Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 13:46

General

  • Target

    彩虹王国桌面版 ——小伟.exe

  • Size

    358KB

  • MD5

    856670c823bcef2e6cae13cb47cee035

  • SHA1

    b36b1c1b31d07afefb8a28da9671c6a0c9106a0a

  • SHA256

    3328c5491abd4e2feba601b0a6a32855598e0faa5fb342ed5222080eb294ca9e

  • SHA512

    780edb58bfcc75321cbafef4146b3e6e86972ee4c0e9cd678dbb3c4441b4729546a4bd0ba1a618d1df74e20646abb1809fc6f3baa09f8d60141a4d833fe1c6e2

  • SSDEEP

    6144:a6CX8UmLbJJ7dR2gk2dxqN3NSMZ+7TZ0mFb9poxxFv7X5LaukwDPAoSFN:bCMUOH7d5Ldx8PZ+XpN9pWxFvdOuR4oi

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 41 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\彩虹王国桌面版 ——小伟.exe
    "C:\Users\Admin\AppData\Local\Temp\彩虹王国桌面版 ——小伟.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D56B4E335E80143B4541C1723368A393_E06846861BBC432E6413ACA00EB6EBF9

    Filesize

    471B

    MD5

    c5a3f18322633cd2b75132bcd2e42ae6

    SHA1

    79204b756158cc76f68b0a13cf455e353c99da68

    SHA256

    b6adb52439f1946bb4ae6905fe91c583bf754c669d41c4f48fe7d23f1a7e14c5

    SHA512

    747ada2d38927e50a54a46f5664761bf9ab7adaf55149b58d6cfc71373dbc5d3e7669fb31b46f80acc0bee6231279ee7f988ff34406a1a49162ba3ebaf84fb3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D56B4E335E80143B4541C1723368A393_E06846861BBC432E6413ACA00EB6EBF9

    Filesize

    398B

    MD5

    9ebac892283e2980b05886d3fb41f3ff

    SHA1

    16bf34dabf751704bcfc250c5d7a8184230a8aa0

    SHA256

    83f9bb4ef471b700c4b3c5c373b04c1e81575091b1fb3df4f1173664b38e8907

    SHA512

    cd5c175427f8cd69fe26ce5e322518d5c9fed4098b62b319fde202d544a12a1a5cede9bfcef9de3ac337d24ffbd9e2a98206ac2b9e807e9d1dbc4713ac32b25c

  • C:\Users\Admin\AppData\Local\Temp\Cab63E3.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar689C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/956-10-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-12-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-50-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-118-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-51-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-47-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-45-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-44-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-42-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-40-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-37-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-34-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-30-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-28-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-25-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-119-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-20-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-18-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-14-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-0-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-336-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-32-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-22-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-7-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-4-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-199-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-8-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-276-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-3-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-1-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/956-311-0x00000000071D0000-0x00000000071F0000-memory.dmp

    Filesize

    128KB

  • memory/956-313-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-317-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-318-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-319-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-330-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-331-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-332-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-333-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-334-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-335-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB

  • memory/956-114-0x00000000071D0000-0x00000000071F0000-memory.dmp

    Filesize

    128KB

  • memory/956-337-0x0000000000400000-0x00000000004D7000-memory.dmp

    Filesize

    860KB