Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 00:17

General

  • Target

    360驱动大师v2.0.0.2050绿色纯净版/360DrvMgr/360DrvMgr.exe

  • Size

    1.4MB

  • MD5

    b05427e95473bf8af9d9672123311c39

  • SHA1

    a97b786b99de1b8b9b37589836b2215951eb4d16

  • SHA256

    a8456ac02baca984ae32e84d1e7ca767b0705a1d5156539fb618c7c1e7059837

  • SHA512

    876417bd046bbd378c395b13a94266f108117a396a767652b6c306d76dbedd6a81aa7e9183375a55b004beeab4736a139104967d4c9b8e764744c9a612fa84da

  • SSDEEP

    24576:WQIT4kiQI/MZtEwOQOPC3dnXE7MS7pTB+uQJ:FMKkdnXE7MopTAx

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 20 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\360驱动大师v2.0.0.2050绿色纯净版\360DrvMgr\360DrvMgr.exe
    "C:\Users\Admin\AppData\Local\Temp\360驱动大师v2.0.0.2050绿色纯净版\360DrvMgr\360DrvMgr.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\360驱动大师v2.0.0.2050绿色纯净版\360DrvMgr\ComputerZService.exe
      "C:\Users\Admin\AppData\Local\Temp\360驱动大师v2.0.0.2050绿色纯净版\360DrvMgr\ComputerZService.exe"
      2⤵
      • Checks BIOS information in registry
      • Enumerates connected drives
      • Writes to the Master Boot Record (MBR)
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Checks SCSI registry key(s)
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

    Filesize

    471B

    MD5

    e66b4be0fb1ea89e2e64ec5ca84f96ff

    SHA1

    36f25c3658128ed44589dc12731d162a5e2f42e0

    SHA256

    12c17de89c3dfbe8ffe80ae395d63ed3087164e1bf4731afd3d4b94c607c7c7d

    SHA512

    0d5cc28b2a942b649e3415fb4f2d043636eced3ba6a226fb6a9131d3ef7d040dcbfbfb29364f3b828672e897704bf5f6dd847f5a53b1e366a28e477b8d0eb5c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66AE3BFDF94A732B262342AD2154B86E_B94B0F2F07332C3F5B6A37DB89E3F3B7

    Filesize

    471B

    MD5

    ec705b1ada20794370e854ef1c477fc9

    SHA1

    f03848c564b23be6fd6b008bdb507419f950decf

    SHA256

    8ae2da6e73760de027727931c9b8a6553a24570edfbd4b44b395f42553df4487

    SHA512

    cd74bd9bf6a18c3963e62d67b92299d13124024f2063cc2cf0bef7e187ccdd67faea604da15383b642fd86f7587ca6cf50f7360db0e86762bb89f58e5bd8b091

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

    Filesize

    404B

    MD5

    7c9bed8c4f3a10e1d8f58a3097234147

    SHA1

    2e9e6e7264fb90e07632ccb445cc98340deaa99b

    SHA256

    242e7742b847a1bdd45b6c32a52306a9755d04c43a95bd451c40d698d4701f5b

    SHA512

    1a2d067d9e81fdc2e274060244618b3f7ed0b2e7bc47d394a2c0f271a6a76deab151533288bc19f4180e6bd53eb71b51ab85ba9d9a9f6fa154f6321465cae9ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66AE3BFDF94A732B262342AD2154B86E_B94B0F2F07332C3F5B6A37DB89E3F3B7

    Filesize

    404B

    MD5

    390c8079abf88455f558a8eaf38fe341

    SHA1

    6866e659339caf23c5b2857221800f31186a5a7e

    SHA256

    1fc6855a486616f7247a02f6c6313c9e5299a5356ca565854c462f0ff4351da1

    SHA512

    fe61af220ea927eab2792af941c61cc56ba109c73f1b50ecdde7e67a1c15e2b2fcecc975933803fd644d64803b54b3796bc7c2a3d4f02fefd5f3e7aa947dd4f3

  • C:\Users\Admin\AppData\Local\Temp\360驱动大师v2.0.0.2050绿色纯净版\360DrvMgr\ComputerZ.set

    Filesize

    154B

    MD5

    964259d39663bdf75b07f9ae769b51d7

    SHA1

    6cae031106a55500d3a4fa729e4b6c32d45bc3a1

    SHA256

    0e1184fed8ed4d673f960a5a289c3d6a6c5a30ae78bc7e67ffd3af1592e7525b

    SHA512

    8d9529fe4b9c9101696c24375b3b648c777ffd4df1fba49af0e85c8ae284e8344edd9fee8d096a1309ead2bba715b738e985fbd9677e251fa47d969c12be2903

  • C:\Users\Admin\AppData\Local\Temp\360驱动大师v2.0.0.2050绿色纯净版\360DrvMgr\ComputerZ.set

    Filesize

    166B

    MD5

    ae7d6838b071f14d25b7f7e826915c59

    SHA1

    7ce7fa08b198ae900dc1432853a423b9452e66f8

    SHA256

    5fb26e7afd6006a4a183b14a0afed039303c6c2daa69938e79106071a05caf8a

    SHA512

    d7dc8f04297b95be9fe8d77956665e796c05bfcc8e7ee8e0e865a5c4c793565e64dca7aa9b60f07e2127c61dc23e519a1c79f1a57e71cbe07932d75739569091

  • C:\Users\Admin\AppData\Local\Temp\360驱动大师v2.0.0.2050绿色纯净版\360DrvMgr\ComputerZ.set

    Filesize

    43B

    MD5

    9e245d2355575c33f98a2df2758ca02b

    SHA1

    5159aec49a07737a398b98eb7b144b6798663421

    SHA256

    3a1ccc5933195aa6058cae3eee87201125635ac75d5b0884740638e0d4217ba7

    SHA512

    5aa7c866f482d78099e266b4977a2f4fdc75d47daead76a842d54fa6568b7a24da210bbd7f68488b15d9ed0665523f7053dc0a58bf66f1aae4847e0dee630349

  • C:\Users\Admin\AppData\Local\Temp\360驱动大师v2.0.0.2050绿色纯净版\360DrvMgr\ComputerZ.set

    Filesize

    58B

    MD5

    af3d1eae08d4a84efc83fcc7fa5c4509

    SHA1

    75b1cb01ae624e369b9c27b6754799c30434545e

    SHA256

    862f068871e0ff58c7e0ce96ac4698c96ee979c596b2ec6ae70839a8a3c89930

    SHA512

    526f29daab5d170eb3ab5bc86578134e205c52a146b9481bf18a44851411560cab3e8ecf33ce251076837d04145524dd075217da05a7c19a3c2864dc4011296a

  • C:\Users\Admin\AppData\Local\Temp\360驱动大师v2.0.0.2050绿色纯净版\360DrvMgr\ComputerZ.set

    Filesize

    74B

    MD5

    634d2d0ade861873fb010e7adc6d906c

    SHA1

    41aa77281e68a1c93c4343607895454e469658ca

    SHA256

    e35ddba52a1b921a3ae8a9d94ec0ffbef9e51d78c097acf43738be5434f3694e

    SHA512

    77a0daecb6e4cdad4a2be0fc0f6b45b0eada9d68816d289e80009b744bb2fc3a96877014476b1edd6e85c19c748aa482e0a5f5cf974c13c76002f482add3dd1c

  • C:\Users\Admin\AppData\Local\Temp\360驱动大师v2.0.0.2050绿色纯净版\360DrvMgr\ComputerZ.set

    Filesize

    154B

    MD5

    17e2ef28e2cb4e4f468b224d4f274e6b

    SHA1

    cf7a6f8e5e6a181277bfb330353d9b214908157c

    SHA256

    f6e246739063e27cc4750171a1e9ccc57c186a7fbdfd02ac616a0843bdb8d9b0

    SHA512

    76b1eec272442a8034caa7b498d35740073c878fb0e656b38fccb6238de3f25db77b6617227079cb5e2ed63d7699a79bd626963e00d45906453b521c1cc106fc

  • C:\Users\Admin\AppData\Roaming\360DrvMgr\Config.ini

    Filesize

    57B

    MD5

    6d63813c12ca56d6240cff46d9a46330

    SHA1

    8d7f01db6d3bc11e730b0fd3b40635bf526c450b

    SHA256

    50291f46574a12702ea22f58928817ef88230c246149a13e2cc80447aa2e54c5

    SHA512

    42623fd6583b80b75a2cb819c6a8c16b2c074ff09c8aa29d22e9678b1d53afe74700ef29624a0cd6f10ec5850a077ee6591a8d99ac9127bcbb03ac3e66249045

  • C:\Users\Admin\AppData\Roaming\360DrvMgr\Config.ini

    Filesize

    93B

    MD5

    2e1b7385dc1991ad6e6fa41e77c48a63

    SHA1

    df8d2c294e2445b315c9756f5101384b67adc69a

    SHA256

    44a7d22dc854f131b7e843f3356f2edf4ef120e12b58041d0f377921c6beec58

    SHA512

    d8ec3caa3e1d96e21968be496c7344b010070efe585e074a5fcb425c7d4b8e28082474030af7cc3ffe5c3831729f44243f40317d65d7050f1c953f10b815f851

  • memory/1732-53-0x0000000003910000-0x0000000003911000-memory.dmp

    Filesize

    4KB

  • memory/1732-0-0x0000000077370000-0x0000000077380000-memory.dmp

    Filesize

    64KB

  • memory/1732-8-0x0000000003910000-0x0000000003911000-memory.dmp

    Filesize

    4KB

  • memory/1732-2-0x0000000077232000-0x0000000077233000-memory.dmp

    Filesize

    4KB

  • memory/1732-3-0x0000000077370000-0x0000000077380000-memory.dmp

    Filesize

    64KB

  • memory/3580-34-0x0000000077370000-0x0000000077380000-memory.dmp

    Filesize

    64KB