Overview
overview
10Static
static
520240923_install.exe
windows7-x64
520240923_install.exe
windows10-2004-x64
5240923名�...��.exe
windows7-x64
1240923名�...��.exe
windows10-2004-x64
5img01.exe
windows7-x64
1img01.exe
windows10-2004-x64
1加班调�...��.exe
windows7-x64
5加班调�...��.exe
windows10-2004-x64
5本单位2.... .exe
windows7-x64
1本单位2.... .exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 08:21
Behavioral task
behavioral1
Sample
20240923_install.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
20240923_install.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
240923名录手册.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
240923名录手册.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
img01.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
img01.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
加班调休政策更新通知.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
加班调休政策更新通知.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
本单位2024年上半年工作总结和下半年工作安排.docx ... .exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
本单位2024年上半年工作总结和下半年工作安排.docx ... .exe
Resource
win10v2004-20240802-en
General
-
Target
20240923_install.exe
-
Size
6.1MB
-
MD5
af3b09dc8f43ff7698b730ff6b784ad7
-
SHA1
64b493ed97860eb865e8d43f51c1adf81dd712c9
-
SHA256
afd5e03f10dbda275fc21e9e6b2387c99ee8f5977df22cd395082b9f825a2623
-
SHA512
edf170607e74fbbabc29ff50efb2be30baa0e12a231e9ab131380ef842ce4e7874b2e03fd6acabd2b9f05a33ee1b855c3afccc43cecfbbf2b213acae65dc6efe
-
SSDEEP
98304:efRnOrG2ohf0kGVrr0K4aueL2hbiD9kl7fIJJDKnD0F9OuuJFVyYU8tK:epeGjhMk60gTwbi6IoM9O3JFV5U8tK
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 848 set thread context of 2688 848 svchost.exe 30 PID 2688 set thread context of 2716 2688 svchost.exe 31 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\appcompat\programs\RecentFileCache.bcf svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CENTRALPROCESSOR\0\~MHZ svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2944 20240923_install.exe 2944 20240923_install.exe 2944 20240923_install.exe 2352 assist.exe 2352 assist.exe 2352 assist.exe 2436 assist.exe 2436 assist.exe 2436 assist.exe 848 svchost.exe 848 svchost.exe 2688 svchost.exe 2716 dllhost.exe 2716 dllhost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2716 dllhost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2436 assist.exe Token: SeDebugPrivilege 2436 assist.exe Token: SeDebugPrivilege 848 svchost.exe Token: SeDebugPrivilege 2688 svchost.exe Token: SeDebugPrivilege 2688 svchost.exe Token: SeDebugPrivilege 2688 svchost.exe Token: SeDebugPrivilege 2688 svchost.exe Token: SeAssignPrimaryTokenPrivilege 848 svchost.exe Token: SeIncreaseQuotaPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeTakeOwnershipPrivilege 848 svchost.exe Token: SeLoadDriverPrivilege 848 svchost.exe Token: SeSystemtimePrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeRestorePrivilege 848 svchost.exe Token: SeShutdownPrivilege 848 svchost.exe Token: SeSystemEnvironmentPrivilege 848 svchost.exe Token: SeUndockPrivilege 848 svchost.exe Token: SeManageVolumePrivilege 848 svchost.exe Token: SeAssignPrimaryTokenPrivilege 848 svchost.exe Token: SeIncreaseQuotaPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeTakeOwnershipPrivilege 848 svchost.exe Token: SeLoadDriverPrivilege 848 svchost.exe Token: SeSystemtimePrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeRestorePrivilege 848 svchost.exe Token: SeShutdownPrivilege 848 svchost.exe Token: SeSystemEnvironmentPrivilege 848 svchost.exe Token: SeUndockPrivilege 848 svchost.exe Token: SeManageVolumePrivilege 848 svchost.exe Token: SeAssignPrimaryTokenPrivilege 848 svchost.exe Token: SeIncreaseQuotaPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeTakeOwnershipPrivilege 848 svchost.exe Token: SeLoadDriverPrivilege 848 svchost.exe Token: SeSystemtimePrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeRestorePrivilege 848 svchost.exe Token: SeShutdownPrivilege 848 svchost.exe Token: SeSystemEnvironmentPrivilege 848 svchost.exe Token: SeUndockPrivilege 848 svchost.exe Token: SeManageVolumePrivilege 848 svchost.exe Token: SeAssignPrimaryTokenPrivilege 848 svchost.exe Token: SeIncreaseQuotaPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeTakeOwnershipPrivilege 848 svchost.exe Token: SeLoadDriverPrivilege 848 svchost.exe Token: SeSystemtimePrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeRestorePrivilege 848 svchost.exe Token: SeShutdownPrivilege 848 svchost.exe Token: SeSystemEnvironmentPrivilege 848 svchost.exe Token: SeUndockPrivilege 848 svchost.exe Token: SeManageVolumePrivilege 848 svchost.exe Token: SeAssignPrimaryTokenPrivilege 848 svchost.exe Token: SeIncreaseQuotaPrivilege 848 svchost.exe Token: SeSecurityPrivilege 848 svchost.exe Token: SeTakeOwnershipPrivilege 848 svchost.exe Token: SeLoadDriverPrivilege 848 svchost.exe Token: SeSystemtimePrivilege 848 svchost.exe Token: SeBackupPrivilege 848 svchost.exe Token: SeRestorePrivilege 848 svchost.exe Token: SeShutdownPrivilege 848 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2944 wrote to memory of 1180 2944 20240923_install.exe 21 PID 2944 wrote to memory of 1180 2944 20240923_install.exe 21 PID 2944 wrote to memory of 1180 2944 20240923_install.exe 21 PID 2944 wrote to memory of 1180 2944 20240923_install.exe 21 PID 2944 wrote to memory of 1180 2944 20240923_install.exe 21 PID 2436 wrote to memory of 848 2436 assist.exe 13 PID 2436 wrote to memory of 848 2436 assist.exe 13 PID 2436 wrote to memory of 848 2436 assist.exe 13 PID 848 wrote to memory of 2688 848 svchost.exe 30 PID 848 wrote to memory of 2688 848 svchost.exe 30 PID 848 wrote to memory of 2688 848 svchost.exe 30 PID 848 wrote to memory of 2688 848 svchost.exe 30 PID 848 wrote to memory of 2688 848 svchost.exe 30 PID 848 wrote to memory of 2688 848 svchost.exe 30 PID 2688 wrote to memory of 2716 2688 svchost.exe 31 PID 2688 wrote to memory of 2716 2688 svchost.exe 31 PID 2688 wrote to memory of 2716 2688 svchost.exe 31 PID 2688 wrote to memory of 2716 2688 svchost.exe 31 PID 2688 wrote to memory of 2716 2688 svchost.exe 31 PID 2688 wrote to memory of 2716 2688 svchost.exe 31 PID 848 wrote to memory of 1780 848 svchost.exe 32 PID 848 wrote to memory of 1780 848 svchost.exe 32 PID 848 wrote to memory of 1780 848 svchost.exe 32
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵PID:1780
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\20240923_install.exe"C:\Users\Admin\AppData\Local\Temp\20240923_install.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\assist.exe"C:\Users\Admin\AppData\Local\Temp\assist.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Program Files\Windows NT\assist.exe"C:\Program Files\Windows NT\assist.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436