Analysis
-
max time kernel
127s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 20:31
Behavioral task
behavioral1
Sample
2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe
Resource
win10v2004-20240802-en
General
-
Target
2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe
-
Size
256KB
-
MD5
8b4ca17a9410529abaa26b4c8759ac4d
-
SHA1
5bc73702d60eeac7c02d8fec38f1ff71df7015b5
-
SHA256
2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1
-
SHA512
2d0815565afa3f51b696c116378d708f50ce3a6858cd9542fb7469a0b6a9e98380f0d6636746e2c44af78a895ebfdb1bbe9c3274c2d6590875393903fb5adbe1
-
SSDEEP
6144:5DLQxoyQ1LpnFyZ+dayL9rvolH8u3ZhGod:BQCyQ1LHk+zR7QHjGo
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts 2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe -
Deletes itself 1 IoCs
pid Process 2956 cmd.exe -
resource yara_rule behavioral1/memory/1432-1-0x0000000000400000-0x000000000048C000-memory.dmp vmprotect behavioral1/memory/1432-0-0x0000000000400000-0x000000000048C000-memory.dmp vmprotect behavioral1/memory/1432-19-0x0000000000400000-0x000000000048C000-memory.dmp vmprotect behavioral1/files/0x0008000000015b50-21.dat vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2637.cn/?56" 2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1432 2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1432 wrote to memory of 2552 1432 2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe 30 PID 1432 wrote to memory of 2552 1432 2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe 30 PID 1432 wrote to memory of 2552 1432 2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe 30 PID 1432 wrote to memory of 2552 1432 2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe 30 PID 1432 wrote to memory of 2956 1432 2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe 31 PID 1432 wrote to memory of 2956 1432 2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe 31 PID 1432 wrote to memory of 2956 1432 2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe 31 PID 1432 wrote to memory of 2956 1432 2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe"C:\Users\Admin\AppData\Local\Temp\2898a421f8307de8955410999b5eda6956859afbd3c41379ab6001ca0a4be1a1.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2552
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\yyyy.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD53e4848e2c2d1bbd04be0347802be6179
SHA1daea195fca1c6c266c46fa555f65b61e44bea332
SHA256703a05630ea13947b64289634c5cb7a131c37aba7a8a3b78352fc1934ac98322
SHA5129dea2e096b756d4e52b61e85523f491071913529564537ccd20f73d98f85b43e92cff99c2d227f66835501a315f1a69ae172fd9ff784539a4786d0fbe72dab06
-
Filesize
337B
MD556b7eaab5ad989fa9f88d5e0175b4511
SHA15524668ed43610c94509370732fc712e6928c49c
SHA2568e1158b7ae8e390cae86fe457d4dd056775d457069524674a7a869b3de9fc10b
SHA512648e72e1f6e409c8fa7f8bb0094bbd155e4047db4d181ba897aaa6cc98f8bfa78341a87e2269a6bd1a43184c836aa33bc5bef11d3f96c32a95300434f13bda10
-
Filesize
2KB
MD5a1d921556cf3a3d9d26b2ef002a7f87e
SHA16d35761aa3c8d24ab25db1d6a6e8a964bebd7121
SHA256be7dfb47e11615f6b0cda24d8d568fccb6cea492112f723b8784ee26cbe5d309
SHA512282607c9fc123c57dff829e728c4b08fe7fa27a130903907856127c9aec7d7f2c83c8e6d812208291c495cf25af195404d9010391cf53fcd12f2647475acc049