Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 14:19

General

  • Target

    c66e725556cfc9f8d6a3fad93ad77e918dc9844aa410e6c8687702d7adf1ed58.exe

  • Size

    6.0MB

  • MD5

    17c0e13ed0bf5526290494824aa7a0d5

  • SHA1

    f217de8b54a2d6ebd079fa86f7e4a2a6709760e6

  • SHA256

    c66e725556cfc9f8d6a3fad93ad77e918dc9844aa410e6c8687702d7adf1ed58

  • SHA512

    cf8127f9710055ef2932d48226047df63189bfcb3908619a706398c83f949b7d352235cc862d495e426980fe4d8bf34bdba5586e501cca5dc154a46f80c96e10

  • SSDEEP

    98304:fbdhDqohDS1F+CRcB27OgUWZHw8VQjr+/bJBAUZLH:fbdhDD23a2sWKjr+TJVr

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c66e725556cfc9f8d6a3fad93ad77e918dc9844aa410e6c8687702d7adf1ed58.exe
    "C:\Users\Admin\AppData\Local\Temp\c66e725556cfc9f8d6a3fad93ad77e918dc9844aa410e6c8687702d7adf1ed58.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://changkongbao.lanzouq.com/ikW9T1cfeg5e
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1492
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:556

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c6977c645e91f992a3527d1b35ab7990

    SHA1

    5e2a031a77775036716cc5706ee425966e9ff1ee

    SHA256

    9a9bf879a27d5be14aac113c833c2f895c83c8dfdbad9459546020ce0ec5e4da

    SHA512

    c9e16368a5a434abbcc94f58475e4078b98b4319403deac33342d485f78c4a4e076fd29abf00b5f7248c6b16e68985faa5625bc639d48300e5918fd744b4ff36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    98074591ba3b02f1de22659d39fb8848

    SHA1

    6b3322d966ab0d1ef7de3d97b165dde823a6cd17

    SHA256

    d4980296379b6044bd383cb2cf4dec8b4508bca724b62b794ca7b370078d935e

    SHA512

    96aebbea95128815ffef93c0ab1f0f650a61d9ecbc60c6ab0b305957ce73c89d8f91f45ac64a49801c1351707da0f4f7cc46e2c892fc70120e6410dc1414f0f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    59cecfe697d46ed1fcfb949b79e7b51d

    SHA1

    3f93a62db0f3938d31f870b411f3fe8716cce4e0

    SHA256

    76af8bb2e072cb60dbf02e283b243cb0f15c19e80ac639337aeefdc9dff87b5a

    SHA512

    a1552acab6d38950666c8e50f7e92201d8a606cf32604fa7403cb185a28370f9cae3e29ec0a600748ded02cab2610d24858de7f33e1bf38b252c7c7cffe5346a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e2f5d5dda20104f5ab2e1672c336b8f9

    SHA1

    0da91d3a911c478ed28c6328d4a0d69ffc71a739

    SHA256

    67d7e6cf3ef6d9c26ddbff5da0c651387aad14e49e27662580a00ce52ad19936

    SHA512

    d5cccfcbeed7380c9ec42edb97cadbe48d67fb71dc08454371eeb06f78c02c886d506e76866f3bc7b2131cc758b5805b18895d5cd12d2a809481e1f1b76192ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    fc0662fb923f0bc5e92eb1f9ff3a9775

    SHA1

    e6a22828c42aa41fd81ded4b1eb9fdc49c17abd1

    SHA256

    90966838ae8ee83f6d5358c09531a49edb9e634dc4e5c335a6617c461c062c9c

    SHA512

    4ae57b7b64243cd75234fe95b405f1380940edf3c18dac49a6dbe167b27b8cf5a9f75b34572b48484f53e72a17c82be97c526033c3dfcfffab3058892cd7f482

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    11e68bc2fd0c35203795269cbd6a068b

    SHA1

    87bc5e6d64206c9294e73dbf36ce67eb27dfab3f

    SHA256

    c1e7b9dcbf1caed66354ffdacacd52ee11ffde8dcf184155d3f3d4b3cb88ae62

    SHA512

    c257fd3a83868790521f29e8847fc29cab7d60a2b464d19191e6e71864688d49363cc02df49833b046a04dff1989060792eb2a6383a9f39040de3dcb6fd84b28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2a9d2b3416d3164ddb6f45a4cb2e53be

    SHA1

    117e26b7ed011511e51e24cb6f01add76775a2cf

    SHA256

    79d7a88dfe0724b5e68c45d6021a5eefedf9d8ee0a221a87009bb4250cd1f9cb

    SHA512

    e6b298cf12a3e07b6c6ad1e1961172436da44e1294ffef66a51a119622a059adf30036f06ecd6e15e2ef00dc736367dbbc2df336fedbb51625c51eb383306e05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    da9e747856792b5c17892498b4b9dcc4

    SHA1

    ec3713b4f4a854ad03ce660af6b498a47a1e0745

    SHA256

    fcf86d6d09691d7d9175233cf0ba3370be3d17987817e9499b35238e9c1ef0be

    SHA512

    0b04ef6dfa985da1eed9f2a651fa415221be56caea8830c956ae9debdc90ac06830751d3dd48e46bd6d9bcb777cc607c2e2cb21bc9a39c273ba75eb7f8998e67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    75a434c33c2d8da84e56a8ec5bb4c4bb

    SHA1

    2e061c1f7734618a990d1971b2b6d599e603a18b

    SHA256

    22e5b0c3356cf7330b2db6fa682e3b8117f7567e16019fee5e7fcc229bd12a48

    SHA512

    5c74b9fca0312d4d183a040d985c5ef13e68d97bb0826cbb81199d4684337c15c65de1659411b9fb749de3d8c08b8b05da26e57c95904d2f6e88c3dd6a5328b7

  • C:\Users\Admin\AppData\Local\Temp\Cab5B7A.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar5BEC.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\·½°¸.ini
    Filesize

    10KB

    MD5

    842d9e10867153ad73a1a80d79afef13

    SHA1

    33a49d893273182e8aba6e9531c3077d4ab86516

    SHA256

    2823197bddf0203ea011003a4e70f2687da234a3388b5090a76da2c2562d33e4

    SHA512

    e6e10f63c7d3e65358bd6e66a7328f7d06d096b2ed936cd4504cfb8c6b5f4081dd55884bb915191156965b0eb9b3fda6a97b5b1a1eee45d59a41a4e375d1e518

  • C:\Users\Admin\AppData\Local\Temp\·½°¸.ini
    Filesize

    8KB

    MD5

    16ef8177433976c14d23f839a8c1152a

    SHA1

    2b653ca841498be9292cbbc8b5119504e225f56d

    SHA256

    2a30dc50f2e6e73b059d7419b34924114bffcfa8d99f7703bfbdd4f9e5da8855

    SHA512

    9cccf0eb97b898988e5da63584e195528dd3a0f34d0608844a33c6ac5928d83c8159151a7a15d5382a10114b819cb72d8c5840d254d9ac1023ad6ac22ac4833e

  • C:\Users\Admin\AppData\Local\Temp\¿ì½Ý·¢ÑÔ·½°¸.txt
    Filesize

    189B

    MD5

    322f59ce015ff2f1f00ecbe4fdfce380

    SHA1

    eb4756a5bb023f6d1feacdbeac6e94013e15d5b0

    SHA256

    c96ef901d8f23cb7626ef980c4cf5bece7aafeef9b2b8b28829d3a11a51562c1

    SHA512

    2610ce1c0a55da67faa9ddaca26529a87bf5ebc6706621682d54024fa887ca9cd54cdc5b854f8b79ea99b02a5277d6931f633fa876107d9ec1bf503bee23a02c

  • C:\Users\Admin\AppData\Local\Temp\ÉèÖÃ.ini
    Filesize

    155B

    MD5

    764ece63db57842a490eb694cd2a68d3

    SHA1

    205d1caf7db22def5ab4a8ffdaece98cd80278f2

    SHA256

    fd8bb49fbad7aa33af93d4067ec84aaa1080175f7850a9e46a7eb15e68bcb62c

    SHA512

    f8c6225c2a8570616526ee06a70e889e02d2dc43cdb21d1736177cc69250df74a5d7492dbe59c634f8e48ea21bb200199f3615d85894cfd751fbb8328e4cf7d4

  • C:\Users\Admin\AppData\Local\Temp\ÉèÖÃ.ini
    Filesize

    246B

    MD5

    b06ddcfdb64cc28ca0a0ef609de5f05f

    SHA1

    bd95d141935795e249d2ab00824839fd42c8f505

    SHA256

    da0a5d79dc6a120811b556885b704f9fd158b1f19dd5a9c595719feb56065f00

    SHA512

    a1dd3cc527ce6a6c4b0ea2c369d4370f6f1bf332c9255e1a8eebfd5986c133dacc2e6c6a55071e5bcf4724f37ff2920f2e17567ca32571e664b458e526be72b5

  • C:\Users\Admin\AppData\Local\Temp\ÉèÖÃ.ini
    Filesize

    260B

    MD5

    924bf7a4ce305dad87743ba3c5773aa9

    SHA1

    12d0fddb472394b23e5176ab4ede38974e723b81

    SHA256

    01faf5e88442653bf38adc145d517f44d3495398e0aa666c7486b7030c126cbd

    SHA512

    2380c957717d3bc97ae2de96aba9cd3b50a1774eb96dc47840add1b12ee13485ee6cc6c4d30953b8f42d32ae3b02657966229fcbe58a60843df0cbd6170eb44e

  • \Users\Admin\AppData\Local\Temp\ExuiKrnln_Win32_20230421.lib
    Filesize

    1.5MB

    MD5

    ef48d7cc52338513cc0ce843c5e3916b

    SHA1

    20965d86b7b358edf8b5d819302fa7e0e6159c18

    SHA256

    835bfef980ad0cedf10d8ade0cf5671d9f56062f2b22d0a0547b07772ceb25a8

    SHA512

    fd4602bd487eaad5febb5b3e9d8fe75f4190d1e44e538e7ae2d2129087f35b72b254c85d7335a81854aa2bdb4f0f2fa22e02a892ee23ac57b78cdd03a79259b9

  • memory/2176-48-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-36-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-29-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-27-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-23-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-21-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-20-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-14-0x0000000000270000-0x000000000027B000-memory.dmp
    Filesize

    44KB

  • memory/2176-12-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-10-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-8-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-54-0x00000000002D0000-0x00000000002D1000-memory.dmp
    Filesize

    4KB

  • memory/2176-57-0x00000000002E0000-0x00000000002E1000-memory.dmp
    Filesize

    4KB

  • memory/2176-56-0x0000000000370000-0x0000000000371000-memory.dmp
    Filesize

    4KB

  • memory/2176-33-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-31-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-38-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-40-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-43-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-42-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-0-0x0000000000400000-0x0000000000A6D000-memory.dmp
    Filesize

    6.4MB

  • memory/2176-49-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-50-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-51-0x00000000002C0000-0x00000000002C1000-memory.dmp
    Filesize

    4KB

  • memory/2176-18-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-46-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-25-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-3-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-6-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-4-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-2-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/2176-1-0x0000000000270000-0x000000000027B000-memory.dmp
    Filesize

    44KB