Overview
overview
10Static
static
7HA_TWinMD5-042_CZ.exe
windows7-x64
3HA_TWinMD5-042_CZ.exe
windows10-2004-x64
3$PLUGINSDI...NS.dll
windows7-x64
3$PLUGINSDI...NS.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...NU.dll
windows7-x64
3$PLUGINSDI...NU.dll
windows10-2004-x64
3$PLUGINSDI...EM.dll
windows7-x64
3$PLUGINSDI...EM.dll
windows10-2004-x64
3$PLUGINSDIR/nsWeb.dll
windows7-x64
3$PLUGINSDIR/nsWeb.dll
windows10-2004-x64
3$PROGRAM_F...ar.dll
windows7-x64
7$PROGRAM_F...ar.dll
windows10-2004-x64
7$PROGRAM_F...52.exe
windows7-x64
8$PROGRAM_F...52.exe
windows10-2004-x64
8File,Diz.exe
windows7-x64
10File,Diz.exe
windows10-2004-x64
10Lang2052.exe
windows7-x64
8Lang2052.exe
windows10-2004-x64
8WinMD5.exe
windows7-x64
3WinMD5.exe
windows10-2004-x64
3uninst.exe
windows7-x64
3uninst.exe
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PROGRAM_F...ar.dll
windows7-x64
7$PROGRAM_F...ar.dll
windows10-2004-x64
7$PROGRAM_F...iz.exe
windows7-x64
10$PROGRAM_F...iz.exe
windows10-2004-x64
10�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
96s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 11:34
Behavioral task
behavioral1
Sample
HA_TWinMD5-042_CZ.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
HA_TWinMD5-042_CZ.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/INSTALLOPTIONS.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/INSTALLOPTIONS.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KILLPROCDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KILLPROCDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/STARTMENU.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/STARTMENU.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/SYSTEM.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/SYSTEM.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PROGRAM_FILES/Baidu/bar/BaiduBar.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PROGRAM_FILES/Baidu/bar/BaiduBar.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PROGRAM_FILES_COMMON/NSISLog/Lang2052.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PROGRAM_FILES_COMMON/NSISLog/Lang2052.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
File,Diz.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
File,Diz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Lang2052.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Lang2052.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
WinMD5.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
WinMD5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/KILLPROCDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/KILLPROCDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PROGRAM_FILES/Baidu/bar/BaiduBar.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PROGRAM_FILES/Baidu/bar/BaiduBar.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PROGRAM_FILES_COMMON/NSISLog/File,Diz.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
$PROGRAM_FILES_COMMON/NSISLog/File,Diz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
ⷴ.url
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
ⷴ.url
Resource
win10v2004-20240802-en
General
-
Target
File,Diz.exe
-
Size
65KB
-
MD5
cc28a1b886f4b737c382917973cdae4f
-
SHA1
f40482987bcf5aae9b5ca1bf42096c46422aca76
-
SHA256
bcbd1d3b34a41c75145f681d0b9bd359523b87e3088ee7a18a4812ce5fb1797d
-
SHA512
f032ccb4a49cdafb207ed85c16c6e15f42ecb6d240b7318df1fc253612229a67ae08d2e869041c1c204a7215d473e9c30fa4b418fee1ac617bf87a846979b971
-
SSDEEP
1536:nvheR/feSm4j2euX7BdHvW5U9fd4qi1dTwGhUxWf6l4Y:YR/fJaeuX7b+5U9F4T5hUwCv
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile File,Diz.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications File,Diz.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files (x86)\Common Files\SYN\update.exe = "C:\\Program Files (x86)\\Common Files\\SYN\\update.exe:*:Enabled:update.exe" File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files (x86)\Common Files\COMM\universalclient.exe = "C:\\Program Files (x86)\\Common Files\\COMM\\universalclient.exe:*:Enabled:universalclient.exe" File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\QQNewVer\QQUpdate.DAT = "C:\\Users\\Admin\\AppData\\Local\\Temp\\QQNewVer\\QQUpdate.DAT:*:Enabled:QQUpdate.DAT" File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files (x86)\Common Files\COMM\qqfaceclient.exe = "C:\\Program Files (x86)\\Common Files\\COMM\\qqfaceclient.exe:*:Enabled:qqfaceclient.exe" File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Program Files (x86)\Common Files\COMM\qqfaceclient.exe = "C:\\Program Files (x86)\\Common Files\\COMM\\qqfaceclient.exe:*:Enabled:qqfaceclient.exe" File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\QQNewVer\QQUpdate.DAT = "C:\\Users\\Admin\\AppData\\Local\\Temp\\QQNewVer\\QQUpdate.DAT:*:Enabled:QQUpdate.DAT" File,Diz.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications File,Diz.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List File,Diz.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Program Files (x86)\Common Files\COMM\universalclient.exe = "C:\\Program Files (x86)\\Common Files\\COMM\\universalclient.exe:*:Enabled:universalclient.exe" File,Diz.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Program Files (x86)\Common Files\SYN\update.exe = "C:\\Program Files (x86)\\Common Files\\SYN\\update.exe:*:Enabled:update.exe" File,Diz.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile File,Diz.exe -
Executes dropped EXE 1 IoCs
pid Process 3384 QQUpdate.DAT -
Loads dropped DLL 5 IoCs
pid Process 3384 QQUpdate.DAT 3384 QQUpdate.DAT 3384 QQUpdate.DAT 3384 QQUpdate.DAT 3384 QQUpdate.DAT -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language File,Diz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QQUpdate.DAT -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3384 2240 File,Diz.exe 83 PID 2240 wrote to memory of 3384 2240 File,Diz.exe 83 PID 2240 wrote to memory of 3384 2240 File,Diz.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\File,Diz.exe"C:\Users\Admin\AppData\Local\Temp\File,Diz.exe"1⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\QQNewVer\QQUpdate.DAT"C:\Users\Admin\AppData\Local\Temp\QQNewVer\QQUpdate.DAT" /NCRC2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5eb118c331f3aaa1da1d5f72f9a6989c8
SHA13ea0ab75f73ec2ff1894a852ddfe54efc34094c9
SHA256149c5e1aa34be7ba013f5eb24d7810184d835da5ad4958b1c87cfe61e7faa4d1
SHA5128abe5561fa3acb25fd0d9fd6037f98cfc36f98e4e7a9d75ffe206e5e17af69cbc3e8e282f3b28c4e5d84232f15113fe8736f299ebc4d66a55a12deb770deded1
-
Filesize
12KB
MD5ed1a0e9f2e43d0b9911c20830bf9c70b
SHA16dc197bea1dcf81444148fb7cf963dc5f0fdda7d
SHA256eb2aae4b1168d2cea71975ade37869988fab95346b8d4e8948dfa5b102f62f69
SHA5126fb0210958b7579656e9f793adf4a03e2d5619ac6d76ecd2ce7ad8402bfe3273db68a04e551d8e3e76b6e9fd4fc09b5a3714db1e2da61c023ed998365427bed5
-
Filesize
10KB
MD510c44246d99a1c2e5f5e6b52b111a63d
SHA10f41da79c3e789f4ae38738e3a5d73c538f8af4f
SHA2567a24883bdbf08ce90938094b6ab6f09a842af10b18b8ae4d70da2e6b806490b8
SHA512e5b0fa27cd02a67be5eb9c63646621d3e9ccfada98659c50dee8310a58ce12e1a6a059788b85f0f440067ed7e281a0e1a526b9403993b9000f91a51bfbb50da3