Analysis
-
max time kernel
140s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 11:29
Behavioral task
behavioral1
Sample
断网关机 0.2/断网关机V0.2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
断网关机 0.2/断网关机V0.2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
断网关机 0.2/新云软件.url
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
断网关机 0.2/新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
断网关机 0.2/断网关机V0.2.exe
-
Size
467KB
-
MD5
6c3847d104bddaa4865a8bdd2282539c
-
SHA1
d9a956eadf66d64c4db337a2bee183872ec15dea
-
SHA256
6c81c4cc509b598ca1c7277a93404c01f78016bec0a49bdd648351401b4cbe52
-
SHA512
9f3025132a476e18e1e49c4b664f2374217ca85f475ae603b1c80bde7d07b5dfeaeb8bc29a0406014c54606d9f2db8cd1cf379d26ed14c61620584ba18e55d90
-
SSDEEP
12288:sh3Fm0NIFZB+j4jSLn8FoXyVkWVPZtx5bqvm:sh3FmdZ8hz8F+YxVPHbqe
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 断网关机V0.2.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\IESettingSync 断网关机V0.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 断网关机V0.2.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 断网关机V0.2.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 断网关机V0.2.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 456 断网关机V0.2.exe 456 断网关机V0.2.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 456 断网关机V0.2.exe 456 断网关机V0.2.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 456 断网关机V0.2.exe 456 断网关机V0.2.exe 456 断网关机V0.2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\断网关机 0.2\断网关机V0.2.exe"C:\Users\Admin\AppData\Local\Temp\断网关机 0.2\断网关机V0.2.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:456