Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe
Resource
win10v2004-20240426-en
General
-
Target
7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe
-
Size
6.0MB
-
MD5
09eb8d13e738b3a00cd7a63a707eb323
-
SHA1
4aa9e56972d8df02d5094246eae2f1bac2fe66b2
-
SHA256
7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575
-
SHA512
09b63de74328da7c144c57f89d34cf3309fa1713e819626422e4696cff41b6fe8a0a12c33e171ea1bb74264447f82337bda23df0d0d16c9d7ec49a2922778ef9
-
SSDEEP
98304:fbdhDqohDS1F+CRcB27OgUWZHw8VQjr+/bJBAUZL5:fbdhDD23a2sWKjr+TJV1
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exepid process 2988 7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe -
Processes:
resource yara_rule behavioral1/memory/2988-2-0x00000000002F0000-0x00000000002FB000-memory.dmp upx behavioral1/memory/2988-1-0x00000000002F0000-0x00000000002FB000-memory.dmp upx behavioral1/memory/2988-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2988-57-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exedescription ioc process File opened for modification \??\PhysicalDrive0 7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FFD3C51-1B6B-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 604 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exeiexplore.exeIEXPLORE.EXEpid process 2988 7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe 2988 7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe 2988 7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe 604 iexplore.exe 604 iexplore.exe 1040 IEXPLORE.EXE 1040 IEXPLORE.EXE 1040 IEXPLORE.EXE 1040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exeiexplore.exedescription pid process target process PID 2988 wrote to memory of 604 2988 7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe iexplore.exe PID 2988 wrote to memory of 604 2988 7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe iexplore.exe PID 2988 wrote to memory of 604 2988 7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe iexplore.exe PID 2988 wrote to memory of 604 2988 7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe iexplore.exe PID 604 wrote to memory of 1040 604 iexplore.exe IEXPLORE.EXE PID 604 wrote to memory of 1040 604 iexplore.exe IEXPLORE.EXE PID 604 wrote to memory of 1040 604 iexplore.exe IEXPLORE.EXE PID 604 wrote to memory of 1040 604 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe"C:\Users\Admin\AppData\Local\Temp\7297dbb63f36319f83cc68fe15073e7adfc748a2771136878a628a2320443575.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://changkongbao.lanzouq.com/ikW9T1cfeg5e2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:604 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518f1a998d927cccfa32aece8b4ce38a3
SHA1076e3bc445f01349887640c5015a2397bed86c87
SHA256f64fa1483dab0cc8da326a88bb05c9220484a658fadaa76cefa0ce4858aa63be
SHA5124e566d6fe21f607eab12819eff2b0b4249896aff349a9b283f34f6008d4765c919a973a73b20112eacc7df4efcff236ab5b234c36207acad9e571765d9492da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef202cfb1a456005e160bfb7598dbb88
SHA1227c2686a2db14911d033d1f3bc479be801ba9e6
SHA256994efdf5d724e73ddaefce2f7b0024c195fe021f5dc6b1618eb9b95d598fe812
SHA512988fc284a6a1810c400b4a20dbe12446c1733ab4802757729a3170f73d477a307a38d12d06d920cff7c36ae577c11d1067e0934c55f562067c47a437bf750c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3083cf1699fa4711e7283780a56b945
SHA1259921980d9f9fd9532410a6b0cf01e8be263144
SHA256832d23fb5a50c9174a94624334f90472060590c71ee335ae1065bc097dd8d168
SHA5124557ded42c8f4c89944f5b530402686150bfcb1f0f98e85f589cbedb893fb5c2e580e8b37116ae3785042ae7dc8d2fdce010997c422b0e747ecd03e0aaa5a681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511c8fccf8e629c51021abf396635ec35
SHA16343d627754520c4dc382827e50a293f7e361e47
SHA256ce39e86132853d078d91157716482dace7a08c701de2a4f16ed53d1353718cdf
SHA512a9e13bc026d66c3a3a769dc6c992bf76af7592cb534d13445591b5ef59238b6379045cac0212643817bbd146e5514ed05cbb041dc693bc73a7fbc488544ef595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534a772c58d4dae44514c57ab47219691
SHA1bc03784d51d0021b5dd1c6a525ff2d95b0057ea2
SHA256af15fee101b8176354b3dfaed534e17c692bd44d19be729f3d8d5a46b4e116ac
SHA512304f0c659aec96db749aa73b86cd8aaf732ccc8f784cfee9015a83018d54ecdd4fe36e996d1c29e73cddcf8f29dbab44f4445caaf629feb74c0be80da6bd884e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f00fb6c917958c8ad2b2283a4757079
SHA1eeaadef2cb9ceac911e496dfbef649946d6d4dd8
SHA256729550b8caf6ec79ef47abd776bdc7d8267d4948de61c2bc95338ed8eb7d7329
SHA5125b3641ee122673120ab97aa275671b6ead5a9f2ac4152a461f6e19dada75280ada139ec56a4bd4e634f7643c1a6b98a553efbad4f418afd51a2acc3cff140d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0256d919ef1a7ddda33fd332d6cd400
SHA1454e222bb706152155e67a533dddff8d55e290c3
SHA25641825df7d300830ff56ec22cbf5829b869c971e83d61aaf91648594025002560
SHA512317cf1b1532a4c2936ba62c7013112c2714587ae9d0378df1d6c57cb1dd995ab8270c7a7adcae6e424f533336b2f211fbdb5c3be5c71cbe639d47fb9ae8f5de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560949c83f221c49ed84ec5d5bc2b7cf3
SHA1a975ea917945c91d493825c7e0305be7fba70249
SHA2560e4ca06ad0a62d44a96db45b31f20f53e8dabb713abea62de0c6dd61be4243a4
SHA51281e033b6b9e8df46eb20a17cdca5b0d744a8f52964319505684ef7c2aaff1e9d7b3eb7407a5739a7a0c6cb48e88ca2033992816114361a66ba8f7db3b8f34d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b16177e0a21a3987aea3e90e927db714
SHA1a052cf20bb99cf0967ff9d79544d44c6500ae51d
SHA256527729896a81747bc8672d43953cf936b7f596de902f24acd9abe5428aeb2b02
SHA51287e00760a55723f7c7d96ba8d50e70520a402624fca0f2a17dd845c82fbfd66ca8a94cde56e79fa3b4b847a2192b07fae0ac51f6ca5b7b02d1f2d4f2ffa828fd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
10KB
MD5842d9e10867153ad73a1a80d79afef13
SHA133a49d893273182e8aba6e9531c3077d4ab86516
SHA2562823197bddf0203ea011003a4e70f2687da234a3388b5090a76da2c2562d33e4
SHA512e6e10f63c7d3e65358bd6e66a7328f7d06d096b2ed936cd4504cfb8c6b5f4081dd55884bb915191156965b0eb9b3fda6a97b5b1a1eee45d59a41a4e375d1e518
-
Filesize
8KB
MD502e3c0364cd93fd56fce9c2ae885339b
SHA1ffee74b2301ef0c8e88dfa37c1d180d3eb952ec8
SHA25650fd9ee309fd11fdd83f6cfe01ce6efeca5d8dd36f2cf075be2bf1bc7fa89095
SHA51258f892ade02def2692de3dc09d61161db368cbd8b1491fccc4c6ac04d70d3f971d7306fe81136437c2594750cce65b04e3e510107129f6296e722035f85f6970
-
Filesize
189B
MD5322f59ce015ff2f1f00ecbe4fdfce380
SHA1eb4756a5bb023f6d1feacdbeac6e94013e15d5b0
SHA256c96ef901d8f23cb7626ef980c4cf5bece7aafeef9b2b8b28829d3a11a51562c1
SHA5122610ce1c0a55da67faa9ddaca26529a87bf5ebc6706621682d54024fa887ca9cd54cdc5b854f8b79ea99b02a5277d6931f633fa876107d9ec1bf503bee23a02c
-
Filesize
246B
MD5b06ddcfdb64cc28ca0a0ef609de5f05f
SHA1bd95d141935795e249d2ab00824839fd42c8f505
SHA256da0a5d79dc6a120811b556885b704f9fd158b1f19dd5a9c595719feb56065f00
SHA512a1dd3cc527ce6a6c4b0ea2c369d4370f6f1bf332c9255e1a8eebfd5986c133dacc2e6c6a55071e5bcf4724f37ff2920f2e17567ca32571e664b458e526be72b5
-
Filesize
260B
MD5924bf7a4ce305dad87743ba3c5773aa9
SHA112d0fddb472394b23e5176ab4ede38974e723b81
SHA25601faf5e88442653bf38adc145d517f44d3495398e0aa666c7486b7030c126cbd
SHA5122380c957717d3bc97ae2de96aba9cd3b50a1774eb96dc47840add1b12ee13485ee6cc6c4d30953b8f42d32ae3b02657966229fcbe58a60843df0cbd6170eb44e
-
Filesize
1.5MB
MD5ef48d7cc52338513cc0ce843c5e3916b
SHA120965d86b7b358edf8b5d819302fa7e0e6159c18
SHA256835bfef980ad0cedf10d8ade0cf5671d9f56062f2b22d0a0547b07772ceb25a8
SHA512fd4602bd487eaad5febb5b3e9d8fe75f4190d1e44e538e7ae2d2129087f35b72b254c85d7335a81854aa2bdb4f0f2fa22e02a892ee23ac57b78cdd03a79259b9