Analysis
-
max time kernel
127s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 18:25
Behavioral task
behavioral1
Sample
08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe
Resource
win10v2004-20240802-en
General
-
Target
08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe
-
Size
256KB
-
MD5
33cc5f48ea5e335b0ff5625fa1c57458
-
SHA1
8d781f0318829a6e5c7ec647afa7ee86343beb41
-
SHA256
08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e
-
SHA512
30c00240c4a63f0d79575b8ecbb9456da7b9af41f9afea12a91165b4507c8c281117e25e25d7adb28cda78838b4677264d00ec44a3d4196713f72835685d8988
-
SSDEEP
6144:ADLQxoyQ1LpnFyZ+dayL9rvolH8u3ZhGod:YQCyQ1LHk+zR7QHjGo
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts 08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe -
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
resource yara_rule behavioral1/memory/2416-0-0x0000000000400000-0x000000000048C000-memory.dmp vmprotect behavioral1/memory/2416-1-0x0000000000400000-0x000000000048C000-memory.dmp vmprotect behavioral1/memory/2416-19-0x0000000000400000-0x000000000048C000-memory.dmp vmprotect behavioral1/files/0x000700000001660d-21.dat vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2637.cn/?56" 08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2416 08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeShutdownPrivilege 2364 explorer.exe Token: SeShutdownPrivilege 2364 explorer.exe Token: SeShutdownPrivilege 2364 explorer.exe Token: SeShutdownPrivilege 2364 explorer.exe Token: SeShutdownPrivilege 2364 explorer.exe Token: SeShutdownPrivilege 2364 explorer.exe Token: SeShutdownPrivilege 2364 explorer.exe Token: SeShutdownPrivilege 2364 explorer.exe Token: SeShutdownPrivilege 2364 explorer.exe Token: SeShutdownPrivilege 2364 explorer.exe Token: SeShutdownPrivilege 2364 explorer.exe Token: SeShutdownPrivilege 2364 explorer.exe Token: SeShutdownPrivilege 2364 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe 2364 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2364 2416 08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe 30 PID 2416 wrote to memory of 2364 2416 08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe 30 PID 2416 wrote to memory of 2364 2416 08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe 30 PID 2416 wrote to memory of 2364 2416 08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe 30 PID 2416 wrote to memory of 2760 2416 08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe 31 PID 2416 wrote to memory of 2760 2416 08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe 31 PID 2416 wrote to memory of 2760 2416 08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe 31 PID 2416 wrote to memory of 2760 2416 08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe"C:\Users\Admin\AppData\Local\Temp\08db701359377f4365ece1949bc1057b4e2d0f065a6e4661bf94abd3576cbf0e.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2364
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\yyyy.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5b9a719fbee1cd27f76830ac7688a3cba
SHA1434b4afe3f8b1b9bb6d46bfe0a90713d4c0e6921
SHA25639844f94997490f34d8d0bb14cfd1d93062aecf349515a61c0440ed753937072
SHA5122cb2f2fa90283655499fcf999526541f93e1e85317ac33bd5a025d1ba1f8750bc254cff6f053e5672dfacfa6b502aa7ba6eee670ccf6915929961ab9b7e569b6
-
Filesize
337B
MD567991397936a8c2a5ce9851e4532d1ad
SHA1e65773a60fafa0f2b33689392c9da26970171610
SHA2563e849a9f4650b376b7d86d254e9b0b80d5095807b9ed5b2eee4195a8089ba1c7
SHA5122c75ec036e8714a6f3295e019d2fbe8274f5123820a351ab80a1260eefe30ce1a5e2dc030bc1de32fb4afae2becb9917309cce6840825b9dc739d2791e0da732
-
Filesize
2KB
MD5a1d921556cf3a3d9d26b2ef002a7f87e
SHA16d35761aa3c8d24ab25db1d6a6e8a964bebd7121
SHA256be7dfb47e11615f6b0cda24d8d568fccb6cea492112f723b8784ee26cbe5d309
SHA512282607c9fc123c57dff829e728c4b08fe7fa27a130903907856127c9aec7d7f2c83c8e6d812208291c495cf25af195404d9010391cf53fcd12f2647475acc049