Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
hbdzt.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
hbdzt.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240704-en
General
-
Target
hbdzt.exe
-
Size
1.6MB
-
MD5
44100d32830cca151fc30283260b8b67
-
SHA1
f6ee54eb547ea0e0a3f944e2f0691ba7e8ccbd1c
-
SHA256
24e2d7c6fe132f666c950b6192b342322a25188201253ebca3706681fb7b7392
-
SHA512
17f9bc344d3a2246bd53b3a2e2774594f6302b3bc7964d2b10d5fd8985dc3b9db750b39bf0c065289a5a15b20f16e196480fb03450173a1c823ba57d4dfc26f9
-
SSDEEP
24576:PJb5ta7ShseSshw9C0nsFpiu/vvWNKJ0Wkah5UZEGTDo9sLkDo6M2HsWJuhcJFHJ:xbTaSh0nEpWNJW/MZJ56McY8hwew
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3320 irsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbdzt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language irsetup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3320 irsetup.exe 3320 irsetup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1688 wrote to memory of 3320 1688 hbdzt.exe 85 PID 1688 wrote to memory of 3320 1688 hbdzt.exe 85 PID 1688 wrote to memory of 3320 1688 hbdzt.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\hbdzt.exe"C:\Users\Admin\AppData\Local\Temp\hbdzt.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\irsetup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5ff439d8a48231281a5b95d703c168fe7
SHA176094b5540f187bc730fb9ce8265c5d5fd74d4e9
SHA256403b2c886bf9895534a5ebe14894d64f80ec1f10d01c04480ba68a4b10870067
SHA512ea3c9ff9f2fb64e271b6b0dcd13db4e70d3e5b71b7d6302692bc46586edb33cb6aacb9c9548f00c17d1b063c430c4fd2807afcf39fbe50d358c89e19c6955d83
-
Filesize
7KB
MD595145f4cead2c4bd2ec219bc87d83f1d
SHA15eec034dfc7d9a6d93c21f38dfe2405c8968f6ed
SHA2560542cb1d3e6b50f78dc63ea1abec6c518cfd4ea203649df3ef3834309ea66cad
SHA512081d9cfa0bc46a54fcf03a62e5663282d27f56e20fbeafba2833d6267de285a354915c661dd67a3217f4dc2330c7f49babf8b24a5a68ba5a014f5e1e297cc5df
-
Filesize
7KB
MD5e29a24e189e95681bb41f73c16747fd8
SHA1e9269bb9cb6f2b700fc78f92066f31b15a9c5c2a
SHA2563973d354045be781eabf9114772fe2e5e96d1e557793de10c914d901b16e8c09
SHA5124c6db25e04acb8349da29249f712b20c217d792e6d5fd40af9b398e2617d5168ef0afc2505a05b0833b90165d5e5eaf2e98d1821e855a99fc7833de52154ad94
-
Filesize
7KB
MD525074f89f8ef5dc3465a25590b6f03b1
SHA16b5e7ee29eb5c3e6b7b2af4ce0c2b27e81b171f6
SHA256d0c91ce7d8acbc213f54cebfe87d24e146c00e9b3540fb0f9f115c5bf5c2d500
SHA5124f80bbbeaece13cd4ed78097a36c3ebd598c0350dd5e69d9bca8f83b76542d9a38bd58c951d1c62ffacda41be86fa2b423f6e3b1f9a20dad779322eb5ec44169
-
Filesize
704KB
MD56f20d65c5af232700ddf7b3206d9c870
SHA1527a7e3525dd9b0f3f6e0d508702e6816311b255
SHA256593ad36de23204385eeadfe318972c2e9f01275e59fd00342ad5892be0b2c6b0
SHA5123f038a87dc644994c68b1c2596aa499fc128a18bcab74766c81ea2bc6d5a86511a810af2700e87bfe85b28fe792a51795b4014a2145c01b122ca869a577538e0
-
Filesize
78B
MD53ecc1d743049135eeaff41cbd9895867
SHA1833d6226e88bd7a4190a1563afd913bee8c69b7a
SHA256c3c9d98a92a3ae3ade084e7c8a0f065830cd69de7594ddc573894419d7af1dba
SHA512fba1fc5a3948c615eaaa12497277aeefd1270b2969f28c705d64d647f7afa94aed07fc3156d931e9279b45798ce1828c825b1bbeae4b00245a0a23372d3fdfb0
-
Filesize
12KB
MD55930543afe37917c8e447635310009d5
SHA1b012ad5d21489c97e2fdb27728e808200fceef07
SHA256a084e98c6807381e118d47c1c65c591361f4159d87b3b4386ed347ca60c890a5
SHA512073080d3233d21936fc8ddafd06bcde8eb15913577b1a7015cbdb3a8af13c7678e65f1afa2036e2fb59eebec55f8fbf025958d8490d13dea05a093534a4aff9b