Overview
overview
10Static
static
10081899c525...89.dll
windows7-x64
1082060e332...76.exe
windows7-x64
1009d22d6340...64.exe
windows7-x64
11f4e927f6e...a4.exe
windows7-x64
820efc37efc...db.dll
windows7-x64
623b5ce252f...5b.exe
windows7-x64
1035fdad147c...8f.exe
windows7-x64
136bfd9f40c...07.exe
windows7-x64
156ec95785f...a4.exe
windows7-x64
1675e7e38d9...a8.exe
windows7-x64
96b4df38111...7a.exe
windows7-x64
76b4f6a820d...96.exe
windows7-x64
1721ccbb780...29.exe
windows7-x64
375a9ade196...1d.exe
windows7-x64
1079271d57c5...61.exe
windows7-x64
7*.*/update.exe
windows7-x64
6*.*/˫�...��.bat
windows7-x64
1847001fe67...7e.exe
windows7-x64
197d846563e...3b.exe
windows7-x64
19a5a08d7a4...4a.exe
windows7-x64
109da42140ca...70.exe
windows7-x64
6ac7da11c38...e2.exe
windows7-x64
10b3489810af...5f.exe
windows7-x64
1bf11915a5a...55.dll
windows7-x64
6c453aa991f...3e.dll
windows7-x64
6c97d9bbc80...15.exe
windows7-x64
10cfe55dc501...48.exe
windows7-x64
6d2a120aa4a...78.exe
windows7-x64
10db97db6b03...1b.dll
windows7-x64
6dc276b7ca4...cf.exe
windows7-x64
10e714a8c576...a4.exe
windows7-x64
1f0c2927859...a6.exe
windows7-x64
7Analysis
-
max time kernel
12s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 14:27
Behavioral task
behavioral1
Sample
081899c5257cdf6b27b238f9114b9151a755a2044cb463eb2214fa9101c4cd89.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
082060e3320870d1d576083e0ee65c06a1104913ae866137f8ca45891c059a76.exe
Resource
win7-20240215-en
Behavioral task
behavioral3
Sample
09d22d634084239df510d088dd1685886fdba2810df4067771142fb2204cef64.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
1f4e927f6e5ff4ae660f4d99194a9a7c05d5d829c6c3dbe1ee52a00fc740d6a4.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
20efc37efcb36bc4a7cdf75ff667d3193959bf1858a4c115fd4301ca11ce8ddb.dll
Resource
win7-20240319-en
Behavioral task
behavioral6
Sample
23b5ce252f1cb3ff40a3bcb3ea53dd674175c3ad782b00e33ae45c8c87fa265b.exe
Resource
win7-20231129-en
Behavioral task
behavioral7
Sample
35fdad147c2ab2c36dd7fd1ad1ae26b80be6c501bb22120b741be3ab34be168f.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
36bfd9f40ce0043c878b28ca80dda5315cf681215baf4e1d539456d89b907807.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
56ec95785f91418751ad5788f9076af108ae19e03d2e0c0551ae8f8d8f5acba4.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
675e7e38d969e9c0af164337a180b2941d4a676b7e0c345da1de1b2d42ed31a8.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
6b4df381119ee2beac0fb75184addb6cdd045ddd5e0fa09365a51331a484cd7a.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
6b4f6a820d415a88ee156607b13450cbe0bedad4eb05961c55f5926f86262296.exe
Resource
win7-20240319-en
Behavioral task
behavioral13
Sample
721ccbb780b308c6c40817749b6764ad06cd2e56389bba1618a0dadc362d6429.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
75a9ade19696be512a894b659c4bebd174a868f404da5479f4fd96494e04c71d.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
*.*/update.exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
*.*/˫ǩ.bat
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
847001fe67b260c91fdc360297f6758598c41eb78fc4aae6adc4a4e2dd813b7e.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
97d846563e9c5da173d27fd11a6f182709c665dba0cb3f85a882c7b3e9cd9a3b.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
9da42140cab695b77cde560dd1109d2b96d263e25c21bba0e70604f0717bf270.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
ac7da11c38cce3b21137e629d76614f6350cbc96db41bede9029c83d9dfa98e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
b3489810af4e4d0d953eb438e3550ace5d52a5c8818a6cae7af6d30ba5482e5f.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
bf11915a5a5f8e1de827676250505e7f503c0744da757f8290f077d3d5d81655.dll
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
c453aa991f1fb96ec3aebf334f8d9f5a5256dcdf90e697a007575771705be23e.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.exe
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
cfe55dc501afeb1e83c683ec596be33878597e8d318f8e9739557af1f208b348.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
d2a120aa4a8aeb87408828d4e7e0da615cb83e32ca5fccc79eee70bca3ea4d78.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
db97db6b0367434c2170eb34f828ec6b99032a4722ea55dc14a72883d8af1c1b.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
dc276b7ca4a980cf487b73b4ef9c40fb93f1b00b5c757a726057ab21a0372ecf.exe
Resource
win7-20240215-en
Behavioral task
behavioral31
Sample
e714a8c576d7e04c2a8c6f4f8aa6627543524e61f4e3fc402a24d6981bad03a4.exe
Resource
win7-20231129-en
General
-
Target
db97db6b0367434c2170eb34f828ec6b99032a4722ea55dc14a72883d8af1c1b.dll
-
Size
28KB
-
MD5
af62cca39cdf2faa1a3e9b422afee8b9
-
SHA1
5714a48c24d79cf820c98ec3575ef4f0b7b7c921
-
SHA256
db97db6b0367434c2170eb34f828ec6b99032a4722ea55dc14a72883d8af1c1b
-
SHA512
c7ad2ef82f1f1a23ffa5ebcba8efca1dc8aa788847cab8d2693cf082f85e2e87979b92c559c69e60bc119929912c105e40c00aa9fe2f09d1cf8ad9e8fc3c4d13
-
SSDEEP
192:0P9IGUkZxXgGEmqnpbXf206LF9+qQ/1nwzJvZvdW9+2Cp92xR4qVeMNazlQF9gR:nGlJEmqx2029+qQ/1nZM2eMNazWm
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\°¢ÀïÍúÍú = "C:\\Windows\\SysWOW64\\aliim.exe /run:auto" rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DD3FC81-EB7E-11EE-8C47-FA8378BF1C4A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1932 1592 rundll32.exe 28 PID 1592 wrote to memory of 1932 1592 rundll32.exe 28 PID 1592 wrote to memory of 1932 1592 rundll32.exe 28 PID 1592 wrote to memory of 1932 1592 rundll32.exe 28 PID 1592 wrote to memory of 1932 1592 rundll32.exe 28 PID 1592 wrote to memory of 1932 1592 rundll32.exe 28 PID 1592 wrote to memory of 1932 1592 rundll32.exe 28 PID 1932 wrote to memory of 2216 1932 rundll32.exe 29 PID 1932 wrote to memory of 2216 1932 rundll32.exe 29 PID 1932 wrote to memory of 2216 1932 rundll32.exe 29 PID 1932 wrote to memory of 2216 1932 rundll32.exe 29 PID 1932 wrote to memory of 2216 1932 rundll32.exe 29 PID 1932 wrote to memory of 2216 1932 rundll32.exe 29 PID 1932 wrote to memory of 2216 1932 rundll32.exe 29 PID 2380 wrote to memory of 2136 2380 iexplore.exe 32 PID 2380 wrote to memory of 2136 2380 iexplore.exe 32 PID 2380 wrote to memory of 2136 2380 iexplore.exe 32 PID 2380 wrote to memory of 2136 2380 iexplore.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db97db6b0367434c2170eb34f828ec6b99032a4722ea55dc14a72883d8af1c1b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db97db6b0367434c2170eb34f828ec6b99032a4722ea55dc14a72883d8af1c1b.dll,#12⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\SysWOW64\Pidalce.dll",DPldalic3⤵PID:2216
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119B
MD5a167617e7beae2993ed74dfbc501d8eb
SHA10fe32b76717d56fbc17b85f97a7a366fc0c815de
SHA25608522254c8f6dfc9edbbec52bbfa67d12a8ef6c05a3f0b755e1f41b5f1800eba
SHA512499d13f94423311124c628b26f232fb0a9d62df69b3e94c95f8f4c971babbe4b4833a5d0ed3f0bdc0c397ac826a284d799e094938f02dc196588dc2d367f59ac
-
Filesize
97B
MD5cd0a61d98969279d5726bfe656429ef4
SHA137fcfab8293e7d41361394ae8a827f6416b77515
SHA2561106d3ae302e51bd55b0fa50a5befd555d0919576831d0e821daefa717b7019b
SHA512d1ad1422d284942d0dbdf5b823cf30f705501c67244f920ddd50416de7783d7b779c1ccb0ee5452f484f5d43ff380ed255a2c30649ed4289efbac5b0b80331f1
-
Filesize
63B
MD5c772d95f3921ad2b5cd7e591daf41bb2
SHA1eb4d2cbe38be7fe0aded05266e1186b06281be4e
SHA256ca07aa59518c6eacf0e572980d27d9f0fbfb6a07c390114002c35f0f4fafd555
SHA5121d0b7b43a500d7f7f75f62bb8dd3c3f505f0b97f00d7fa8f077648461ed4ccaa1773711c118566a6caea9d2c1eab9e83b851361de7622ab2a6e173e86431b46b
-
Filesize
54B
MD5f34737c4f0c4fdb889e074ca99c25368
SHA15a9d9c9c4126fa806240046f22d1786a2991715d
SHA25624f3957dacf5651ffc813986e8ac169607f7588da8ec94a2b524a877decbd480
SHA512919225d77fbebe711a173566f159d5dcfbc13e6939ea913f87b150bd5950680aa8296c03e8580f48dae527890bf259d7a9071245af0bfa45997d454ad0ddd0dc
-
Filesize
52B
MD5feb809ab6e61d75e1bb8a241e11385e8
SHA112a71885798109dea55771e53358606d2a0c4b56
SHA2560d80613e892f32c5c09acd87cfdba76512987eac5320d07bdf40ad1afacdbdc4
SHA5126e8b3ec1ac1e34191666bd0c84438cf089a230a1a17a3b180172615a5019097c1d59d284291a9d8877edb310a0f5e64fd0897232f89eb303506af94d549ef207
-
Filesize
131B
MD527de099ce4510609d75617971251ed1b
SHA13a7846070baa7e4e06d95193eabf395e4933c238
SHA25655a0bc5d42f71e47faba9ea96a43a5e417ce335bd289bba8a1379466b9913bce
SHA5121cfeffb282a6d5de6672ba191722e4f909ffe775d124d6d01205103b3ee2e3f12052e039a6aa5be5f1e6f1d6e7ce8f694f3ded3964ef01a66f05a0109e0c5e71
-
Filesize
100B
MD52584d6cfc29621552b28f0905fdba7f8
SHA1a2fb6de408e519e71883974e0e3191d5f5e58949
SHA2561a7771485a51404fce51f453ab0e4532a0674a26ac7e305d9992ba6f3daacccf
SHA51285bf76dd1e0d4caa19713ebca259153f33511f9712a7bea97c708f526316fc2604ceba98d130404bb9dc28c0d60cfa4c3f89899e21e88579aa1e7dee4ff70dc3
-
Filesize
95B
MD5a866782554710ef7e69bb381fb5bd7bd
SHA1922ab6f615ae84165e084d58345515be1ad81a9d
SHA25669e3df75ac1833490ed17a88e9fbda30301e6d18499397cfefbe6e3b2ac6d78a
SHA51257ec15586e869d12e5fc343bca8f65cae1f65482b6655fdd01b395f289641855c17a89bbf03befde18ad190c137bcc165f86e5f17b780dc3bf38b6419a4131c3
-
Filesize
105B
MD5bc9250c5a3210f2db2391cbec1f33f74
SHA14c3aeb7f8c73081a3bfe8299f07ca431e18d68ab
SHA2567d54dcdcd48c6dd7f8138ac21f7b9a4b8a1dd3fafa1bd8947982ce908120f845
SHA512d5ba01669542a7e0bc913d211a81651fb6d2228f42123fc4727c2da531ae75a96509e26bbd6ae251d6eaae4be49fc16a2aafe0f370617d8f71855bc965a395bf
-
Filesize
48B
MD5181686fb05f3abd9c7adea860e5f8131
SHA143188041be0d74503e22ac42771c7ec7b7e94907
SHA25664efb9a71ce40259dad8cc393188f05e36804829551a4fdc1656d736af197eef
SHA512b8943bf08a45d531f712f227ae934c5ac6fa9d71d03558bc9eac30e45e7c51e2f6ee81b4004200f331957cdeaf45af78f1c874dc4b4c42ca8bd53908c6f89753
-
Filesize
162B
MD52ce9d605c8cb62c08b90f07930df170a
SHA12780c34d620ed793133c0635dc050371fc048498
SHA2568c313420a0b779d32016d4d8120a361d2106e218dcef597c80af7b81efc48b5d
SHA51220598be8e77e8ad45bb123ab0f2a63b075ee4594b363d9f564101c8cc9a0374329a36e784b6cac191815b529fe498c9782cecdeb5b15a124a5864a7d52ad4823