Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 18:11

General

  • Target

    0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe

  • Size

    10.4MB

  • MD5

    ddfb1b1851b82a8faf4efc30e0920a2c

  • SHA1

    5ae74181cb3070f95dae47d516fce38dabb2ca12

  • SHA256

    0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5

  • SHA512

    a62e00672b7108da3511696ec54a8f5641c28d50ae67c33f314d17d290de45a73f66480f067353b28db170ccb8dff3d1a2d84aa5c84eb4c4323274286e00abe2

  • SSDEEP

    98304:rdcN81M9ap6prSwzbs3usPB5aEc9fiQXHZKdmll0OKOVP:rE81fXwzITaf9fNX5Kdml17t

Malware Config

Signatures

  • UAC bypass 3 TTPs 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe
    "C:\Users\Admin\AppData\Local\Temp\0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ipconfig /all
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\system32\ipconfig.exe
        ipconfig /all
        3⤵
        • Gathers network information
        PID:2704
    • C:\Windows\System32\netsh.exe
      "C:\Windows\System32\netsh.exe" -f C:\Users\Public\Pictures\Ca02g.xml
      2⤵
      • Event Triggered Execution: Netsh Helper DLL
      PID:2968
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Roaming\g0Cw6.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\Windows\system32\reg.exe
        reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t reg_dword /d 0 /F
        3⤵
        • UAC bypass
        PID:1704
      • C:\Windows\system32\reg.exe
        reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t reg_dword /d 0 /F
        3⤵
        • UAC bypass
        PID:2548
      • C:\Windows\system32\reg.exe
        reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v PromptOnSecureDesktop /t reg_dword /d 0 /F
        3⤵
        • UAC bypass
        PID:2544
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy /b C:\Users\Public\Pictures\1tBze\d8X1C~f1\p+C:\Users\Public\Pictures\1tBze\d8X1C~f1\w C:\Users\Public\Pictures\1tBze\d8X1C~f1\DuiLib_u.dll
      2⤵
        PID:2672
    • C:\Windows\system32\mmc.exe
      C:\Windows\system32\mmc.exe -Embedding
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Users\Public\Pictures\1tBze\d8X1C~f1\QKWebGame.exe
        "C:\Users\Public\Pictures\1tBze\d8X1C~f1\QKWebGame.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2836

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\g0Cw6.bat

            Filesize

            392B

            MD5

            30d6eb22d6aeec10347239b17b023bf4

            SHA1

            e2a6f86d66c699f6e0ff1ac4e140af4a2a4637d1

            SHA256

            659df6b190a0b92fc34e3a4457b4a8d11a26a4caf55de64dfe79eb1276181f08

            SHA512

            500872c3f2f3f801ec51717690873194675cb7f32cc4a862c09d90c18638d364d49b0e04c32323f52734e5c806e3503a63ac755c7019d762786a72840123df76

          • C:\Users\Public\Pictures\1tBze\d8X1C~f1\DuiLib_u.dll

            Filesize

            1.8MB

            MD5

            e16f0b62de12aaff7a24a315d690c900

            SHA1

            9c948f3047a98dd6145ad02f53d9f838d314b128

            SHA256

            5afb82b21dd4bf9ae78616508fccf764aefb924b730170f3feb991a9fcd69185

            SHA512

            e0e99e3f78a91830d831419d9699908a9d71488d4b0ff8a21554079e0ee66c2f84a8901252de508f93d93a9789a983cb7641486c678cbf418f5a255af0cc2b4f

          • C:\Users\Public\Pictures\1tBze\d8X1C~f1\NH.txt

            Filesize

            179KB

            MD5

            37cdfe167ddf3907517f4ff2fc77cc55

            SHA1

            e05eab66aa7c9b01454992bc6cbabb65d3bf9a2c

            SHA256

            7cfca7e5ca6a753a9fb9657327870d0ac2e7c80a9b621a53c624e08e0e57c10c

            SHA512

            705e7b3049a2b065e95cd23420bcb45a6ffc9120c3e4725aa913464d4a5e0c14c44877ae90c67ea443c166ca772b1300a3ca9f054e5795315bdcf300993899a3

          • C:\Users\Public\Pictures\1tBze\d8X1C~f1\QKWebGame.exe

            Filesize

            281KB

            MD5

            48bbd491254798b9c54870e9ff2d828c

            SHA1

            59f1bb621348d88dd00af7832c4bb59751af9272

            SHA256

            b805a1d6509c7b272f4d8085a651021dd49699f846c65b853c5d01ddd11d4cc8

            SHA512

            92cb432036de54396a53faeaa709948108a3db2eae396644ffe6f34aa7b83ce283739eb764d7e0d88b79c6a4699429daf29c17315ad289d20c3c54570f3db924

          • C:\Users\Public\Pictures\1tBze\d8X1C~f1\p

            Filesize

            944KB

            MD5

            fe6c0f5cc5d3f845c2bfe96495cfa19c

            SHA1

            6233c9cc0e19b7c4cf5ad128b334b0499d51a391

            SHA256

            63a3021096d01789d833433f923951b3ce5e1fa26f18d91006c5255b4d743d39

            SHA512

            44372bee926598a1cd26c03b2bb178d510c857039127b8d99da7e86c1d215cb462126288c2db897f9d1a032205d56bb023be219505aed02917b235343e50d508

          • C:\Users\Public\Pictures\1tBze\d8X1C~f1\w

            Filesize

            944KB

            MD5

            83da137e013e8c46af0040db9fc48144

            SHA1

            0b17156c4aa3ddab4b7c2f5cbcaa99e621427f08

            SHA256

            1315ba541596c3ed1ee7276ca185f53197c5443d44f5a2a680ca30803e7d4175

            SHA512

            a3cc114a86a862e2f0716f2b3fc326908c165a30e376d1c8aac09e7232e56d94a90d18d996bee576aab5b1ee17052d832ad3ca52a0cff54980891e56b2b320ad

          • \Users\Public\Pictures\1tBze\d8X1C~f1\HTTP.dll

            Filesize

            138KB

            MD5

            b9b83dbbce575e349911a0d2e9adc0ac

            SHA1

            7b30d05cb495da9790d2eb2566ca5e587d52c10e

            SHA256

            0a57f3ef7a95b7de7d355dce93765a86103e56ce580957ef04c00e8fdaa7cf6b

            SHA512

            e66378a5e80b318476cfc4d124139d34ab95e3e317f66c4bac64bc2616c3d123c05502552f6262a1a08e9b42992d0bb777d45150c22cace337d571c1b966e906

          • \Users\Public\Pictures\1tBze\d8X1C~f1\QKLogSvr.dll

            Filesize

            222KB

            MD5

            c9b9a4107b653130ef74406e7f758482

            SHA1

            51bdee3a32f45f48a7974f810070bade3f15b8d3

            SHA256

            55c1fb9d0785b8f73b6e87bc6e5ea09c0ced8581cc37db004893f3e5150d7031

            SHA512

            caf5a8af356d7bd147bd0ec38a9c8c9c9b2fcaaa2fa139522bd005b1bb64df06f837acc7577148457a754e2671e56f140850c6970b076eb2bdf99f4776d69621

          • memory/1544-18-0x0000000180000000-0x00000001801CF000-memory.dmp

            Filesize

            1.8MB

          • memory/1544-0-0x0000000180000000-0x00000001801CF000-memory.dmp

            Filesize

            1.8MB

          • memory/1544-4-0x0000000180000000-0x00000001801CF000-memory.dmp

            Filesize

            1.8MB

          • memory/1544-5-0x0000000180000000-0x00000001801CF000-memory.dmp

            Filesize

            1.8MB

          • memory/1544-3-0x0000000180000000-0x00000001801CF000-memory.dmp

            Filesize

            1.8MB

          • memory/1544-2-0x0000000180000000-0x00000001801CF000-memory.dmp

            Filesize

            1.8MB

          • memory/2836-25-0x0000000000080000-0x00000000000A6000-memory.dmp

            Filesize

            152KB

          • memory/2836-30-0x0000000000D70000-0x0000000000DD9000-memory.dmp

            Filesize

            420KB