Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 17:05

General

  • Target

    $WINDIR/system32/drivers/360very.exe

  • Size

    838KB

  • MD5

    8bc025238d5921cec5236bad2771cb84

  • SHA1

    2badb366b6b8860e01ebc4197fc2aa18ab531906

  • SHA256

    d3504485deaa6841364b79b108b4c485eb2107c2cd6837d548bec6eccedabc1b

  • SHA512

    770cc6977fe944c0eb9e66c3c3f005996b4b9def559684c8fae1b0683b25c2b5165bf828f386b00115f39e3da81824f9111e4a366d262d53d8e7002fe8f38606

  • SSDEEP

    12288:Ftl5O9IqNzv1MN5AKZhffsDgH006Ai8Ao/oscoHqxURcYEkVBnlEoY:95QMvAKZhffL006AFnjMSlFY

Score
8/10
upx

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$WINDIR\system32\drivers\360very.exe
    "C:\Users\Admin\AppData\Local\Temp\$WINDIR\system32\drivers\360very.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\com.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t reg_sz /d http://www.2548.cn/?zt7 /f
        3⤵
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        PID:2680
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main" /v "Default_Page_URL" /t reg_sz /d http://www.2548.cn/?zt7 /f
        3⤵
        • Modifies Internet Explorer settings
        PID:1992
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main" /v "Start Page" /t reg_sz /d http://www.2548.cn/?zt7 /f
        3⤵
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        PID:2816
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ping 127.0.0.1 -n 3&del /q "C:\Users\Admin\AppData\Local\Temp\$WINDIR\system32\drivers\360very.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 3
        3⤵
        • Runs ping.exe
        PID:2964

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\360系统垃圾文件清理.exe

          Filesize

          488KB

          MD5

          3878cc22e9f121364300479e6ff3bd64

          SHA1

          b53128153b214bc95f71998abef91e42abb5eb38

          SHA256

          355a5de17976beb7a672bb51f3f7e795786f8c1083d795dc25de7ea25ca040b3

          SHA512

          3da696c7ebfd43199870daeb58c02cb786f5aad276cf3282b7c8ecf39212f1fd40433a04ab86ed8c9ce22da91cf3cf8f198e084da2b2987260f4524d6ce74e91

        • C:\Windows\com.bat

          Filesize

          386B

          MD5

          38cd98ee04082c0c8aebfb7c7a5527b0

          SHA1

          471151d314b09e685836dad51f79990d0169d269

          SHA256

          1bb3c5d6a8b291d8099b0494119284526582bb1cbb86bf526ac876cec86b27ac

          SHA512

          d275af25a3864b94a76d22fdd1cc9a4c1d21b71f02640bc0e9fdd8120b40f1f54265ec75ce0688d5befc751b584fb0286c2fa20ca5e060fa1146003493393cb0

        • memory/2032-0-0x0000000000400000-0x00000000004DB000-memory.dmp

          Filesize

          876KB

        • memory/2032-9-0x0000000002570000-0x0000000002580000-memory.dmp

          Filesize

          64KB

        • memory/2032-19-0x0000000002570000-0x0000000002580000-memory.dmp

          Filesize

          64KB

        • memory/2032-83-0x0000000000400000-0x00000000004DB000-memory.dmp

          Filesize

          876KB