Resubmissions

03-04-2024 19:54

240403-ymwwtabd88 10

29-03-2024 17:27

240329-v1sjrsde91 10

Analysis

  • max time kernel
    151s
  • max time network
    219s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2024 19:54

General

  • Target

    Inchr_StExta_Itst_v.3.1/Mono/360TS_Setup_Mini.exe

  • Size

    1.4MB

  • MD5

    31fee2c73b8d2a8ec979775cd5f5ced7

  • SHA1

    39182a68bc0c1c07d3ddc47cd69fe3692dbac834

  • SHA256

    d26a7f2d4f3521827201e6cdcd296f132c7d18c3a1ce70c24b423300cff326fe

  • SHA512

    db51b602a8675641bc3a0a980a197243787ed12f5e0619cb1d390c91193d7e3447e3e86e2321c3ea273c6732b356003a249241d7d8a5699931810e5a35d5c650

  • SSDEEP

    24576:kL/7n6lbcC8oblv1zj1SqdAGFQZIxvC45UJoe1Z:E6+C8o5tzjYq+ZIxL5UJoeL

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Inchr_StExta_Itst_v.3.1\Mono\360TS_Setup_Mini.exe
    "C:\Users\Admin\AppData\Local\Temp\Inchr_StExta_Itst_v.3.1\Mono\360TS_Setup_Mini.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Users\Admin\AppData\Local\Temp\Inchr_StExta_Itst_v.3.1\Mono\360TS_Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Inchr_StExta_Itst_v.3.1\Mono\360TS_Setup.exe" /c:101 /pmode:2
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Program Files (x86)\1712174453_0\360TS_Setup.exe
        "C:\Program Files (x86)\1712174453_0\360TS_Setup.exe" /c:101 /pmode:2 /TSinstall
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of SetWindowsHookEx
        PID:1896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    654B

    MD5

    5e9755b8049d8e9e66900c4bc5a11c0d

    SHA1

    eee4b41538cdc01693bd221ddeeeebb468d75446

    SHA256

    8cfba282d2f5d29b5d778733c7ca581643f3f76e8fdc99423ea3f131685c2026

    SHA512

    2da027d9e55466776ff729c827cd23453dffe9dcdef5310442574f7004fa780bdcd9db57eda3c7fae6aaeb2c54cc07a312db028027c1645c5fb313d70049edcc

  • C:\Users\Admin\AppData\Local\Temp\[email protected]\setup.ini

    Filesize

    830B

    MD5

    db1a3788715c33502ded8c5f96861c86

    SHA1

    ea57e8ba3165bb8d118516ef9857021fae023fc3

    SHA256

    30cf49d68525c08c4bef10a1eb99b27eeabca82644dab552496c55a7c4a6b8a1

    SHA512

    cfd01c9755d36db005a00ccae93348b4bfedf1c56315c519f415892df8f5bb84fff00c9c2311f1aed1ae3eed3f0dbb83d4ce13d32436412b24f62cfd277acfa4

  • C:\Users\Admin\AppData\Local\Temp\1712174452_00000000_base\360base.dll

    Filesize

    1.0MB

    MD5

    b192f34d99421dc3207f2328ffe62bd0

    SHA1

    e4bbbba20d05515678922371ea787b39f064cd2c

    SHA256

    58f13d919f44d194827b609b6b267246abc47134bb202472c0dfe033b9d7ed73

    SHA512

    00d4c7a0a0097eb4b31a71a0eaf6ff0d44619f77a335c75688565e34e6d7f4fb6c258917457d560c6b0a5077603845ce012e01d9862e87fb5327d7f8da970f95

  • C:\Users\Admin\AppData\Local\Temp\Inchr_StExta_Itst_v.3.1\Mono\360TS_Setup.exe

    Filesize

    98.8MB

    MD5

    258fdacc98e9cbf7a2fae9811d880dbf

    SHA1

    610963d5e029d6e41fc03b0788a16e6cc23b844e

    SHA256

    2659348e73857d9e0945bb4e63e410aeb809ec34f274baafa1dbe17d54339ea7

    SHA512

    737fcb9caaa19a02d43d255fdbac2cabeebf410dfa8d20bf565e3012f1840a713cde96379a1515f0f4a866c4048e0dc90bc16a04fe36ebc0dce4d755b40b23a4

  • C:\Users\Admin\AppData\Local\Temp\{27B56281-DC6A-453f-9772-10810545065D}.tmp\360P2SP.dll

    Filesize

    824KB

    MD5

    fc1796add9491ee757e74e65cedd6ae7

    SHA1

    603e87ab8cb45f62ecc7a9ef52d5dedd261ea812

    SHA256

    bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60

    SHA512

    8fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d

  • C:\Users\Admin\AppData\Local\Temp\{C6209DA2-B3B5-419d-B712-291A509B8A6A}.tmp

    Filesize

    3KB

    MD5

    b1ddd3b1895d9a3013b843b3702ac2bd

    SHA1

    71349f5c577a3ae8acb5fbce27b18a203bf04ede

    SHA256

    46cda5ad256bf373f5ed0b2a20efa5275c1ffd96864c33f3727e76a3973f4b3c

    SHA512

    93e6c10c4a8465bc2e58f4c7eb300860186ddc5734599bcdad130ff9c8fd324443045eac54bbc667b058ac1fa271e5b7645320c6e3fc2f28cc5f824096830de1

  • memory/1472-13-0x0000000003BD0000-0x0000000003BD1000-memory.dmp

    Filesize

    4KB

  • memory/1472-50-0x0000000003BD0000-0x0000000003BD1000-memory.dmp

    Filesize

    4KB