Overview
overview
8Static
static
3DeleteApp.exe
windows7-x64
1DeleteApp.exe
windows10-2004-x64
1Interop.MS...ol.dll
windows7-x64
1Interop.MS...ol.dll
windows10-2004-x64
1Microsoft.mshtml.dll
windows7-x64
1Microsoft.mshtml.dll
windows10-2004-x64
1NetWorkBase.dll
windows7-x64
3NetWorkBase.dll
windows10-2004-x64
3RefreshIp.exe
windows7-x64
8RefreshIp.exe
windows10-2004-x64
3ZdDll.dll
windows7-x64
1ZdDll.dll
windows10-2004-x64
1db/新云软件.url
windows7-x64
1db/新云软件.url
windows10-2004-x64
1help.chm
windows7-x64
1help.chm
windows10-2004-x64
1智动软�...��.url
windows7-x64
1智动软�...��.url
windows10-2004-x64
1软件中�...��.url
windows7-x64
1软件中�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
131s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
DeleteApp.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DeleteApp.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Interop.MSScriptControl.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Interop.MSScriptControl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Microsoft.mshtml.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Microsoft.mshtml.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
NetWorkBase.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
NetWorkBase.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
RefreshIp.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
RefreshIp.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
ZdDll.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
ZdDll.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
db/新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
db/新云软件.url
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
help.chm
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
help.chm
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
智动软件 - 站长优化推广网站好帮手.url
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
智动软件 - 站长优化推广网站好帮手.url
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
软件中心 - 智动终级刷IP工具 - 智动软件.url
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
软件中心 - 智动终级刷IP工具 - 智动软件.url
Resource
win10v2004-20240709-en
General
-
Target
DeleteApp.exe
-
Size
20KB
-
MD5
f2140cf5c640bda9d82e44ca240fe1f5
-
SHA1
4cf99c234f0acbf065f07966a97fcb6092d0e041
-
SHA256
1e812d57fa49c2bdd6beebbbf1e8d16b7aa54395855d9db2f7e8a59b2adddc18
-
SHA512
eafd5136a3b1d14d0c27ea0f965a101f752d2a15c9bf1e18ed51259426e70f67b0d1b342def30c197e6ead179a5be9c32c94146f55e26c7429f3f0e81e041833
-
SSDEEP
96:fDk2Z+SWjw6VFUBdzPc/SZSdapnf1KGUlIJd9oRPy/yIwWbB6Ci+xX3zB3wp:7p+nM2yc80oKG0IP9MPL8wCiiTBK
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 4276 dw20.exe Token: SeBackupPrivilege 4276 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4408 wrote to memory of 4276 4408 DeleteApp.exe 84 PID 4408 wrote to memory of 4276 4408 DeleteApp.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\DeleteApp.exe"C:\Users\Admin\AppData\Local\Temp\DeleteApp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 7842⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4276
-