Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 06:50
Static task
static1
Behavioral task
behavioral1
Sample
3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe
Resource
win10v2004-20240508-en
General
-
Target
3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe
-
Size
6.0MB
-
MD5
a1d8f470de539890212271e16e9c6aea
-
SHA1
a444d872738218727a46462def9c4cc4215f877f
-
SHA256
3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d
-
SHA512
072d4f9ae20c2a5efb5853ca5d89d206903456acfafd282eacea9ac4c19f62fa25c9f527f6d364330fce4ca36e01eabf4a3cc87043831a416702e1df8e33c1fc
-
SSDEEP
98304:fbdhDqohDS1F+CRcB27OgUWZHw8VQjr+/bJBAUZL1:fbdhDD23a2sWKjr+TJVp
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exepid process 1724 3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe -
Processes:
resource yara_rule behavioral1/memory/1724-1-0x0000000000270000-0x000000000027B000-memory.dmp upx behavioral1/memory/1724-2-0x0000000000270000-0x000000000027B000-memory.dmp upx behavioral1/memory/1724-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-57-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exedescription ioc process File opened for modification \??\PhysicalDrive0 3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F5AC9B1-1B2C-11EF-A9A6-4658C477BD5D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1160 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exeiexplore.exeIEXPLORE.EXEpid process 1724 3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe 1724 3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe 1724 3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe 1160 iexplore.exe 1160 iexplore.exe 1784 IEXPLORE.EXE 1784 IEXPLORE.EXE 1784 IEXPLORE.EXE 1784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exeiexplore.exedescription pid process target process PID 1724 wrote to memory of 1160 1724 3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe iexplore.exe PID 1724 wrote to memory of 1160 1724 3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe iexplore.exe PID 1724 wrote to memory of 1160 1724 3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe iexplore.exe PID 1724 wrote to memory of 1160 1724 3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe iexplore.exe PID 1160 wrote to memory of 1784 1160 iexplore.exe IEXPLORE.EXE PID 1160 wrote to memory of 1784 1160 iexplore.exe IEXPLORE.EXE PID 1160 wrote to memory of 1784 1160 iexplore.exe IEXPLORE.EXE PID 1160 wrote to memory of 1784 1160 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe"C:\Users\Admin\AppData\Local\Temp\3667109defe39b08f999242388520fdca8248ac8a365a4ce480ecec756bcaf2d.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://changkongbao.lanzouq.com/ikW9T1cfeg5e2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1160 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546f18bf04fb9e9385ecb10bd36846275
SHA1c98905571a6d3aa0394c25ebeda87500738515a5
SHA256515344461561ec35dac46b759bd03838ada0abac8bc1980e50c31350946ef775
SHA51289b31785cf0a1342b7d9ac9d957a337cb33e99cfcb212f3587dafe840ec358d81d70ac1c74fad5ba775bf87bcdb4ff0991735fdced01a95d27632a1bb96291be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523b7de0f570062de60457f3afea82ac4
SHA1e21b4f2ebc4ac80f45aaab99d64c80a844ff0d43
SHA2565da57803d51be34e2fc14283cbce6cec8146a68a1af82880a130174ee8adf098
SHA512a3b7e232253f8df4e1af4f6adb2bd27f8259ebb7ebd6c0075f71c0a5703a48fa6eef35637c1a0f4088304c9e5572143f4a6d412f2aa9eba0b0e384459d308818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5158998eb3405f10987956961287fcaef
SHA1eac28df8cefb64d3325a9a8d28599fd6f6c581cd
SHA256faee1a655ab71c5e0ce43eb22cfc340a4940da6ad89fdf4d841fad4eb48a362c
SHA5127ab839d218a181965851dd88dcca78cd3ca14084261d144e2422b5e1904acadc1eb63d8324da9fb1674f1b68ff625d553bc9457b7d226b605b57150ded471541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580abc3699a6fc4edb8a76b35fd2346c7
SHA1fbc733cb90b47cdef6241920d50911da14f30f2b
SHA25645666e2f5e44653b0dd659251cbe00c3eedcbec1cb30312ae286c97d40f5cedc
SHA5121a66880e90fee4594317c5b8f3b29f642e5e7caf2f24f557cc6349ac0511e031af95604bc218d61fdada6b971217c116e38d29886057c44a319731b1152feb04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e14987f50181c0b70fdcbd2f6ccd641
SHA1f5726a6d96cf9d69a2ca113c55b3f1acfe8c971d
SHA2569e3e9a63cfc34d87eef81f3de82a5b28bb3a14387a56e626bb6d3ae250527060
SHA512408deae134081b66a6db93bcdb8394e91d36bd733f9b8fe85a1bc3de45da990656a0f389e1b0037892cbf2849b149d45a02f91e85e13c2d7c13f515896ebf72a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548803e87f9d70e6ed804a5bcf09bb4d9
SHA1844079a67afd2ad8e005e3c815dd1287640dda19
SHA25689776717fb27b5903f65e664ed2bf6de36fdcf43f22db7b23202084b47da3f8b
SHA512cf45369674d3c6342e4009b171ba4bbe508dd934fc35a2a52701bd620e1a1d0c5e2e0a09fff36e60278e83ff2ed31b9aa8ff99d571469626423959993f424def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6e3f2e803fae4cf37632229c30ecd66
SHA12ded794ceaabbf2419808ff754f555b0c586bfa4
SHA2568dc58a99cc27a83fdc49c907fb384c47fdaf736dbf530a92b7192b2a57469428
SHA512010ad49ef8b24230b51f062992ca28b9ae399da78b6ffc86012c5d193f019e8152e94d82574c8017d99b11b5f24dda7d278f1ee8cdc9acc19471cd77d25a9a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b1008bce10f47d9b70ca40eefbfdac1
SHA118c2f8172dede925c1daafe301facb3f687b75d9
SHA25698ad9b623c669da233dbf8882a3e2789b2f10dd1aff95a52f0f844c3b183c8c8
SHA512708127789892cc39d8d721d471e499ab0c9800534d25937e7225e6e01c8893dd022ec8088a5ca443a7aaa408fd922a5b787758a962f3af486114949478fa3bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e3cb89a6f30ed2ad2264f717035437a
SHA168863034df27b2905509a0acea96207247a283d9
SHA2562ba93867f55beb4e2e36a1e84aa4c19d2310923a26dc912f3b16c7afdb6116ca
SHA5124b3ad3635e246f1a82bb1c0d4b94e7f3b3beb75a850c2d3fd6dac93afa1f49c9257b199393ba57420fd45ef33ceea4e52bf7a69f5d4ee380d696854bfdfd0ca2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
10KB
MD5842d9e10867153ad73a1a80d79afef13
SHA133a49d893273182e8aba6e9531c3077d4ab86516
SHA2562823197bddf0203ea011003a4e70f2687da234a3388b5090a76da2c2562d33e4
SHA512e6e10f63c7d3e65358bd6e66a7328f7d06d096b2ed936cd4504cfb8c6b5f4081dd55884bb915191156965b0eb9b3fda6a97b5b1a1eee45d59a41a4e375d1e518
-
Filesize
8KB
MD502e3c0364cd93fd56fce9c2ae885339b
SHA1ffee74b2301ef0c8e88dfa37c1d180d3eb952ec8
SHA25650fd9ee309fd11fdd83f6cfe01ce6efeca5d8dd36f2cf075be2bf1bc7fa89095
SHA51258f892ade02def2692de3dc09d61161db368cbd8b1491fccc4c6ac04d70d3f971d7306fe81136437c2594750cce65b04e3e510107129f6296e722035f85f6970
-
Filesize
189B
MD5322f59ce015ff2f1f00ecbe4fdfce380
SHA1eb4756a5bb023f6d1feacdbeac6e94013e15d5b0
SHA256c96ef901d8f23cb7626ef980c4cf5bece7aafeef9b2b8b28829d3a11a51562c1
SHA5122610ce1c0a55da67faa9ddaca26529a87bf5ebc6706621682d54024fa887ca9cd54cdc5b854f8b79ea99b02a5277d6931f633fa876107d9ec1bf503bee23a02c
-
Filesize
173B
MD5162adf9cb5056d73c210b636faffde31
SHA1db2804203429c6ab228ddf982e49fcc10709acc4
SHA2564879c5f2c71d2db0e7ffecb9a08c93955ba350ebd780d549146178d213935f59
SHA5122e6918e8e794f20bde533bbd456aa61c440b70b14706ea278b23a242910c600dd4222d298cd44504cd9f9aa2c0731162d0dc62656e397cb9257d6e85eddf574f
-
Filesize
246B
MD5b06ddcfdb64cc28ca0a0ef609de5f05f
SHA1bd95d141935795e249d2ab00824839fd42c8f505
SHA256da0a5d79dc6a120811b556885b704f9fd158b1f19dd5a9c595719feb56065f00
SHA512a1dd3cc527ce6a6c4b0ea2c369d4370f6f1bf332c9255e1a8eebfd5986c133dacc2e6c6a55071e5bcf4724f37ff2920f2e17567ca32571e664b458e526be72b5
-
Filesize
260B
MD5924bf7a4ce305dad87743ba3c5773aa9
SHA112d0fddb472394b23e5176ab4ede38974e723b81
SHA25601faf5e88442653bf38adc145d517f44d3495398e0aa666c7486b7030c126cbd
SHA5122380c957717d3bc97ae2de96aba9cd3b50a1774eb96dc47840add1b12ee13485ee6cc6c4d30953b8f42d32ae3b02657966229fcbe58a60843df0cbd6170eb44e
-
Filesize
1.5MB
MD5ef48d7cc52338513cc0ce843c5e3916b
SHA120965d86b7b358edf8b5d819302fa7e0e6159c18
SHA256835bfef980ad0cedf10d8ade0cf5671d9f56062f2b22d0a0547b07772ceb25a8
SHA512fd4602bd487eaad5febb5b3e9d8fe75f4190d1e44e538e7ae2d2129087f35b72b254c85d7335a81854aa2bdb4f0f2fa22e02a892ee23ac57b78cdd03a79259b9