Resubmissions
30-07-2024 12:17
240730-pgdcvasfjf 1030-07-2024 12:17
240730-pf9dwssfjb 730-07-2024 09:41
240730-lnrl9szhjf 10Analysis
-
max time kernel
23s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
30-07-2024 12:17
Behavioral task
behavioral1
Sample
Chrome.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Chrome.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Chrome.exe
Resource
win10v2004-20240709-en
General
-
Target
Chrome.exe
-
Size
4.6MB
-
MD5
d64c8e67eaa9bb5b648f7aa4731c2924
-
SHA1
81d7eec4135a2cde0d29bf651eb3b8e1f4093a93
-
SHA256
a58b7bd1380f220770408e33f43bdac4ab0bfe336e101484100915bf0518e794
-
SHA512
1df2e7066fa804f992edb9f7e15256ab2348a0eb42068de9b987806b220e2ffc6736762fc9b4c37c6277738ca6983e8357d9b8aa6a63317d09a8fac6f54427d4
-
SSDEEP
98304:jDN3JGPpKZ9AaI7S2DLpKNbEoH6ErTQyQzPm1XUxIyiVni:jJ34UwF7S2DLpKNEoHj58PDxdii
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/files/0x0008000000016d29-9.dat aspack_v212_v242 -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1264 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
uzj.exePTvrst.exepid Process 3028 uzj.exe 2304 PTvrst.exe -
Loads dropped DLL 2 IoCs
Processes:
Chrome.exeuzj.exepid Process 2732 Chrome.exe 3028 uzj.exe -
Processes:
resource yara_rule behavioral1/memory/2732-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2732-20-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2732-48-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
uzj.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sougoupinyin = "C:\\Users\\Public\\Documents\\sougou\\PTvrst.exe" uzj.exe -
Processes:
uzj.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uzj.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Chrome.exedescription ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\tesselate.x3d Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\BIBUtils.dll Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\PDDom.api Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\reflow.api Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\EScript.api Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia.api Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Search.api Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.STP Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\RTC.der Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AGMGPUOptIn.ini Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\adobepdf.xdc Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm.api Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\open_original_form.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\tl.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOffNotificationInAcrobat.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ACE.dll Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\AUMProduct.aup Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\DefaultID.pdf Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX9.x3d Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviewers.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ccme_base.dll Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\QuickTime.mpp Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\ReadOutLoud.api Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.STC Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_shared.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\br.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviews_super.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Updater.api Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.SYD Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\create_form.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_email.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\rss.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\PDFPrevHndlr.dll Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroSign.prc Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\Flash.mpp Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\MyriadCAD.otf Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\rt3d.dll Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_ok.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\README.TXT Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\pe.dll Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Checkers.api Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\Identity-H Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\IA32.api Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_same_reviewers.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOnNotificationInTray.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\AiodLite.dll Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\BIB.dll Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.dll Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_lg.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\trash.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOnNotificationInAcrobat.gif Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\authplay.dll Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\Real.mpp Chrome.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.STD Chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Chrome.exeuzj.exePTvrst.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uzj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PTvrst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
uzj.exepid Process 3028 uzj.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
uzj.exePTvrst.exepid Process 3028 uzj.exe 3028 uzj.exe 2304 PTvrst.exe 2304 PTvrst.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Chrome.exeuzj.exedescription pid Process procid_target PID 2732 wrote to memory of 3028 2732 Chrome.exe 30 PID 2732 wrote to memory of 3028 2732 Chrome.exe 30 PID 2732 wrote to memory of 3028 2732 Chrome.exe 30 PID 2732 wrote to memory of 3028 2732 Chrome.exe 30 PID 3028 wrote to memory of 2304 3028 uzj.exe 32 PID 3028 wrote to memory of 2304 3028 uzj.exe 32 PID 3028 wrote to memory of 2304 3028 uzj.exe 32 PID 3028 wrote to memory of 2304 3028 uzj.exe 32 PID 3028 wrote to memory of 2304 3028 uzj.exe 32 PID 3028 wrote to memory of 2304 3028 uzj.exe 32 PID 3028 wrote to memory of 2304 3028 uzj.exe 32 PID 2732 wrote to memory of 1264 2732 Chrome.exe 33 PID 2732 wrote to memory of 1264 2732 Chrome.exe 33 PID 2732 wrote to memory of 1264 2732 Chrome.exe 33 PID 2732 wrote to memory of 1264 2732 Chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Chrome.exe"C:\Users\Admin\AppData\Local\Temp\Chrome.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\uzj.exe"C:\Program Files (x86)\uzj.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Public\Documents\sougou\PTvrst.exeC:\Users\Public\Documents\sougou\PTvrst.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2304
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5175d6f3e75b3cecdc5633ae0524ef496
SHA1745459089543ef9e523af038064085b2e4af0fee
SHA256033f23eac17d2a06675459abe2ded52b42f29cfa720c2ccfb507bac2d38988f0
SHA5125f32dba9ad45cbc6845bfe4f25102947c103072a4258e7e10dd94c888c180fa5d23e80091a5e6b43c7aaa5976133ac83ea17656e4b9c0d2ee1eca8ef5dcdc79f
-
Filesize
184B
MD5a994798dc8a4e132599c71a27a3e5fed
SHA177a1dd9802e75e2a576a7ce7d0205d38ebafda4e
SHA256b579bef02bd91e9b29bcad36144ba04588585614bfcef60c6feb67bf4982b185
SHA5129b398669b1f1a300e609cdfcfd430214dfbe13c0f822e1d34ae9a7171c51e18a3f2781107c7ace5c0dbf47b26a9e70b9fd93acd345ee9ded9c235ac9058ce154