Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
Keymaker.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Keymaker.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
te6.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
te6.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
安装说明.url
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
安装说明.url
Resource
win10v2004-20240704-en
General
-
Target
te6.exe
-
Size
1.5MB
-
MD5
a5258a2bc1f4dcef517418af14265303
-
SHA1
b2460cb215aa4dc6345c2792a9b0b4abb7cc88ef
-
SHA256
e3ddc187a7994c318fa680764d63a0b5d6e83e3e230c60086682e6c6e5589522
-
SHA512
ad6781c2bcf305b964e26d044f9fa9835b26e93b0e5801d147760a8b9feae72e9debe13d8ab48b7d227694425370d430f11f962b548a05348177b5c2f95cf015
-
SSDEEP
49152:n29MgpwwJTQAo0plUqMWqvlyuBbbCA9S0:29pZJTNPpl1zqsab5s0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 is-PH23P.tmp -
Loads dropped DLL 3 IoCs
pid Process 2196 te6.exe 2056 is-PH23P.tmp 2056 is-PH23P.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2056 is-PH23P.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2056 2196 te6.exe 28 PID 2196 wrote to memory of 2056 2196 te6.exe 28 PID 2196 wrote to memory of 2056 2196 te6.exe 28 PID 2196 wrote to memory of 2056 2196 te6.exe 28 PID 2196 wrote to memory of 2056 2196 te6.exe 28 PID 2196 wrote to memory of 2056 2196 te6.exe 28 PID 2196 wrote to memory of 2056 2196 te6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\te6.exe"C:\Users\Admin\AppData\Local\Temp\te6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\is-J9OQA.tmp\is-PH23P.tmp"C:\Users\Admin\AppData\Local\Temp\is-J9OQA.tmp\is-PH23P.tmp" /SL4 $400F4 "C:\Users\Admin\AppData\Local\Temp\te6.exe" 1378913 527362⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
657KB
MD53dafb498bb15d5260cb2c12b391a0d48
SHA1c775ae9fdf18ab0ce38a8adffabe378f461e79a1
SHA256c5d5f5f814c5bc4989d691442051e5e78cf1971eb9b773a7a26b438e58a73d7a
SHA512a42f39a73bd4615490c6e33c017fa09f9992e3327d244b050b6634ad696d421170fd63ec5d5e66e92d112dc804eabd0bcd56494c9499d78fad8b46fe2ef32a31
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3