Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
HB_SpyEme06-30215_CZ.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
HB_SpyEme06-30215_CZ.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
se-setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
se-setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
非常世纪资源网.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
非常世纪资源网.url
Resource
win10v2004-20240802-en
General
-
Target
HB_SpyEme06-30215_CZ.exe
-
Size
1.3MB
-
MD5
9a11fb5f544680c61a145c35b3b11d19
-
SHA1
812a226a67a9c703712c4f3defa72ee760b87546
-
SHA256
d237ba18b45f5e38e2cc46ed47d875abcf915a410165cafea6cd6677a1ba290d
-
SHA512
96c2aa96b5917af5f46c0b6356ffd37259e9c33085ca617481442f9a05bb46db35644e12537843ce6eb399a82d4ff2ca1f60864249379301a04b2bce0fb2ca9a
-
SSDEEP
24576:8R9j0EOKFR5PCFYiz2VsDSDyse2IA2s747irAj+QWxajW/hTF8emsH:m9tOiCF/z2V1yTAB74Gu+QWkjGTKk
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00050000000191f1-18.dat acprotect -
Loads dropped DLL 6 IoCs
pid Process 2764 HB_SpyEme06-30215_CZ.exe 2764 HB_SpyEme06-30215_CZ.exe 2764 HB_SpyEme06-30215_CZ.exe 2764 HB_SpyEme06-30215_CZ.exe 2764 HB_SpyEme06-30215_CZ.exe 2764 HB_SpyEme06-30215_CZ.exe -
resource yara_rule behavioral1/files/0x00050000000191f1-18.dat upx behavioral1/memory/2764-21-0x000000007C340000-0x000000007C39F000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msvcr71.dll HB_SpyEme06-30215_CZ.exe File opened for modification C:\Windows\SysWOW64\msvcr71.dll HB_SpyEme06-30215_CZ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HB_SpyEme06-30215_CZ.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2764 HB_SpyEme06-30215_CZ.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 HB_SpyEme06-30215_CZ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HB_SpyEme06-30215_CZ.exe"C:\Users\Admin\AppData\Local\Temp\HB_SpyEme06-30215_CZ.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
910B
MD5e211df3a1dc8e82634ac291d29e7daff
SHA15def1500c215816ada17f1c5fbb7ea72d376f217
SHA256e3df3dcabd0f7d9306be2c99c1ab845f1d354001516fcb922853f30a48f25bcf
SHA5122e45b06235d3a499eb5e9238e60aaeb508adfd9f84a6a210b69d6d32ba702169e3301bcf7a6c31fd12c175404c9340d237da15f36f1edffd0d041f3447fe1a5f
-
Filesize
4KB
MD503a477dd69bd11877e2ac1953947c400
SHA1e33881e8203674cc94bc9fcbde3e1f65ed4be5c7
SHA25603c50276af73bb72b533f8936a57bbabe41e3b7d5e24cf60eb32f3b9df2cdd61
SHA512c8d657199b7c2e2d3c9d76897426b1b9f227bd9d341481f059ab1ae6d79514e94620ec6434e32a6a07095350c90a80bfa46384cef12e309ba6f661d2ddac81af
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822
-
Filesize
3KB
MD59c3488b5e9655d1837c3963ecec33f70
SHA1f0fa9b4c29e75c6e4419c4633d09f2797aee2ef3
SHA25605ef4beb7fab9d04c1fb251874166fa2d73a34b4a7f2b145d37a2fd00c88979a
SHA5126af9f88d65d2279a71620f2a656062b1737b3a9a1692ed4e5887bdee891ce08d21c5c0b25ab3acbe6da9fe255dcd7f8a517c2751e73dc56add216740c945e4a7
-
Filesize
12KB
MD5cce5450725a9429a1d3c7aa851d40e8d
SHA105722500e42757ac03f2558452a064b906e31937
SHA256d850c786a68df9520a3ecf2a96f4f091c9bae71d3adbf7731e8c172533cb266d
SHA5123ddb56429e097ecf942e8a5147ba4c4191c52b736df267934f0dca75ffa74faffee8911dda47c5d2542f91138abbcaf61be3e3d68b368631d6bc21e254b5c637
-
Filesize
10KB
MD524a04541a0d2312e472f8236fd205ea8
SHA1c47eeee6fc23590311f2860d80baa954386a8ce9
SHA25674d7ac9e94305c3d30cfc19279ee73fa891bd5ae8800610dee391d1880825e19
SHA51265e061d2776bc0db53ea8aa35fb50152818c74fa9735f1a5a370315c4dacaf2cb79374ec59174d86c2e87f5b0bb8662f8cee6ff97ae93261c9a9a05bd3cc1adf
-
Filesize
162KB
MD579e4b72e99bbc1280141fd4ce7b2d8e1
SHA1ecc213f0faae8a86a490f52d52b81f289948b491
SHA256b92ab0e3a5ebfc0a8526dfbbca49d0df1c88e3ca688cf885ea2ab1974e0355db
SHA512e2232c398e4833d9da2ab565a9fc70ee8ffa0bbc1ee1e867e7d4ad033bde3aef3c48e235eab26adaf8ae3afd556c536c7094cd3d885476cd893d69b0367db41b