Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
portscan/VIP网络端口扫描.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
portscan/VIP网络端口扫描.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
portscan/lib.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
portscan/lib.exe
Resource
win10v2004-20240802-en
General
-
Target
portscan/VIP网络端口扫描.exe
-
Size
233KB
-
MD5
0c3f0786e4352a906929826b9a6972ad
-
SHA1
b80fc668a22a51fb0f6322376de72963fa83e94f
-
SHA256
7c81086ccc149053da52a981ece40b5a89e6f855d197e4f6970019f4b0a69027
-
SHA512
1a6b199169f905312f46b35c001ba68fab60c94f901fd850f358f1de382cd889111fe7e9ce3c6110a2e75292b4824bc9febc2a24e0395634f98f38c39ba22f9c
-
SSDEEP
6144:PwD2mIZbQhEdvymKUwLml+VRE+fWQ4PInO:O2mBhEdv5KpLml2Fc
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini VIP网络端口扫描.exe File opened for modification C:\Windows\assembly\Desktop.ini VIP网络端口扫描.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly VIP网络端口扫描.exe File created C:\Windows\assembly\Desktop.ini VIP网络端口扫描.exe File opened for modification C:\Windows\assembly\Desktop.ini VIP网络端口扫描.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VIP网络端口扫描.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2040 4588 VIP网络端口扫描.exe 86 PID 4588 wrote to memory of 2040 4588 VIP网络端口扫描.exe 86 PID 4588 wrote to memory of 2040 4588 VIP网络端口扫描.exe 86 PID 2040 wrote to memory of 1988 2040 csc.exe 88 PID 2040 wrote to memory of 1988 2040 csc.exe 88 PID 2040 wrote to memory of 1988 2040 csc.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\portscan\VIP网络端口扫描.exe"C:\Users\Admin\AppData\Local\Temp\portscan\VIP网络端口扫描.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hokjcyqr.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBF98.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCBF97.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:1988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD572c9192f8aae6eb53d436a5d80d76885
SHA1644d9ce578f3ac705b6fe0d286622b87ea517dbd
SHA2569ffdc423e3221fb71fb15497b4d06a0059a162305f6002746e19083943103b79
SHA5126e0c38ce0c670180675a4956e30680a9181756ed4231952c64e1191ac881fbca51b907c4aec61ca8b96c8b7e3ca708de3676256f407876ddae23b26dfdea0bab
-
Filesize
18KB
MD508ff6e4ac56c568094669eed8bf65e21
SHA126410a4ccb287cf59d7f3c59d8f8cd05aede01e4
SHA25604285440091f73c40d54d5d1955a64345805495bbbd19039b3360fd69f971389
SHA51290c17b7ec6b811b3f781949ef765813b5ed7513406a68c541c3b9204eddb4baa64957f7e6ec522ee1646b24a701bddb4088e0ce6253d2510cd52f41df5b96a80
-
Filesize
700B
MD545b2589f3d3881e99a01986c246400c4
SHA1709f6bc8dd9775b5dc8941a1ec4954f0368549b1
SHA256f6c89f3444dd3c49cb119bc7f5cd3cd72fe76675c5aeccf315a45d4ae0ec5d15
SHA512190d4a5360d7134324ab7c9414ce6db25f41095ee826a3e928547cee33bc090587bd5f45638007378fc55363b08bda2f2f9de4da24014ae688ea1f59726c33ac
-
Filesize
35KB
MD587bc51248de71d3d4751bcc6c95384e3
SHA1b01ed474029f1a694358add062a081221e57e0f2
SHA256d31ea78633f5bd7f9b121a43b59c3aaddb9c6557d37906d3909b2d99fa8427b3
SHA512a6762b017119038a01a52c40280c407b387bcfead2da45fe104f64e8fc09a4bc75aee9c408614e50bb1c2d99fdba778651b85d5fc69842e7f3e6554444384bc9
-
Filesize
529B
MD55364d30c5a472a7f5eaf33b099bc4393
SHA1162109d969a94fee93c0c4141bc268864c522135
SHA256cc5e76f2965174c60fbdeb0b6f4d074cd235d21692aac4e7299d12cd1567aa3e
SHA5126383062293557f125c32d4ee14821df9772efab6a63a79ab2ee1a24dcff01a17a6d9c471a12fb8ec82a9c336f0020d83a38d7966df8ba5053c31e10123f3da25