Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2024, 07:43

General

  • Target

    详情系统.exe

  • Size

    2.5MB

  • MD5

    cac20a183ef9a5b197b35fdb2909eff9

  • SHA1

    211c850a88b18a012f36e2917cee758e26b88422

  • SHA256

    845a305853710ebae7daeb42a7bd3638af0b0d62ed6b28cab345464e07ae6208

  • SHA512

    0315f0b8d0838b9e3e572e63f4a1bccb35fd5c22f9824124661179b9c6e72be5bfacc0f410033e025e23c840add866c22d8fecf870bb7dcb035b420ffc768c77

  • SSDEEP

    49152:YBkKZL6TWr4ukkiJpzqk9vMF2MFpuEAAWiQfIJ7DI:kkK3cukouE3UIt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\详情系统.exe
    "C:\Users\Admin\AppData\Local\Temp\详情系统.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\ProgramData\开机广告屏蔽.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:400
      • C:\Windows\system32\tasklist.exe
        tasklist /FI "IMAGENAME eq v8_context_snapshot.exe"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:2624
      • C:\Windows\system32\find.exe
        find /I /N "v8_context_snapshot.exe"
        3⤵
          PID:4412
        • C:\Windows\system32\cmd.exe
          cmd /C C:\ProgramData\v8_context_snapshot.exe
          3⤵
            PID:3624
          • C:\Windows\system32\PING.EXE
            ping -n 31 127.0.0.1
            3⤵
            • Runs ping.exe
            PID:5044
          • C:\Windows\system32\tasklist.exe
            tasklist /FI "IMAGENAME eq v8_context_snapshot.exe"
            3⤵
            • Enumerates processes with tasklist
            PID:1884
          • C:\Windows\system32\find.exe
            find /I /N "v8_context_snapshot.exe"
            3⤵
              PID:3364
            • C:\Windows\system32\PING.EXE
              ping -n 31 127.0.0.1
              3⤵
              • Runs ping.exe
              PID:1968
            • C:\Windows\system32\tasklist.exe
              tasklist /FI "IMAGENAME eq v8_context_snapshot.exe"
              3⤵
              • Enumerates processes with tasklist
              PID:2396
            • C:\Windows\system32\find.exe
              find /I /N "v8_context_snapshot.exe"
              3⤵
                PID:936
              • C:\Windows\system32\PING.EXE
                ping -n 31 127.0.0.1
                3⤵
                • Runs ping.exe
                PID:2056
              • C:\Windows\system32\tasklist.exe
                tasklist /FI "IMAGENAME eq v8_context_snapshot.exe"
                3⤵
                • Enumerates processes with tasklist
                PID:4224
              • C:\Windows\system32\find.exe
                find /I /N "v8_context_snapshot.exe"
                3⤵
                  PID:4044
                • C:\Windows\system32\PING.EXE
                  ping -n 31 127.0.0.1
                  3⤵
                  • Runs ping.exe
                  PID:2532
                • C:\Windows\system32\tasklist.exe
                  tasklist /FI "IMAGENAME eq v8_context_snapshot.exe"
                  3⤵
                  • Enumerates processes with tasklist
                  PID:936
                • C:\Windows\system32\find.exe
                  find /I /N "v8_context_snapshot.exe"
                  3⤵
                    PID:228
                  • C:\Windows\system32\PING.EXE
                    ping -n 31 127.0.0.1
                    3⤵
                    • Runs ping.exe
                    PID:1812
                • C:\ProgramData\v8_context_snapshot.exe
                  "C:\ProgramData\v8_context_snapshot.exe"
                  2⤵
                  • Executes dropped EXE
                  • Enumerates connected drives
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:4740

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\v8_context_snapshot.exe

                Filesize

                2.5MB

                MD5

                cac20a183ef9a5b197b35fdb2909eff9

                SHA1

                211c850a88b18a012f36e2917cee758e26b88422

                SHA256

                845a305853710ebae7daeb42a7bd3638af0b0d62ed6b28cab345464e07ae6208

                SHA512

                0315f0b8d0838b9e3e572e63f4a1bccb35fd5c22f9824124661179b9c6e72be5bfacc0f410033e025e23c840add866c22d8fecf870bb7dcb035b420ffc768c77

              • C:\ProgramData\开机广告屏蔽.bat

                Filesize

                327B

                MD5

                9da00aa36143a44d51d004990538ebcf

                SHA1

                41557831264f7e2abe0ba0d42e43462ae8f54d2b

                SHA256

                02036c09d4ed7e889ec5111627868b37a0d144b5975b622de131437663b66358

                SHA512

                440201d505863b3145d7ada1d50e3d355e88000f62d4717d1368e30a2dfdfd8d18ef8b3ea19f62a8e3497a5082e55048bd29eda9ef7f271d74b2012dda1be818

              • memory/1812-1-0x0000000003630000-0x000000000368B000-memory.dmp

                Filesize

                364KB

              • memory/1812-0-0x0000000003800000-0x0000000003862000-memory.dmp

                Filesize

                392KB

              • memory/1812-3-0x0000000003800000-0x0000000003862000-memory.dmp

                Filesize

                392KB

              • memory/1812-10-0x0000000003800000-0x0000000003862000-memory.dmp

                Filesize

                392KB

              • memory/1812-2-0x0000000003800000-0x0000000003862000-memory.dmp

                Filesize

                392KB

              • memory/4740-15-0x0000000002E60000-0x0000000002EC2000-memory.dmp

                Filesize

                392KB

              • memory/4740-16-0x0000000002E60000-0x0000000002EC2000-memory.dmp

                Filesize

                392KB

              • memory/4740-18-0x0000000002E60000-0x0000000002EC2000-memory.dmp

                Filesize

                392KB

              • memory/4740-19-0x0000000002E60000-0x0000000002EC2000-memory.dmp

                Filesize

                392KB

              • memory/4740-21-0x0000000002E60000-0x0000000002EC2000-memory.dmp

                Filesize

                392KB

              • memory/4740-20-0x0000000002E60000-0x0000000002EC2000-memory.dmp

                Filesize

                392KB

              • memory/4740-29-0x0000000002E60000-0x0000000002EC2000-memory.dmp

                Filesize

                392KB