Analysis
-
max time kernel
31s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 21:11
Behavioral task
behavioral1
Sample
000778ee58e6277191be5749c37eea30N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
000778ee58e6277191be5749c37eea30N.exe
Resource
win10v2004-20240709-en
General
-
Target
000778ee58e6277191be5749c37eea30N.exe
-
Size
256KB
-
MD5
000778ee58e6277191be5749c37eea30
-
SHA1
240c427e327ddf16c11a62fd489792e6d42b4e8b
-
SHA256
cf690c914df5ecb2f215c9410feaa98cab5f9cc82e25c788becafe14268d9f93
-
SHA512
5089adeb644ea1ac5ecc902ae1e4c44e85bb7bc2f2a2e71ed6af0eb6baae0c535fbe5eee826ffcd2bb7c7a9c9946b6ab08e727189e125bb69e5e9611e02924c4
-
SSDEEP
6144:4DLQxoyQ1LpnFyZ+dayL9rvolH8u3ZhGod:gQCyQ1LHk+zR7QHjGo
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts 000778ee58e6277191be5749c37eea30N.exe -
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
resource yara_rule behavioral1/memory/2304-0-0x0000000000400000-0x000000000048C000-memory.dmp vmprotect behavioral1/memory/2304-2-0x0000000000400000-0x000000000048C000-memory.dmp vmprotect behavioral1/memory/2304-19-0x0000000000400000-0x000000000048C000-memory.dmp vmprotect behavioral1/files/0x00080000000164b0-21.dat vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 000778ee58e6277191be5749c37eea30N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2637.cn/?56" 000778ee58e6277191be5749c37eea30N.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2304 000778ee58e6277191be5749c37eea30N.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2560 2304 000778ee58e6277191be5749c37eea30N.exe 30 PID 2304 wrote to memory of 2560 2304 000778ee58e6277191be5749c37eea30N.exe 30 PID 2304 wrote to memory of 2560 2304 000778ee58e6277191be5749c37eea30N.exe 30 PID 2304 wrote to memory of 2560 2304 000778ee58e6277191be5749c37eea30N.exe 30 PID 2304 wrote to memory of 2692 2304 000778ee58e6277191be5749c37eea30N.exe 31 PID 2304 wrote to memory of 2692 2304 000778ee58e6277191be5749c37eea30N.exe 31 PID 2304 wrote to memory of 2692 2304 000778ee58e6277191be5749c37eea30N.exe 31 PID 2304 wrote to memory of 2692 2304 000778ee58e6277191be5749c37eea30N.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\000778ee58e6277191be5749c37eea30N.exe"C:\Users\Admin\AppData\Local\Temp\000778ee58e6277191be5749c37eea30N.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2560
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\yyyy.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD565a8d22642284d9924ffbd01859d0df6
SHA128da02d541dcbbfc42c4c8ecf8e813422e83ea70
SHA256a390ad04ae96472cca01440c4b04c5f419ce2feafaa59d17f017af9ed480e944
SHA51292fd99b4dfd61632c1fa554fce3fdf8af8f96c5433d9adcbb460593a3cce3192d5283ad7c3fbba561de3571b3430302099c0fccb8433c53d4fe371075e05fd20
-
Filesize
337B
MD5c83ca39b15b159123a8e77ec79509a84
SHA1b7b855a6b0dd4318038f92a90042cc880b66c5be
SHA256f88019c762e31a8a6c6c5d7472c6e94301aae23668dcc1921d021c0c03451c5a
SHA512b76751fd27be499454bdce8ca813d21929a0aa57761d3efb1ee76ba2b81e1b29d5ec5dced026cc33942cff158c3d92cea6ea00f5350d1b650268422a460d760b
-
Filesize
2KB
MD5a1d921556cf3a3d9d26b2ef002a7f87e
SHA16d35761aa3c8d24ab25db1d6a6e8a964bebd7121
SHA256be7dfb47e11615f6b0cda24d8d568fccb6cea492112f723b8784ee26cbe5d309
SHA512282607c9fc123c57dff829e728c4b08fe7fa27a130903907856127c9aec7d7f2c83c8e6d812208291c495cf25af195404d9010391cf53fcd12f2647475acc049