Overview
overview
10Static
static
3HA_SendLin...re.exe
windows7-x64
7HA_SendLin...re.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/Assi...fy.exe
windows7-x64
8$TEMP/Assi...fy.exe
windows10-2004-x64
8$R0.dll
windows7-x64
8$R0.dll
windows10-2004-x64
8Assist/$R0.dll
windows7-x64
6Assist/$R0.dll
windows10-2004-x64
6$TEMP/DUDU_HH.exe
windows7-x64
10$TEMP/DUDU_HH.exe
windows10-2004-x64
10SendLink.exe
windows7-x64
3SendLink.exe
windows10-2004-x64
3SendLink.url
windows7-x64
6SendLink.url
windows10-2004-x64
3SendLog.html
windows7-x64
3SendLog.html
windows10-2004-x64
3SlideShow.html
windows7-x64
3SlideShow.html
windows10-2004-x64
1Support.url
windows7-x64
5Support.url
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
HA_SendLink191_Fire.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
HA_SendLink191_Fire.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Splash.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Splash.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$TEMP/Assist_hanzify.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$TEMP/Assist_hanzify.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$R0.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$R0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Assist/$R0.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Assist/$R0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$TEMP/DUDU_HH.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$TEMP/DUDU_HH.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
SendLink.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
SendLink.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
SendLink.url
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
SendLink.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
SendLog.html
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
SendLog.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
SlideShow.html
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
SlideShow.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Support.url
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Support.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
uninst.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/DUDU_HH.exe
-
Size
220KB
-
MD5
0b2a860a558ca00e1b4f389b6d8be1e6
-
SHA1
5e5a12756446751482d3db2798bd954f2f49ee68
-
SHA256
81db7a9742cb8fb50f7a97a952388cb3f4a1a9d150bc84705f8c2abf2c71dafe
-
SHA512
2210d69d467358c3174bf0685bd6dc1236d56aa9a19246c58931ebf87fe955fb4ed5e9acbb328b1775930e20fa275781c0eb48dd6d943de46ff20dc8fe511147
-
SSDEEP
1536:OmcjI6qnGJWh7jtCY4d/2uXAEaTKKNZuYfoIRSPVOklNmUSxxbZl99JF:OHGnGAl5id+kQfJoIOVOklNmUSxx
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplica remotesetup.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List remotesetup.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile remotesetup.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications remotesetup.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\ remotesetup.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\remotesetup.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\remotesetup.exe:*:Enabled:DuDuAcc" remotesetup.exe -
Executes dropped EXE 1 IoCs
pid Process 4772 remotesetup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\DDD_Install_Program.job remotesetup.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DUDU_HH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remotesetup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4772 1856 DUDU_HH.exe 82 PID 1856 wrote to memory of 4772 1856 DUDU_HH.exe 82 PID 1856 wrote to memory of 4772 1856 DUDU_HH.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\DUDU_HH.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\DUDU_HH.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\remotesetup.exeC:\Users\Admin\AppData\Local\Temp\remotesetup.exe2⤵
- Modifies firewall policy service
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5431f73f47db54f39affaf01d059ddc19
SHA1494a98579d991201f79bc62138f3614eba7a6bf4
SHA256432ce523edf6eac5d01b085ebb8ccda80c16e72618ed4ef75312884b171fe281
SHA51294d5f6d28dbb9934013b2908e95a69374fcb93384c8333807a7bcf437b6e3638bf1aad92e894fbb282c28eebdcbda770752f2e43d9c6c7ac9e892c647ccab79b