Resubmissions

06/08/2024, 01:35 UTC

240806-bzplyayhpd 9

03/04/2024, 06:21 UTC

240403-g4fgqaaf33 9

Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    03/04/2024, 06:21 UTC

General

  • Target

    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe

  • Size

    8.9MB

  • MD5

    63267d8b3821c488964c7f5dc21ce5f4

  • SHA1

    82aceae9a96708e33d3273412ed9d2f1a6581576

  • SHA256

    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9

  • SHA512

    75749f274172d15337637c0273576cf0317d713a614baaebbca286fb408f6e28efc3001972dff84b112495169c90279b00f8cf2682345e7ca544a2a09ecf5035

  • SSDEEP

    196608:KhUC3fTTEi1xkEqX2PM+PX4SQV6jyi+S7l9I6SI78Bjn5:KhUs/EJS/jkPI4

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    "C:\Users\Admin\AppData\Local\Temp\00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
      C:\Users\Admin\AppData\Local\Temp\00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe -a -d
      2⤵
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Users\Admin\AppData\Local\Temp\00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
        "C:\Users\Admin\AppData\Local\Temp\00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3008

Network

  • flag-us
    DNS
    cdnsource.oss-cn-hangzhou.aliyuncs.com
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    Remote address:
    8.8.8.8:53
    Request
    cdnsource.oss-cn-hangzhou.aliyuncs.com
    IN A
    Response
    cdnsource.oss-cn-hangzhou.aliyuncs.com
    IN A
    118.31.219.201
  • flag-us
    DNS
    www.kktian1.com
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
    Remote address:
    8.8.8.8:53
    Request
    www.kktian1.com
    IN A
    Response
    www.kktian1.com
    IN A
    120.48.69.102
  • 203.107.1.1:443
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    104 B
    2
  • 121.196.180.12:443
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    52 B
    1
  • 120.48.69.102:80
    www.kktian1.com
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
    152 B
    3
  • 180.101.74.77:8088
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    52 B
    1
  • 203.107.1.1:443
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    96 B
    2
  • 121.196.180.12:443
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    52 B
    1
  • 120.48.69.102:80
    www.kktian1.com
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
    152 B
    3
  • 192.168.1.20:2000
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
    152 B
    3
  • 192.168.5.102:2000
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
    152 B
    3
  • 180.101.74.77:8088
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    52 B
    1
  • 127.0.0.1:2000
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
  • 121.196.180.12:443
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    52 B
    1
  • 180.101.74.77:8088
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    52 B
    1
  • 203.107.1.1:443
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    104 B
    2
  • 121.196.180.12:443
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    52 B
    1
  • 180.101.74.77:8088
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    52 B
    1
  • 203.107.1.1:443
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    96 B
    2
  • 121.196.180.12:443
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    52 B
    1
  • 180.101.74.77:8088
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    52 B
    1
  • 120.48.69.102:80
    www.kktian1.com
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
    152 B
    3
  • 120.48.69.102:80
    www.kktian1.com
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
    152 B
    3
  • 120.48.69.102:80
    www.kktian1.com
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
    152 B
    3
  • 120.48.69.102:80
    www.kktian1.com
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
    152 B
    3
  • 120.48.69.102:80
    www.kktian1.com
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
    152 B
    3
  • 120.48.69.102:80
    www.kktian1.com
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
    152 B
    3
  • 8.8.8.8:53
    cdnsource.oss-cn-hangzhou.aliyuncs.com
    dns
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9.exe
    84 B
    100 B
    1
    1

    DNS Request

    cdnsource.oss-cn-hangzhou.aliyuncs.com

    DNS Response

    118.31.219.201

  • 8.8.8.8:53
    www.kktian1.com
    dns
    00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe
    61 B
    77 B
    1
    1

    DNS Request

    www.kktian1.com

    DNS Response

    120.48.69.102

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\00cac13d1158f31b58f2e348dc9829c2549674049bc2a421c2a0cfe772ae35c9_app.exe

    Filesize

    5.3MB

    MD5

    9531abc210972973d25f5a08e3166389

    SHA1

    43e54f65eaf479fe2b4241531d00bf326b9393f3

    SHA256

    1f4509f7187154e580e2c89a782dc257933f9436bac4ff28cb7db90af9973946

    SHA512

    aa48c61c248d651b3a0c71464e27b659861bceecfe513a5111d7dcf221bd840cd6c72478d75be7baaafdde2f6a990470460b0fe79aecc808939062ef9698acd2

  • \Users\Admin\AppData\Local\Temp\cyyundun.dll

    Filesize

    332KB

    MD5

    8722259b998800a37c3991c58ce64f96

    SHA1

    d370272422272eaf9aca8bc17ba9bcba1b83df70

    SHA256

    b115d63bee020042256019ee14fa0570483180e29c4deb7ed5b8fab522b05244

    SHA512

    867872e22769ecdba19daca70d6ef2bbb9e310abd90ddd1c3ff5b9a3375ef11488f1f7ac021c579ab58b7e8125c8bada584a1e96bb15fcee5837307cb64a6857

  • \Users\Admin\AppData\Local\Temp\wincvtp.dll

    Filesize

    53KB

    MD5

    0eed4533257c57e70dfb96753e2d7afa

    SHA1

    b876936f10597e2f1b15a0af35da644076030376

    SHA256

    94fe80ee719e02e036902cc661b2ba07172de611afc3a2b8da45f1ec87bfde46

    SHA512

    66644a6bb211a7e3999c5ffe5301ded2e5b5f29ef1be098d3d38719758fd4f3b49fdc76623381e3d14619bf66afba65ce36ad20e299a1f63b8cdd79eee306445

  • memory/1636-4-0x0000000074B30000-0x0000000074B97000-memory.dmp

    Filesize

    412KB

  • memory/1636-5-0x0000000074B30000-0x0000000074B97000-memory.dmp

    Filesize

    412KB

  • memory/2968-12-0x0000000074B30000-0x0000000074B97000-memory.dmp

    Filesize

    412KB

  • memory/2968-18-0x0000000004B00000-0x000000000574C000-memory.dmp

    Filesize

    12.3MB

  • memory/2968-55-0x0000000074B30000-0x0000000074B97000-memory.dmp

    Filesize

    412KB

  • memory/2968-56-0x0000000004B00000-0x000000000574C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-19-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-20-0x0000000077910000-0x0000000077912000-memory.dmp

    Filesize

    8KB

  • memory/3008-27-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-32-0x0000000004C70000-0x0000000004C71000-memory.dmp

    Filesize

    4KB

  • memory/3008-48-0x0000000004CD0000-0x0000000004CD1000-memory.dmp

    Filesize

    4KB

  • memory/3008-53-0x0000000077910000-0x0000000077911000-memory.dmp

    Filesize

    4KB

  • memory/3008-52-0x0000000004C90000-0x0000000004C91000-memory.dmp

    Filesize

    4KB

  • memory/3008-51-0x0000000004CA0000-0x0000000004CA1000-memory.dmp

    Filesize

    4KB

  • memory/3008-50-0x00000000746C0000-0x00000000746DA000-memory.dmp

    Filesize

    104KB

  • memory/3008-49-0x0000000004C40000-0x0000000004C41000-memory.dmp

    Filesize

    4KB

  • memory/3008-47-0x0000000004C10000-0x0000000004C11000-memory.dmp

    Filesize

    4KB

  • memory/3008-46-0x0000000004C30000-0x0000000004C31000-memory.dmp

    Filesize

    4KB

  • memory/3008-45-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

    Filesize

    4KB

  • memory/3008-44-0x0000000004C80000-0x0000000004C81000-memory.dmp

    Filesize

    4KB

  • memory/3008-43-0x0000000004F40000-0x0000000004F42000-memory.dmp

    Filesize

    8KB

  • memory/3008-42-0x0000000004D50000-0x0000000004D51000-memory.dmp

    Filesize

    4KB

  • memory/3008-41-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

    Filesize

    4KB

  • memory/3008-40-0x0000000004C50000-0x0000000004C51000-memory.dmp

    Filesize

    4KB

  • memory/3008-39-0x0000000004A70000-0x0000000004A71000-memory.dmp

    Filesize

    4KB

  • memory/3008-38-0x0000000004A90000-0x0000000004A91000-memory.dmp

    Filesize

    4KB

  • memory/3008-37-0x0000000004A60000-0x0000000004A61000-memory.dmp

    Filesize

    4KB

  • memory/3008-36-0x0000000004CF0000-0x0000000004CF1000-memory.dmp

    Filesize

    4KB

  • memory/3008-35-0x0000000004D00000-0x0000000004D01000-memory.dmp

    Filesize

    4KB

  • memory/3008-34-0x0000000004AB0000-0x0000000004AB2000-memory.dmp

    Filesize

    8KB

  • memory/3008-33-0x0000000004AC0000-0x0000000004AC1000-memory.dmp

    Filesize

    4KB

  • memory/3008-31-0x0000000004CB0000-0x0000000004CB1000-memory.dmp

    Filesize

    4KB

  • memory/3008-29-0x0000000004A80000-0x0000000004A81000-memory.dmp

    Filesize

    4KB

  • memory/3008-28-0x0000000004A30000-0x0000000004A31000-memory.dmp

    Filesize

    4KB

  • memory/3008-26-0x00000000746C0000-0x00000000746DA000-memory.dmp

    Filesize

    104KB

  • memory/3008-57-0x0000000004D20000-0x0000000004D21000-memory.dmp

    Filesize

    4KB

  • memory/3008-58-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-59-0x0000000004CC0000-0x0000000004CC1000-memory.dmp

    Filesize

    4KB

  • memory/3008-60-0x0000000004C60000-0x0000000004C61000-memory.dmp

    Filesize

    4KB

  • memory/3008-61-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-62-0x0000000004D40000-0x0000000004D41000-memory.dmp

    Filesize

    4KB

  • memory/3008-64-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-65-0x00000000746C0000-0x00000000746DA000-memory.dmp

    Filesize

    104KB

  • memory/3008-69-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-70-0x00000000746C0000-0x00000000746DA000-memory.dmp

    Filesize

    104KB

  • memory/3008-73-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-74-0x00000000746C0000-0x00000000746DA000-memory.dmp

    Filesize

    104KB

  • memory/3008-78-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-82-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-87-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-120-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-121-0x00000000746C0000-0x00000000746DA000-memory.dmp

    Filesize

    104KB

  • memory/3008-122-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-123-0x00000000746C0000-0x00000000746DA000-memory.dmp

    Filesize

    104KB

  • memory/3008-124-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-126-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-128-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-130-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-132-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-133-0x00000000746C0000-0x00000000746DA000-memory.dmp

    Filesize

    104KB

  • memory/3008-134-0x0000000000400000-0x000000000104C000-memory.dmp

    Filesize

    12.3MB

  • memory/3008-135-0x00000000746C0000-0x00000000746DA000-memory.dmp

    Filesize

    104KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.