Overview
overview
7Static
static
7AVI高清�....0.exe
windows7-x64
7AVI高清�....0.exe
windows10-2004-x64
7AVI高清�...��.exe
windows7-x64
4AVI高清�...��.exe
windows10-2004-x64
4AVI高清�...V4.exe
windows7-x64
7AVI高清�...V4.exe
windows10-2004-x64
7下载说明.htm
windows7-x64
1下载说明.htm
windows10-2004-x64
1使用帮�...�).url
windows7-x64
1使用帮�...�).url
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 01:13
Behavioral task
behavioral1
Sample
AVI高清模板加载工具V5.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
AVI高清模板加载工具V5.0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
AVI高清模板加载工具V6.0【普及版】.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
AVI高清模板加载工具V6.0【普及版】.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
AVI高清模板快速加载工具V4.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
AVI高清模板快速加载工具V4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
下载说明.htm
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
下载说明.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
使用帮助(河东下载站).url
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
使用帮助(河东下载站).url
Resource
win10v2004-20240508-en
General
-
Target
AVI高清模板加载工具V5.0.exe
-
Size
1.6MB
-
MD5
039f0976251dd10079e0d08b9bd2b818
-
SHA1
545e2ba97edd6a477b850c0c4659960d67a10fda
-
SHA256
6a4cc43c502d6d7bfb6c5ff107163ef3ba45d24f7fc6a8717cdffdb4843b6538
-
SHA512
2e75b8ea304885a8db2aaeb8d8f95fe4fc5430b744d339dc0e4b3e80b8e0d270191ff9573972adf819c6e4f5efbd3ee7cc108a6bd4df322c60312197111b1473
-
SSDEEP
49152:GfKtqFpiuuaXLeOKTZ5mdLKkMp8o7gXNcP45+Cc:GfKtqFzub4TXo7gI45+X
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2772-0-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-7-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-73-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2772-72-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-78-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-80-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-82-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-84-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-86-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-88-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-90-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-92-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-94-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-96-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-98-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-100-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-102-0x0000000000400000-0x00000000004D0000-memory.dmp upx behavioral1/memory/2904-104-0x0000000000400000-0x00000000004D0000-memory.dmp upx -
AutoIT Executable 16 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2904-73-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2772-72-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-78-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-80-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-82-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-84-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-86-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-88-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-90-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-92-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-94-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-96-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-98-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-100-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-102-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe behavioral1/memory/2904-104-0x0000000000400000-0x00000000004D0000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\0909.jpg AVI高清模板加载工具V5.0.exe File opened for modification C:\Windows\0909.jpg AVI高清模板加载工具V5.0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" AVIV50~1.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\NumberOfSubdomains = "1" AVIV50~1.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com AVIV50~1.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage AVIV50~1.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU AVIV50~1.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" AVIV50~1.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" AVIV50~1.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" AVIV50~1.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main AVIV50~1.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 AVIV50~1.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e AVIV50~1.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 AVIV50~1.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 AVIV50~1.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2772 AVI高清模板加载工具V5.0.exe 2904 AVIV50~1.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2904 AVIV50~1.EXE 2904 AVIV50~1.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2904 2772 AVI高清模板加载工具V5.0.exe 28 PID 2772 wrote to memory of 2904 2772 AVI高清模板加载工具V5.0.exe 28 PID 2772 wrote to memory of 2904 2772 AVI高清模板加载工具V5.0.exe 28 PID 2772 wrote to memory of 2904 2772 AVI高清模板加载工具V5.0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\AVI高清模板加载工具V5.0.exe"C:\Users\Admin\AppData\Local\Temp\AVI高清模板加载工具V5.0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\AVIV50~1.EXEC:\Users\Admin\AppData\Local\Temp\AVIV50~1.EXE2⤵
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a