Overview
overview
10Static
static
7HA_AimOneS...CZ.exe
windows7-x64
7HA_AimOneS...CZ.exe
windows10-2004-x64
7$PLUGINSDIR/delay.dll
windows7-x64
3$PLUGINSDIR/delay.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/nsWeb.dll
windows7-x64
3$PLUGINSDIR/nsWeb.dll
windows10-2004-x64
3$PLUGINSDIR/nsweb.dll
windows7-x64
3$PLUGINSDIR/nsweb.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ce.dll
windows7-x64
3$PLUGINSDI...ce.dll
windows10-2004-x64
3$PLUGINSDIR/time.dll
windows7-x64
3$PLUGINSDIR/time.dll
windows10-2004-x64
3$PROGRAM_F...ta.dll
windows7-x64
7$PROGRAM_F...ta.dll
windows10-2004-x64
7$PROGRAM_F...ar.dll
windows7-x64
7$PROGRAM_F...ar.dll
windows10-2004-x64
7$PROGRAM_F...52.exe
windows7-x64
8$PROGRAM_F...52.exe
windows10-2004-x64
8File,Diz.exe
windows7-x64
10File,Diz.exe
windows10-2004-x64
10Lang2052.exe
windows7-x64
8Lang2052.exe
windows10-2004-x64
8asfcore.dll
windows7-x64
3asfcore.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 17:03
Behavioral task
behavioral1
Sample
HA_AimOneSR-1310_CZ.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
HA_AimOneSR-1310_CZ.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/delay.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/delay.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/installoptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/installoptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/killprocdll.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/killprocdll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsweb.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsweb.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/startmenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/startmenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/system.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/system.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/textreplace.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/textreplace.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/time.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/time.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PROGRAM_FILES/Baidu/bar/TempData.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
$PROGRAM_FILES/Baidu/bar/TempData.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PROGRAM_FILES/Baidu/bar/baidubar.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$PROGRAM_FILES/Baidu/bar/baidubar.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PROGRAM_FILES_COMMON/NSISLog/Lang2052.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
$PROGRAM_FILES_COMMON/NSISLog/Lang2052.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
File,Diz.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
File,Diz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Lang2052.exe
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Lang2052.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
asfcore.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
asfcore.dll
Resource
win10v2004-20240802-en
General
-
Target
File,Diz.exe
-
Size
59KB
-
MD5
e61a7d645be1ecf477768a5692dab291
-
SHA1
6d16b732f64c1ece53b977879abf4475e92df54d
-
SHA256
1416265d1190c73ef32f7ab8fee94f4db3d65b889eb1e47d20e349b5dc004040
-
SHA512
4916d34e432509f3455c3dcac37697bbccad164e892f4b6aaf3f20773100aa78ae1c39a43b0d11aa6d966e888c0aba4a3fb4b06e847c7719a377904439e6f95c
-
SSDEEP
768:HhZIoeO3J/tU/zs9ZFgfAKRxMZxfha5JZespJ4cg7uhmHjhGY2ICoYQPWEiuTUCz:zcOZ/tU/zfIgE3Hu0jXbWuwC5t
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files (x86)\Common Files\COMM\install.exe = "C:\\Program Files (x86)\\Common Files\\COMM\\install.exe:*:Enabled:install.exe" File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Program Files (x86)\Common Files\COMM\install.exe = "C:\\Program Files (x86)\\Common Files\\COMM\\install.exe:*:Enabled:install.exe" File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Program Files (x86)\Common Files\COMM\Network.exe = "C:\\Program Files (x86)\\Common Files\\COMM\\Network.exe:*:Enabled:Network.exe" File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Program Files (x86)\Common Files\UPDATE\update.exe = "C:\\Program Files (x86)\\Common Files\\UPDATE\\update.exe:*:Enabled:update.exe" File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\QQNewVer\QQUpdate.DAT = "C:\\Users\\Admin\\AppData\\Local\\Temp\\QQNewVer\\QQUpdate.DAT:*:Enabled:QQUpdate.DAT" File,Diz.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List File,Diz.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files (x86)\Common Files\COMM\Network.exe = "C:\\Program Files (x86)\\Common Files\\COMM\\Network.exe:*:Enabled:Network.exe" File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files (x86)\Common Files\UPDATE\update.exe = "C:\\Program Files (x86)\\Common Files\\UPDATE\\update.exe:*:Enabled:update.exe" File,Diz.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\QQNewVer\QQUpdate.DAT = "C:\\Users\\Admin\\AppData\\Local\\Temp\\QQNewVer\\QQUpdate.DAT:*:Enabled:QQUpdate.DAT" File,Diz.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 QQUpdate.DAT -
Loads dropped DLL 6 IoCs
pid Process 2808 File,Diz.exe 2692 QQUpdate.DAT 2692 QQUpdate.DAT 2692 QQUpdate.DAT 2692 QQUpdate.DAT 2692 QQUpdate.DAT -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QQUpdate.DAT Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language File,Diz.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2692 2808 File,Diz.exe 30 PID 2808 wrote to memory of 2692 2808 File,Diz.exe 30 PID 2808 wrote to memory of 2692 2808 File,Diz.exe 30 PID 2808 wrote to memory of 2692 2808 File,Diz.exe 30 PID 2808 wrote to memory of 2692 2808 File,Diz.exe 30 PID 2808 wrote to memory of 2692 2808 File,Diz.exe 30 PID 2808 wrote to memory of 2692 2808 File,Diz.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\File,Diz.exe"C:\Users\Admin\AppData\Local\Temp\File,Diz.exe"1⤵
- Modifies firewall policy service
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\QQNewVer\QQUpdate.DAT"C:\Users\Admin\AppData\Local\Temp\QQNewVer\QQUpdate.DAT" /NCRC2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5eb118c331f3aaa1da1d5f72f9a6989c8
SHA13ea0ab75f73ec2ff1894a852ddfe54efc34094c9
SHA256149c5e1aa34be7ba013f5eb24d7810184d835da5ad4958b1c87cfe61e7faa4d1
SHA5128abe5561fa3acb25fd0d9fd6037f98cfc36f98e4e7a9d75ffe206e5e17af69cbc3e8e282f3b28c4e5d84232f15113fe8736f299ebc4d66a55a12deb770deded1
-
Filesize
12KB
MD5ed1a0e9f2e43d0b9911c20830bf9c70b
SHA16dc197bea1dcf81444148fb7cf963dc5f0fdda7d
SHA256eb2aae4b1168d2cea71975ade37869988fab95346b8d4e8948dfa5b102f62f69
SHA5126fb0210958b7579656e9f793adf4a03e2d5619ac6d76ecd2ce7ad8402bfe3273db68a04e551d8e3e76b6e9fd4fc09b5a3714db1e2da61c023ed998365427bed5
-
Filesize
10KB
MD510c44246d99a1c2e5f5e6b52b111a63d
SHA10f41da79c3e789f4ae38738e3a5d73c538f8af4f
SHA2567a24883bdbf08ce90938094b6ab6f09a842af10b18b8ae4d70da2e6b806490b8
SHA512e5b0fa27cd02a67be5eb9c63646621d3e9ccfada98659c50dee8310a58ce12e1a6a059788b85f0f440067ed7e281a0e1a526b9403993b9000f91a51bfbb50da3