Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 10:27
Static task
static1
Behavioral task
behavioral1
Sample
676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe
Resource
win10v2004-20240611-en
General
-
Target
676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe
-
Size
4.8MB
-
MD5
10c9464211d8fc212bfeeb972ed579d6
-
SHA1
b095a0c0833d852a98ed554507ed24a4c9898e3f
-
SHA256
676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d
-
SHA512
b31c4534bfd66f52e11a85cd0eae9809a557459f45cfeff607fa90dec31e3680a6f33c6fd950ee3e23c8e21987874eb469e8e6526bf49f6932ff0af1615f36d3
-
SSDEEP
98304:Ba5gyXi3zjeZhr19f7gHi/kZgc8hrEB3Ii8GnraqlwyWoQcXGcm3Xmm9rWIcYop1:Ba5gyS3zjeZhr19f7gHi/kZgc8hrEB3a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5092 evb59AA.tmp -
Loads dropped DLL 1 IoCs
pid Process 5092 evb59AA.tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1900 set thread context of 5092 1900 676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3080 ipconfig.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Local Settings\Software\xinkao reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Local Settings\Software\xinkao\xinkao = " 10.127.1.204" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1900 676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1900 wrote to memory of 5092 1900 676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe 91 PID 1900 wrote to memory of 5092 1900 676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe 91 PID 1900 wrote to memory of 5092 1900 676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe 91 PID 1900 wrote to memory of 5092 1900 676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe 91 PID 1900 wrote to memory of 5092 1900 676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe 91 PID 1900 wrote to memory of 5092 1900 676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe 91 PID 1900 wrote to memory of 5092 1900 676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe 91 PID 1900 wrote to memory of 5092 1900 676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe 91 PID 1900 wrote to memory of 5092 1900 676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe 91 PID 1900 wrote to memory of 5092 1900 676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe 91 PID 1900 wrote to memory of 5092 1900 676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe 91 PID 5092 wrote to memory of 3412 5092 evb59AA.tmp 92 PID 5092 wrote to memory of 3412 5092 evb59AA.tmp 92 PID 5092 wrote to memory of 3412 5092 evb59AA.tmp 92 PID 3412 wrote to memory of 2792 3412 cmd.exe 94 PID 3412 wrote to memory of 2792 3412 cmd.exe 94 PID 3412 wrote to memory of 2792 3412 cmd.exe 94 PID 3412 wrote to memory of 1700 3412 cmd.exe 95 PID 3412 wrote to memory of 1700 3412 cmd.exe 95 PID 3412 wrote to memory of 1700 3412 cmd.exe 95 PID 1700 wrote to memory of 3080 1700 cmd.exe 96 PID 1700 wrote to memory of 3080 1700 cmd.exe 96 PID 1700 wrote to memory of 3080 1700 cmd.exe 96 PID 1700 wrote to memory of 748 1700 cmd.exe 97 PID 1700 wrote to memory of 748 1700 cmd.exe 97 PID 1700 wrote to memory of 748 1700 cmd.exe 97 PID 3412 wrote to memory of 3828 3412 cmd.exe 98 PID 3412 wrote to memory of 3828 3412 cmd.exe 98 PID 3412 wrote to memory of 3828 3412 cmd.exe 98 PID 3412 wrote to memory of 1412 3412 cmd.exe 99 PID 3412 wrote to memory of 1412 3412 cmd.exe 99 PID 3412 wrote to memory of 1412 3412 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe"C:\Users\Admin\AppData\Local\Temp\676724453b3d42c3b29dc1b869c877edaa37844df3b5871606dc92ed209d990d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\evb59AA.tmpchushihua.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\ÐÅ¿¼³õʼ»¯¹¤¾ß\init.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\xinkao" /f /v "xk" /t REG_BINARY /d 01000000ad8967c6bdf588cad1ad05e31692dce185c0a0a741a1e9fd02bbfef8be39e0ef9459096d06269541893c8c4bf684b3139d0894517b68a9b784860939b5760e240ac2a53a7e8b90b7eb2c15ec08542d4e3eba6ae0fff3409c3803eb02faa043ea5164ecd9a3455bf6071e3508ae209ee5b97460b7cf33bff6acb20a9683f2941d4⤵PID:2792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig | findstr /i "IPv4"4⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\ipconfig.exeipconfig5⤵
- Gathers network information
PID:3080
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "IPv4"5⤵PID:748
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\Local Settings\Software\xinkao" /f /v "xinkao" /t REG_SZ /d " 10.127.1.204"4⤵
- Modifies registry class
PID:3828
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\xinkao" /f /v "xinkao" /t REG_SZ /d " 10.127.1.204"4⤵PID:1412
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fc804f040bc43e008743afcb677baad5
SHA12c23e78979a8178f246dec5452c7c1a8a9c052f5
SHA25689a095c5c8db0209a7c6d8b838e8b1d51b0a1dc35555d0d318d9f6f76a4cdac7
SHA5120633c9fec6afac07656e9e16909d3fa86e65318cb2742397f21c054a9f5bc30939151ff933879b492df71030689b235c11fb33ef2a812fb09a05ba5662e6a759
-
Filesize
6KB
MD51f49d8af9be9e915d54b2441c4a79adf
SHA11ee4f809c693e31f34bc6d8153664a6dc2c3e499
SHA256b22c8f676dec58be8d25fbad1a37835ffc4029f29aaf79f4dc0337ca73a38782
SHA512c60827e322e3168a79795ffd4beb0b0039842128255100d6b005d261402d2ff570f3866f441f3d3c063097c71d44bc5ae80d177fa91ef4e46fc8c2d97de27aa4
-
Filesize
677B
MD59882bbfe52711ee196a7db25542db5f2
SHA1c394bf81e8b864f870f9ebeb42fb31d09161e79e
SHA25647f5adbc69839363178fed391b0695dc94720cd90976ec606380a62c205feaaf
SHA512e5be4f44ec22ebd5698f31438afd7000a86caad2a3212f4a8912075b05cbb00c0124d9b37f629fa74f0f4b62d36da8059014f93072a7cc83320e9f7d97e0817b