Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 17:16
Static task
static1
Behavioral task
behavioral1
Sample
新云软件.url
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
新云软件.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
百万库管王.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
百万库管王.exe
Resource
win10v2004-20240802-en
General
-
Target
百万库管王.exe
-
Size
2.3MB
-
MD5
a370d9c49ed51bdcc870073623959ea4
-
SHA1
9c65acd7cb0e054ef9c9fdbd2b55b1bd35871500
-
SHA256
dc7c1721de62a39629266e204692a78fe171f51b333b0e6be6346a50fab5174d
-
SHA512
649a0465819dd331ad6b4382486913f3fe83a0548dc4cb2d24bf1249af007ac8d20c75bcd620d6a80ea9f1699e49de517133d0c48bb1cedb052f2d0baddb5054
-
SSDEEP
49152:mVOdsoTKxYnpPqvnX2ZKv8bLvovjw/o1gH14U42bm5rZDxLFzm78:mcds9xcpqnX2EWnFyym5rZ1FJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2312 百万库管王.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 百万库管王.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 百万库管王.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3168 wrote to memory of 2312 3168 百万库管王.exe 84 PID 3168 wrote to memory of 2312 3168 百万库管王.exe 84 PID 3168 wrote to memory of 2312 3168 百万库管王.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\百万库管王.exe"C:\Users\Admin\AppData\Local\Temp\百万库管王.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\is-95DS1.tmp\百万库管王.tmp"C:\Users\Admin\AppData\Local\Temp\is-95DS1.tmp\百万库管王.tmp" /SL5="$502A2,1986376,146944,C:\Users\Admin\AppData\Local\Temp\百万库管王.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD56b0c5bb2b8ae83d99e16e3384b7b5544
SHA17175101d100d98506ab4b742f34fe245085e5e6b
SHA256af8390db4c1c2e79e8fbd881d834b86b1c1888267cf916723c47b40947630bb0
SHA512151d4f24f523186ae06cfd7278aa0898a7c34e0fb5ccaa3887d45351f4bb1f4b95509ce4f6ff3468fb747a31f24fd8b4e1f2330ca2931c30f24a45ca8d41cfc3