Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 23:04

General

  • Target

    IS918MPTool_GA_221228A_L85C_Beta_V0=指定/IS918MPTrigger.exe

  • Size

    2.6MB

  • MD5

    b1047b89e5921f218354f26fd29a73d7

  • SHA1

    3d6f2a06d46e0a6538f0a923facd11d8bc0ab4c0

  • SHA256

    f33a68422edfb592a9a51f7532775badc6d8037f5823303f96d41e70b0c64d18

  • SHA512

    f55ff19087c9605af0721edd9254b6ecdc43f522896fc9fd579c22e0af6639563728dd47803ee5bb8de4a8d290247052f626bb315d9a673861938974be13ad4f

  • SSDEEP

    49152:ZCd9yvy5NhpZbTChxKCnFnQXBbrtgb/iQvu0UHOQGP:5vy5NhpZ6hxvWbrtUTrUHOlP

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IS918MPTool_GA_221228A_L85C_Beta_V0=指定\IS918MPTrigger.exe
    "C:\Users\Admin\AppData\Local\Temp\IS918MPTool_GA_221228A_L85C_Beta_V0=指定\IS918MPTrigger.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Users\Admin\AppData\Local\Temp\@AE7205.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\@AE7205.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:284
          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:892
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
              6⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1948
              • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 892
                7⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2592
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat" "
                  8⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:604
                  • C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                    "C:\Users\Admin\AppData\Local\Temp\wtmps.exe"
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:448
                    • C:\Windows\SysWOW64\mscaps.exe
                      "C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:580
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1916
      • C:\Users\Admin\AppData\Local\Temp\IS918MPTool_GA_221228A_L85C_Beta_V0=指定\IS918MPTrigger.exe
        "C:\Users\Admin\AppData\Local\Temp\IS918MPTool_GA_221228A_L85C_Beta_V0=指定\IS918MPTrigger.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\82D6.tmp

    Filesize

    406B

    MD5

    37512bcc96b2c0c0cf0ad1ed8cfae5cd

    SHA1

    edf7f17ce28e1c4c82207cab8ca77f2056ea545c

    SHA256

    27e678bf5dc82219d6edd744f0b82567a26e40f8a9dcd6487205e13058e3ed1f

    SHA512

    6d4252ab5aa441a76ce2127224fefcb221259ab4d39f06437b269bd6bfdaae009c8f34e9603ec734159553bc9f1359bdd70316cd426d73b171a9f17c41077641

  • C:\Users\Admin\AppData\Local\Temp\@AE7205.tmp.exe

    Filesize

    1.8MB

    MD5

    679f095845eff4cf89d7ae4596fe0335

    SHA1

    9e93d8d386d6bbe1bbb8f097fb78147bb55139b1

    SHA256

    83abfd7345b7203e18876ba4a3d7f208522c5f841f178ad7429a67f137b37c9b

    SHA512

    92e9a1a2bde5d2a6eb475aa628277967cddbd7613b3758c7f3f3161ad059cc260bb5987350a13370c1fbb60e55812eee057f020bdb7f8b1311b8b8985bc5e125

  • C:\Users\Admin\AppData\Local\Temp\IS918MPTool_GA_221228A_L85C_Beta_V0=指定\IS918MPTrigger.exe

    Filesize

    787KB

    MD5

    d3157606e61f6974da42fd4a117206f7

    SHA1

    153f986ca3a9b960386af4bab67e4ae02e5461f6

    SHA256

    c21f04841f7e628b3193c1ec3a3aea53cd22a160d5a638fd3f4e4117c00def90

    SHA512

    314c6e89a6944fb402a38cd031a0bbf93050064a9c7df45ddb9aa8d3c22e243dd78d4f9b0b76f6f53792989e18dd157eca11970d84f2dd5fd2cf00dd2ba62c4d

  • C:\Users\Admin\AppData\Local\Temp\tmp7742.tmp

    Filesize

    1.0MB

    MD5

    df2c63605573c2398d796370c11cb26c

    SHA1

    efba97e2184ba3941edb008fcc61d8873b2b1653

    SHA256

    07ffcde2097d0af67464907fec6a4079b92da11583013bae7d3313fa32312fe8

    SHA512

    d9726e33fcfa96415cc906bdb1b0e53eba674eaf30ed77d41d245c1c59aa53e222246f691d82fa3a45f049fbf23d441768f9da21370e489232770ad5ae91d32f

  • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

    Filesize

    129B

    MD5

    d1073c9b34d1bbd570928734aacff6a5

    SHA1

    78714e24e88d50e0da8da9d303bec65b2ee6d903

    SHA256

    b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

    SHA512

    4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

  • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

    Filesize

    196B

    MD5

    22f2579cf43c6ec0cc299d0b118f0e8f

    SHA1

    c54279985ba5cd779175d01e9c9108eddd552de6

    SHA256

    24a4813e8c4efaf10732503cbeba510a2543faeb29e8c9177b9ff91506f4538b

    SHA512

    4e7c50751e2fe7cd9fb9e8eebb0e53e2161a94b1f3d8a64e7134edbf97c737ecf2fff431ec3abf72fa384a82cfca48c8cbb4c7a81014fe8d245153c2a7d20b50

  • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

    Filesize

    125B

    MD5

    4f3f4ff9981717858cd79283a8adb514

    SHA1

    ca0f70ec3c551cc26144eae0c8eaeddfd947411b

    SHA256

    3bd0bc9a8b31fa288f5231c166a42b6fb3201d0d2555452d7146c26ec546b016

    SHA512

    6890be0f75f1cdf2270875465af83088546d2a555463a203ddd8fdc6c03985b2c2e049210ed20173106afd1b086438493be601e8815f12480f123c0759795f63

  • C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat

    Filesize

    102B

    MD5

    3ca08f080a7a28416774d80552d4aa08

    SHA1

    0b5f0ba641204b27adac4140fd45dce4390dbf24

    SHA256

    4e7d460b8dc9f2c01b4c5a16fb956aced10127bc940e8039a80c6455901ea1f0

    SHA512

    0c64aa462ff70473ef763ec392296fe0ea59b5340c26978531a416732bc3845adf9ca7b673cb7b4ba40cc45674351206096995c43600fccbbbe64e51b6019f01

  • C:\Windows\SysWOW64\mscaps.exe

    Filesize

    200KB

    MD5

    78d3c8705f8baf7d34e6a6737d1cfa18

    SHA1

    9f09e248a29311dbeefae9d85937b13da042a010

    SHA256

    2c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905

    SHA512

    9a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609

  • \Users\Admin\AppData\Local\Temp\wtmps.exe

    Filesize

    276KB

    MD5

    75c1467042b38332d1ea0298f29fb592

    SHA1

    f92ea770c2ddb04cf0d20914578e4c482328f0f8

    SHA256

    3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

    SHA512

    5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

  • \Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

    Filesize

    172KB

    MD5

    daac1781c9d22f5743ade0cb41feaebf

    SHA1

    e2549eeeea42a6892b89d354498fcaa8ffd9cac4

    SHA256

    6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

    SHA512

    190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

  • \Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

    Filesize

    1.8MB

    MD5

    a85b9f8a79481491169863347a26dd4e

    SHA1

    020a6d6bfa0193d728c8485b9ff7a87f164bd13a

    SHA256

    d278267cadcedbc0bd56f25d5015c4805dd0119f4e612871a34ab3c64e0f4c04

    SHA512

    536103edde9254c98f05ebe67cd7b88c53728c8cc011d4e508e561c9b9db0ef719c9447232b47c1648ae26ca59ee56fe160dfca18a7b990c18b1a9fce3e70e45

  • \Users\Admin\AppData\Roaming\Temp\mydll.dll

    Filesize

    202KB

    MD5

    7ff15a4f092cd4a96055ba69f903e3e9

    SHA1

    a3d338a38c2b92f95129814973f59446668402a8

    SHA256

    1b594e6d057c632abb3a8cf838157369024bd6b9f515ca8e774b22fe71a11627

    SHA512

    4b015d011c14c7e10568c09bf81894681535efb7d76c3ef9071fffb3837f62b36e695187b2d32581a30f07e79971054e231a2ca4e8ad7f0f83d5876f8c086dae

  • memory/2288-17-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB

  • memory/2592-373-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB