Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 07:24

General

  • Target

    CacheWechatBackup/Plugins/WechatBackup/ConnectService.exe

  • Size

    4.5MB

  • MD5

    bc1d2ace3221b777ce8ce1bce7e45bb5

  • SHA1

    b5d74e4c5d050c3015b15db33f14338f8b3b3b92

  • SHA256

    229c60f01ddfc262e0a18e5658ea67e0f0aac1583990009771a6ec63d59b5ae7

  • SHA512

    91c01f53e46ae0741aaf9ae181ce3bfe0714d01d4aa83d3afd3e7dcac97616e682743af26490aec537f19675e839ccd843fd3445a8db29fb52c13e249ec83cdb

  • SSDEEP

    98304:2Hy0XTpSonO9/SBrFFjMoYsRf3Ewex0nT7s9t+sqX9Gwpt:PkN5MQBiTSswex+HsqtB

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 13 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 42 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CacheWechatBackup\Plugins\WechatBackup\ConnectService.exe
    "C:\Users\Admin\AppData\Local\Temp\CacheWechatBackup\Plugins\WechatBackup\ConnectService.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278\AndroidDaemon.exe
      "C:\Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278\AndroidDaemon.exe" -ku
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2468
    • C:\Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278\AndroidDaemon.exe
      "C:\Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278\AndroidDaemon.exe" -is
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2680
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\system32\netsh.exe" firewall set allowedprogram "C:\Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278" "Tencent Phone Manager" enable
      2⤵
      • Modifies Windows Firewall
      PID:2220
  • C:\Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278\AndroidDaemon.exe
    "C:\Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278\AndroidDaemon.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278\Daemon.dll

    Filesize

    102KB

    MD5

    ab70620c8e5eab8e686276903eec57f0

    SHA1

    94fb3da12d63e3815f21534bc19de05349fbf6b1

    SHA256

    70d72e8ede2fb94c4dcce569d8534d97db149db1770289bc1fa8311a85617634

    SHA512

    cd1234665e9a1074531134da9a7f8a94ba7ab5ecf93c6bf523a4baf8d22c9aa3ee3d5d48f6729606b7397b7e37ed5bbfaea81e3da2e4e6cf9db2edaadce94980

  • C:\Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278\Log4cplus.dll

    Filesize

    281KB

    MD5

    009703ca09639d024f8730f148d5621d

    SHA1

    a75f6db62877c2da94422df0327b2d45068278e3

    SHA256

    3ebbf6cd83b36648f95487a815b0244cd8859109d45d609d9977783dfeba4dc6

    SHA512

    3ca28f2844a3e6f4f4cb4d4baa2e67be91bd957f2e6ef1bb638cccadf86abba8012a81b9197e74d4b28359ee610249bd54a5990e4de31c5a600795aabc2fb05d

  • C:\Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278\MSVCP100.dll

    Filesize

    411KB

    MD5

    bc83108b18756547013ed443b8cdb31b

    SHA1

    79bcaad3714433e01c7f153b05b781f8d7cb318d

    SHA256

    b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671

    SHA512

    6e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011

  • C:\Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278\MSVCR100.dll

    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • C:\Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278\QQPMIpc.dll

    Filesize

    71KB

    MD5

    6e093264fe98f5e392f96919e4be8a00

    SHA1

    1818405f2d34ae572efb25f6dfb71549687c714d

    SHA256

    0348e36008f2039f50c98640d44e8146c90f8ea650d3bce2034474c2cfbe8fe0

    SHA512

    b63ac6d621d35082651f65ddb1481252c022eccf9299c7f593dcd40955d1b09aa5d75a27d8cc3c0fa4d294a0934913ed3dce54385b9d8db191dd5e4a7383deb8

  • C:\Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278\main.properties

    Filesize

    2KB

    MD5

    2ee673e3991c6198928606d8aeebc712

    SHA1

    67a1857feef3fbdd529fd22f77c90b9103c85e5f

    SHA256

    9df50e17b468de13ee50e0ebdf38fa7a6939dbbcb204c166662be6ba6a727087

    SHA512

    09fcfa27fd0134c875101dfb34a7982eb44a1daaadfa1e3078d5b7518aea55886abae93fb213ff9fe4742509f429647c2ce028d08dd510f3a0c8324e65d51119

  • \Users\Admin\AppData\Local\Temp\nsd1D81.tmp\NSISCommon.dll

    Filesize

    95KB

    MD5

    143328e7a59de3196e5a9b58ff72d98b

    SHA1

    61a8ffacfd986cc2b841af45582fe895b9096d52

    SHA256

    8fb567f263e976c7eb77c549f6dfb30ceed708f0408c5ea655e8dc87ceecb302

    SHA512

    75f527b8a8a668d018ee83bb0317d78a86ae9bdee0843540d115b217c23b725e6e00c999a09a92c49c0cff71fd42333f132e00d516a77d080292d1581f27dca4

  • \Users\Admin\AppData\Roaming\Tencent\AndroidServer\1.0.0.278\AndroidDaemon.exe

    Filesize

    35KB

    MD5

    8458b23988c4d596df0fc723a060e2c9

    SHA1

    aa36141b44816d89b7e62f3c1474148baa3228b6

    SHA256

    b7b7dc6ea35bbcafe96232905f3a14cea34825231e3389b958aa7836cb90b325

    SHA512

    ffeffb148ec70c8dc8df64b7a4c0f403f5c54f9b43061037fe712dd9b00b7d6e856551b759480439d0659433d54ac7b26143b4ad01c4d8c7bb2553fe4ed0d376