Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 07:19

General

  • Target

    sogou_pinyin_guanwang_14.7.exe

  • Size

    181.0MB

  • MD5

    16140f97ed51c0dbfc3668fa7e96f807

  • SHA1

    1bb9fef2f5770a1dc835b70e6ff8f2fff223d2f8

  • SHA256

    6f1f614cc6f7e08a0749dfc8cc9946860c924410d0f3d2dae16cc7ce1b1976f1

  • SHA512

    c1efa4f6965e6ec012175d3aa63e807c4d2e1d6b8a4a1f6ecb74520bf618a3ae601a92f8373811e82ced545ffc1723c306856eb7b8a1ea5e627c6427e2866c2c

  • SSDEEP

    3145728:448hObRuIVs6aVykHwhk8ts8sD/5rJspQXw62FNPOkqCgrc:0sRuWs6aysb/5rfowkqCgrc

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sogou_pinyin_guanwang_14.7.exe
    "C:\Users\Admin\AppData\Local\Temp\sogou_pinyin_guanwang_14.7.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3168
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Sogou.com\搜狗输入法 14.7.0.9739\install\sogou_pinyin_guanwang.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\sogou_pinyin_guanwang_14.7.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1722947364 " AI_EUIMSI=""
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:1280
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding FA8AEDCA6CE18340FCF835F5C9798410 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2668
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 794D5D39EC2752E5F69D853891646A3F
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1288
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4168
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Roaming\Sogou.com\搜狗输入法 14.7.0.9739\install\sogou_pinyin_guanwang1.cab"
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      PID:2040
    • C:\Users\Admin\Desktop\WindowsProgram.exe
      "C:\Users\Admin\Desktop\WindowsProgram.exe"
      1⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:4796

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\MSIE64A.tmp

            Filesize

            587KB

            MD5

            c7fbd5ee98e32a77edf1156db3fca622

            SHA1

            3e534fc55882e9fb940c9ae81e6f8a92a07125a0

            SHA256

            e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6

            SHA512

            8691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a

          • C:\Users\Admin\AppData\Roaming\Sogou.com\搜狗输入法 14.7.0.9739\install\sogou_pinyin_guanwang.msi

            Filesize

            2.2MB

            MD5

            09cc7a4f9941ec8c61971533d12eb8f6

            SHA1

            8c2d26b91b33c40c25974a1e02d9e54b189704d5

            SHA256

            305c4c3b9a8bd7315fc1f5ab7169954ca66b5864ce982a72b0a631b7b7899f63

            SHA512

            367c0cc9133506cbfaf43e362b4746743ebb40c7a871ed4acdb7db89344ccff260a5a6249654ee294a7d32a5bb3ece60004cfca91f1e2e7635a273fcac5928a3

          • C:\Users\Admin\Desktop\WindowsProgram.exe

            Filesize

            28.2MB

            MD5

            31e192a798661adc9a37287375988931

            SHA1

            f66408525050f5ab3d2490c10834f6c18f34569d

            SHA256

            6530c6a77435fca60a22a10a076c482642bc38515506c1345bf30ae65455bf31

            SHA512

            bb2de787ee26be7792ecb5bf0442ed3bfdfd5c93411378ee65c00c0c2f00003f7aa37b31f42ceca1063dd86791da3ae32902c2c7a9f62db1e3583ef9ff01fdaa

          • C:\Windows\Installer\MSIEA74.tmp

            Filesize

            709KB

            MD5

            89136bfd28a2e1ec6b6d841214e1e670

            SHA1

            4c6aab98925cb556f7bf2dbbc9f7ed0da92ef2ab

            SHA256

            1a3c0e60aad0a3bb92a6e0b786df93920aed7b0c7ec56ab49f2692102ac5adec

            SHA512

            22237702745fe11a6f23a943f16a12f23b42fe04d87af6383afeccd854320f3a6961590a76ab6a04f020f9830fb3d9f8b34315ad007a5464dbdba2d543851812

          • memory/4796-13136-0x0000000000400000-0x000000000202D000-memory.dmp

            Filesize

            28.2MB

          • memory/4796-68-0x0000000076400000-0x0000000076615000-memory.dmp

            Filesize

            2.1MB

          • memory/4796-3942-0x0000000075B40000-0x0000000075CE0000-memory.dmp

            Filesize

            1.6MB

          • memory/4796-5951-0x0000000075630000-0x00000000756AA000-memory.dmp

            Filesize

            488KB

          • memory/4796-67-0x0000000000400000-0x000000000202D000-memory.dmp

            Filesize

            28.2MB

          • memory/4796-13138-0x0000000000400000-0x000000000202D000-memory.dmp

            Filesize

            28.2MB

          • memory/4796-13139-0x0000000000400000-0x000000000202D000-memory.dmp

            Filesize

            28.2MB

          • memory/4796-13137-0x0000000000400000-0x000000000202D000-memory.dmp

            Filesize

            28.2MB

          • memory/4796-13141-0x0000000000400000-0x000000000202D000-memory.dmp

            Filesize

            28.2MB

          • memory/4796-13142-0x0000000000400000-0x000000000202D000-memory.dmp

            Filesize

            28.2MB

          • memory/4796-13143-0x0000000000400000-0x000000000202D000-memory.dmp

            Filesize

            28.2MB

          • memory/4796-13144-0x0000000010000000-0x0000000010020000-memory.dmp

            Filesize

            128KB

          • memory/4796-13150-0x0000000000400000-0x000000000202D000-memory.dmp

            Filesize

            28.2MB