Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 07:43

General

  • Target

    详情系统.exe

  • Size

    2.5MB

  • MD5

    cac20a183ef9a5b197b35fdb2909eff9

  • SHA1

    211c850a88b18a012f36e2917cee758e26b88422

  • SHA256

    845a305853710ebae7daeb42a7bd3638af0b0d62ed6b28cab345464e07ae6208

  • SHA512

    0315f0b8d0838b9e3e572e63f4a1bccb35fd5c22f9824124661179b9c6e72be5bfacc0f410033e025e23c840add866c22d8fecf870bb7dcb035b420ffc768c77

  • SSDEEP

    49152:YBkKZL6TWr4ukkiJpzqk9vMF2MFpuEAAWiQfIJ7DI:kkK3cukouE3UIt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\详情系统.exe
    "C:\Users\Admin\AppData\Local\Temp\详情系统.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\system32\cmd.exe
      cmd /c C:\ProgramData\开机广告屏蔽.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Windows\system32\tasklist.exe
        tasklist /FI "IMAGENAME eq v8_context_snapshot.exe"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
      • C:\Windows\system32\find.exe
        find /I /N "v8_context_snapshot.exe"
        3⤵
          PID:2780
        • C:\Windows\system32\cmd.exe
          cmd /C C:\ProgramData\v8_context_snapshot.exe
          3⤵
            PID:2768
          • C:\Windows\system32\PING.EXE
            ping -n 31 127.0.0.1
            3⤵
            • Runs ping.exe
            PID:2708
          • C:\Windows\system32\tasklist.exe
            tasklist /FI "IMAGENAME eq v8_context_snapshot.exe"
            3⤵
            • Enumerates processes with tasklist
            PID:1628
          • C:\Windows\system32\find.exe
            find /I /N "v8_context_snapshot.exe"
            3⤵
              PID:2136
            • C:\Windows\system32\PING.EXE
              ping -n 31 127.0.0.1
              3⤵
              • Runs ping.exe
              PID:1636
            • C:\Windows\system32\tasklist.exe
              tasklist /FI "IMAGENAME eq v8_context_snapshot.exe"
              3⤵
              • Enumerates processes with tasklist
              PID:1460
            • C:\Windows\system32\find.exe
              find /I /N "v8_context_snapshot.exe"
              3⤵
                PID:1156
              • C:\Windows\system32\PING.EXE
                ping -n 31 127.0.0.1
                3⤵
                • Runs ping.exe
                PID:1988
              • C:\Windows\system32\tasklist.exe
                tasklist /FI "IMAGENAME eq v8_context_snapshot.exe"
                3⤵
                • Enumerates processes with tasklist
                PID:2216
              • C:\Windows\system32\find.exe
                find /I /N "v8_context_snapshot.exe"
                3⤵
                  PID:2264
                • C:\Windows\system32\PING.EXE
                  ping -n 31 127.0.0.1
                  3⤵
                  • Runs ping.exe
                  PID:2012
                • C:\Windows\system32\tasklist.exe
                  tasklist /FI "IMAGENAME eq v8_context_snapshot.exe"
                  3⤵
                  • Enumerates processes with tasklist
                  PID:488
                • C:\Windows\system32\find.exe
                  find /I /N "v8_context_snapshot.exe"
                  3⤵
                    PID:752
                  • C:\Windows\system32\PING.EXE
                    ping -n 31 127.0.0.1
                    3⤵
                    • Runs ping.exe
                    PID:1416
                • C:\ProgramData\v8_context_snapshot.exe
                  "C:\ProgramData\v8_context_snapshot.exe"
                  2⤵
                  • Executes dropped EXE
                  • Enumerates connected drives
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:2436

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\开机广告屏蔽.bat

                Filesize

                327B

                MD5

                9da00aa36143a44d51d004990538ebcf

                SHA1

                41557831264f7e2abe0ba0d42e43462ae8f54d2b

                SHA256

                02036c09d4ed7e889ec5111627868b37a0d144b5975b622de131437663b66358

                SHA512

                440201d505863b3145d7ada1d50e3d355e88000f62d4717d1368e30a2dfdfd8d18ef8b3ea19f62a8e3497a5082e55048bd29eda9ef7f271d74b2012dda1be818

              • \ProgramData\v8_context_snapshot.exe

                Filesize

                2.5MB

                MD5

                cac20a183ef9a5b197b35fdb2909eff9

                SHA1

                211c850a88b18a012f36e2917cee758e26b88422

                SHA256

                845a305853710ebae7daeb42a7bd3638af0b0d62ed6b28cab345464e07ae6208

                SHA512

                0315f0b8d0838b9e3e572e63f4a1bccb35fd5c22f9824124661179b9c6e72be5bfacc0f410033e025e23c840add866c22d8fecf870bb7dcb035b420ffc768c77

              • memory/2292-17-0x0000000002560000-0x00000000025C2000-memory.dmp

                Filesize

                392KB

              • memory/2292-3-0x0000000002560000-0x00000000025C2000-memory.dmp

                Filesize

                392KB

              • memory/2292-4-0x0000000002560000-0x00000000025C2000-memory.dmp

                Filesize

                392KB

              • memory/2292-1-0x00000000020C0000-0x000000000211B000-memory.dmp

                Filesize

                364KB

              • memory/2292-0-0x0000000002560000-0x00000000025C2000-memory.dmp

                Filesize

                392KB

              • memory/2436-22-0x00000000023D0000-0x0000000002432000-memory.dmp

                Filesize

                392KB

              • memory/2436-23-0x00000000023D0000-0x0000000002432000-memory.dmp

                Filesize

                392KB

              • memory/2436-24-0x00000000023D0000-0x0000000002432000-memory.dmp

                Filesize

                392KB

              • memory/2436-25-0x00000000023D0000-0x0000000002432000-memory.dmp

                Filesize

                392KB

              • memory/2436-27-0x00000000023D0000-0x0000000002432000-memory.dmp

                Filesize

                392KB

              • memory/2436-26-0x00000000023D0000-0x0000000002432000-memory.dmp

                Filesize

                392KB

              • memory/2436-44-0x00000000023D0000-0x0000000002432000-memory.dmp

                Filesize

                392KB