc171f69106b8d09b22fab53a80ba79c474
-
Filesize
385B
MD5e143b57eb66bf5a1d1a23095b4a98743
SHA16f339fc69fa6707de4d5848d169da4bf6a5f9a6e
SHA256c9e807b3d52600c5d1dfe0acfcb4af71741e12fc6c276e0c23fae83bd1b30e26
SHA5125855db02f10c36dd284109dcae0edefe3532c5dd9699c04e2d7e29a01eae31646153af6e1266fd8e9b4d61d9c9ae4a211508135ecd6e7ae11f71c9fe0b530f6d
-
Filesize
416B
MD5c65eaad99d7156f82d49538bcf347fb5
SHA14f7f4fc9d503e40f0df45cdedc1139c6527a599f
SHA256829062ede9c5cf67a24e00020e091dd3435fcce01fa0852bd5f2b7ee2beb4b16
SHA51238c3ced77c4a6868f1aea3cbae0a2511de5c207b7b41e041c2445227d4bc404f4dc637c5c4632d32e065f3d05c8e2554f6891f70816e40bb8c2763c80c263fa8