Overview
overview
10Static
static
10155绿色�...��.url
windows7-x64
1155绿色�...��.url
windows10-2004-x64
1Connectify...er.exe
windows7-x64
7Connectify...er.exe
windows10-2004-x64
7$PLUGINSDI...lp.dll
windows7-x64
1$PLUGINSDI...lp.dll
windows10-2004-x64
1$PLUGINSDI...SC.dll
windows7-x64
3$PLUGINSDI...SC.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/Conn...wn.exe
windows7-x64
3$TEMP/Conn...wn.exe
windows10-2004-x64
3$TEMP/wifi.dll
windows7-x64
1$TEMP/wifi.dll
windows10-2004-x64
1BuildProps.dll
windows7-x64
1BuildProps.dll
windows10-2004-x64
1ConnUPnP.dll
windows7-x64
1ConnUPnP.dll
windows10-2004-x64
1Connectify.exe
windows7-x64
1Connectify.exe
windows10-2004-x64
6ConnectifyNAT.dll
windows7-x64
1ConnectifyNAT.dll
windows10-2004-x64
1Connectify...es.exe
windows7-x64
1Connectify...es.exe
windows10-2004-x64
1Connectifyd.exe
windows7-x64
1Connectifyd.exe
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/06/2024, 05:25
Behavioral task
behavioral1
Sample
155绿色软件站.url
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
155绿色软件站.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
ConnectifyInstaller.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
ConnectifyInstaller.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/SimpleSC.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/SimpleSC.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
$TEMP/ConnectifyShutdown.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
$TEMP/ConnectifyShutdown.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$TEMP/wifi.dll
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
$TEMP/wifi.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
BuildProps.dll
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
BuildProps.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
ConnUPnP.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
ConnUPnP.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Connectify.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Connectify.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
ConnectifyNAT.dll
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
ConnectifyNAT.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral29
Sample
ConnectifyNetServices.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
ConnectifyNetServices.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
Connectifyd.exe
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
Connectifyd.exe
Resource
win10v2004-20240508-en
General
-
Target
Connectify.exe
-
Size
1.5MB
-
MD5
fbbb0bb982e825891744e4c89e8266a9
-
SHA1
29e83aed8e98f5c3997cef00943c80ce00aa646d
-
SHA256
d07b54449ccca041621362f1ea26db28c606cd6414cabf7260effbffed15ba87
-
SHA512
21f9c1e67d086387f0398dc4d4df3361bd69b552fa311e2f9a15a61c607496497d8ab93cc516c26bf1a659cc6ec6aa5c15d788d0553712513e71532eadd8ef33
-
SSDEEP
12288:DNlp/dQpKaUfKaUDpNwYxzlK0gsgoG3ugykGfsggZKaUe:DNz/CpjEjWpuY59gsgtgk6wjr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Connectify.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Connectify.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Connectify.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Connectify.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Connectify.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Connectify.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe 1628 Connectify.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1628 Connectify.exe 1628 Connectify.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1248 1628 Connectify.exe 28 PID 1628 wrote to memory of 1248 1628 Connectify.exe 28 PID 1628 wrote to memory of 1248 1628 Connectify.exe 28 PID 1628 wrote to memory of 1248 1628 Connectify.exe 28 PID 1248 wrote to memory of 2816 1248 csc.exe 30 PID 1248 wrote to memory of 2816 1248 csc.exe 30 PID 1248 wrote to memory of 2816 1248 csc.exe 30 PID 1248 wrote to memory of 2816 1248 csc.exe 30 PID 1628 wrote to memory of 1276 1628 Connectify.exe 31 PID 1628 wrote to memory of 1276 1628 Connectify.exe 31 PID 1628 wrote to memory of 1276 1628 Connectify.exe 31 PID 1628 wrote to memory of 1276 1628 Connectify.exe 31 PID 1276 wrote to memory of 2684 1276 csc.exe 33 PID 1276 wrote to memory of 2684 1276 csc.exe 33 PID 1276 wrote to memory of 2684 1276 csc.exe 33 PID 1276 wrote to memory of 2684 1276 csc.exe 33 PID 1628 wrote to memory of 540 1628 Connectify.exe 34 PID 1628 wrote to memory of 540 1628 Connectify.exe 34 PID 1628 wrote to memory of 540 1628 Connectify.exe 34 PID 1628 wrote to memory of 540 1628 Connectify.exe 34 PID 540 wrote to memory of 720 540 csc.exe 36 PID 540 wrote to memory of 720 540 csc.exe 36 PID 540 wrote to memory of 720 540 csc.exe 36 PID 540 wrote to memory of 720 540 csc.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Connectify.exe"C:\Users\Admin\AppData\Local\Temp\Connectify.exe"1⤵
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vnw5-3pz.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2869.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC2858.tmp"3⤵PID:2816
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pikmvi8d.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES29FE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC29FD.tmp"3⤵PID:2684
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pds3nrxj.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2DE5.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC2DD4.tmp"3⤵PID:720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57786a52d4453bb0d0fc303e7e23a82a9
SHA1abeda07dcdf10ed4387f9cba299ea61d54b982a5
SHA25631e51a559e4dd228ae76ddb279eb54ace8b411174854cf6602af8419af9ea6a8
SHA51296661457535d896cb77ab396fffba7688f3788489347d3c39ef93e5d9cbee9e00599c9a72af3d83949571c88958ecdf6007459216ad1eefc3f80e1362e43f4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579fe9d44784d908502ceeac7a98fd226
SHA1b13705958716c1c4f5b80194421d34f0130e7b2a
SHA2567da705ce15df91dbedea39f9a3570cb5ef547b949e046fd0cdd2f3c56fed8fe6
SHA51285098eca59cf0920fdf37b217249c2f6521d248d859e4de48c6629c813e6acb395c96b13281f92b8fb5f49d4b292f7d67d33b570f387ea456a0ebcb59276247e
-
Filesize
1KB
MD5775ee33d9080dede8194df60a0161f35
SHA1c719df7be2653d8330db04e6d194cf809edec71d
SHA256e77b9c43353bfd478788b9e4914968856e271df642d14629d92e0e7c228298e5
SHA5124442b0cb72ec0caa4f1d4ef5440cc3133ba0b1d0f70fe7bdf3d65345fd982035aa577c4caf4e36e9f6310d55827e0a0f170f9c7d43170121e0d614a1b3847650
-
Filesize
1KB
MD52072366e814cff240ec2698a6052b328
SHA1b10fe2e7cc5f926a3ba54b7319d3a29f55889b76
SHA256b5d3c2f9639e5891fcd3081e3554acdc7710d174d143f0baf8b5c9cd9185eac0
SHA5125226718a5fb11b97d942d60f6c641cc75052db57fda17c4d13031a5d2af2e5a2b5cb82d22c8ae4a83c6b0204034135511bcb44b0f39843f0892f1cf431c053be
-
Filesize
1KB
MD559320b4b8ead7d5112353dd457cdb5da
SHA1717d29c26d3868b9a0086be18374116da7524102
SHA256e2e2ca14083b553acefbaeeb3d39d08e1fa55bbf8a3f0b60e0bc13ad1b9d37b0
SHA51221951570222c5747d985e455472339029a51d2350b83c73276f4c2869ce496e8de291a518327b5049f940dcd2ecb78cce8e8b47ccf1b19c2a3b6d8b309e15f0d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
9KB
MD5747e0ab516dbf7aea2b4aca521c0af2d
SHA1b5388edd318137e184833592403ce6714803a026
SHA2561c674d380c5fec675110a723d446cf4f9488d4604ca44003f58000937dccae52
SHA512b0b2fb4ac0d51b6e8843107be0f8069ad6db40830c8521be00e082296a917c8d987b591679daa0b2f2d6ccedfe9adf5043f3ea0a7f2d1dc81a2c1792e27ca382
-
Filesize
8KB
MD5e082101d75d15c037cadef376f201555
SHA1edf35e23884f1e4472dc138adced0ea2b7b70cac
SHA256773b117858c2bda0e7987ad7a47b3c12bcf5d6e040bcaf5852d6327a5e22ecad
SHA5123fcafb539290f4d1a8f9d7e578ed189a7a6103f37b1c7c51da9534dcd38e5c3d56f2db0f10455f68230db3095e8e0bbfdeda161790e45ca28c8134dbec013515
-
Filesize
10KB
MD5dceb84ca3a6570a979f59d3e70197188
SHA18e68bb3af701f3efbac3b8092d53de1ecaf24cee
SHA2561821844c43134a9aabbe9c3b32f81adb19fe98fa61ef2786e51628a994edc9d0
SHA51297254c4573c7c83d3a091c90ba5ab342ec4ef717a8420c01b955bdae10aa36d7e850fff7bbe6b79643f3cc4697ba0186df248e2232591959839ef6edcf191cdc
-
Filesize
652B
MD5322ceb438e60d164e78effaf0ceb9b01
SHA1f9785fae2cebc60819b3dad635fe6d290d18beaf
SHA256927b7aa45a6a7784c45e3e41d0e1a85c72b3f4a3aa323d947e6a6ce0b4115bec
SHA5124f0c202e8b3f6df3f80231b5bbe71fae8c08b8eca10da3cf7c9f431e78a65fcf294363c177537ecf949a7b1b4f5e41e8898cc9deecf9cf5d7a8bc1ff2d5fed55
-
Filesize
700B
MD513951da1d06c93680e58cd49cd6dbf90
SHA118b6faa87bb3f1efd6e396d0fe112c5f65f8cb87
SHA256c4b08dacb318ed0f9908a522e77e226b0a674552231d5f8b08c3cc77e64ad6e9
SHA512c6dbf2ff4ed2dfee5895feb3d98f5019c574ebe6e7f9e7b0e9053134dd583d999ae020a14b5fb633a4cb9511e4af1035c3ebffab83e528de938bb3367aa3d00d
-
Filesize
652B
MD51428236e09e7980c8907be6378bbd4fd
SHA137b0e2da7fc41c614e727f7ca9c0fdf1f178d4da
SHA2564e517ba07f2e0d9cb2834b5ac31d85a86878edf221579b2b80524a450418d710
SHA512185b27625776234f0172ae92ec78f22f11c365f9382af2fe25414e59d522f9863b14203909ebb1ca399a564541a48dfa71b9e82c94cc09c28fe05bcc43201282
-
Filesize
18KB
MD5f12186e017dc013105f7af4cf539645f
SHA150bb0ab7ad4733bb48930bc5f1c44feda65623ea
SHA25675693617a945fd4ccfc4157999f2c52ddf68547cf5322e18ecfb70dc17c922d7
SHA51281c50a12fc0f07bd01bf8f5f74651969ab9bad0ade3c7704c8a1bdb1c8e16d4c5a77a68eace60e5a3dd75930df6e9d30b375be078f7a4959b85adca9cbcbfb68
-
Filesize
401B
MD586aa9f6dce073e312cd06d0d0df69cdb
SHA1a04ef4da5103f145d0ee6bd606bc79f00747d5fe
SHA2560d3e607a0bf31289948c1cbe177d59b4d81723da5c3200eb84ac61b1d8c68ae8
SHA51239deffec7930deaa5d4fb0fc386853d93bbe4f71c2f95e0ff557eb6d68a7befdf077e8f8f5068aff5799ed9d240d06317578acc54162f73612892bcc41944ba7
-
Filesize
11KB
MD57b835a71956070a4cae36cb9aadfb50f
SHA155dfcec894c1ee834e54d6aaab69e9b97216bf06
SHA256607eafe7bcff5b38f1c5d6879f6970c1007e289a7589726e25cca620f7a9bcf7
SHA5120a564bcb5dcae342f705ff656326d3154adbeb9c90414c3a236c63db460b6dcc1a555e579d926fff74b7960a23d51fc7188bd89ebebaebeca33a5f83ebd733b3
-
Filesize
401B
MD506bae6112363cb6f1f3a5f4a74811329
SHA146e3d7d92f72665229143ad4ed15394721b13001
SHA2568eec8748d35ea2a374b6078415e3d390104a08df60e44d91dcd0695e1011227e
SHA51266c986a44b7d562e651a5c48d867a1fcf7c3910e6535b86d5371fa187ab19b606f3b77dcaf879abaa2dc5f4553df34f0bd3d264927b381f1918c1df6234e36d1
-
Filesize
16KB
MD52acd8c6a61b4e380150e9279d971f493
SHA140960648651593045fda00cfbe3de316e0a43e42
SHA256e4a02f3367b91e9d001f2b69faf923ea4cacd68232b675df782a1221af7d0395
SHA512cd600e638fa0f2f6d90ea0562f8fb89da8517c50eccfc1fa0c75d93ea1dc61f8eeea3f9bad952e6894beb0fc0cd903b56ff9b52150ff1a181bacbf5e23ee957e
-
Filesize
401B
MD518f2be092d924a697d6368d2cedc5fc7
SHA1ad2836b5edfe34ef3c244db7519704009a3e27b0
SHA2565b15ac1141733cbf4e7ae6a487347a4ede6e775dc6d1f2825a4fa0887015f5d2
SHA51290551968a801b96db49ee7f50e2387306510f40440dfed8f23cacf84d58cbd7192099b971dd4a0bb9f4cf3b7009054d343a9f82b52ad807639b855ebe285cec2