Overview
overview
10Static
static
7AdWare Spy...SE.chm
windows7-x64
1AdWare Spy...SE.chm
windows10-2004-x64
1AdWare Spy...SE.exe
windows7-x64
10AdWare Spy...SE.exe
windows10-2004-x64
10AdWare Spy...ry.htm
windows7-x64
3AdWare Spy...ry.htm
windows10-2004-x64
3AdWare Spy...00.exe
windows7-x64
7AdWare Spy...00.exe
windows10-2004-x64
7AdWare Spy...��.url
windows7-x64
1AdWare Spy...��.url
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 21:23
Behavioral task
behavioral1
Sample
AdWare SpyWare SE/AdWare SpyWare SE.chm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
AdWare SpyWare SE/AdWare SpyWare SE.chm
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
AdWare SpyWare SE/AdWare SpyWare SE.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
AdWare SpyWare SE/AdWare SpyWare SE.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
AdWare SpyWare SE/Instructions/Registry.htm
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
AdWare SpyWare SE/Instructions/Registry.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
AdWare SpyWare SE/unins000.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
AdWare SpyWare SE/unins000.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
AdWare SpyWare SE/非常世纪资源网.url
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
AdWare SpyWare SE/非常世纪资源网.url
Resource
win10v2004-20240709-en
General
-
Target
AdWare SpyWare SE/unins000.exe
-
Size
657KB
-
MD5
77b0a42e0592c8b288d879eff4dd4019
-
SHA1
b8d85335f2e30de16d5e526aae9293d83c038e82
-
SHA256
030e764383e27073584c92b6e8bfe7832f6ef3ef810ca56b0a2c1d2ca71a8ab5
-
SHA512
63ed1f510b887065141f409588a3fd6edd394057e9f852af9516533120653c25d0ce0bef5508865ffeb255e9f410f63fdee366907688f4bc63a32c1dfb9f2dbb
-
SSDEEP
12288:CeuHnWgyrgVu4rPy37WzH0A6uaF4Ad7dNsVN1qRqhD1Yxpx:buHcrgVxrPy37WzH0A6uwpd7QN1DJYx3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3168 _iu14D2N.tmp -
Executes dropped EXE 1 IoCs
pid Process 3168 _iu14D2N.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unins000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _iu14D2N.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 608 wrote to memory of 3168 608 unins000.exe 84 PID 608 wrote to memory of 3168 608 unins000.exe 84 PID 608 wrote to memory of 3168 608 unins000.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\AdWare SpyWare SE\unins000.exe"C:\Users\Admin\AppData\Local\Temp\AdWare SpyWare SE\unins000.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp"C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Users\Admin\AppData\Local\Temp\AdWare SpyWare SE\unins000.exe" /FIRSTPHASEWND=$402BC2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
657KB
MD577b0a42e0592c8b288d879eff4dd4019
SHA1b8d85335f2e30de16d5e526aae9293d83c038e82
SHA256030e764383e27073584c92b6e8bfe7832f6ef3ef810ca56b0a2c1d2ca71a8ab5
SHA51263ed1f510b887065141f409588a3fd6edd394057e9f852af9516533120653c25d0ce0bef5508865ffeb255e9f410f63fdee366907688f4bc63a32c1dfb9f2dbb