Overview
overview
10Static
static
520240923_install.exe
windows7-x64
520240923_install.exe
windows10-2004-x64
5240923名�...��.exe
windows7-x64
1240923名�...��.exe
windows10-2004-x64
5img01.exe
windows7-x64
1img01.exe
windows10-2004-x64
1加班调�...��.exe
windows7-x64
5加班调�...��.exe
windows10-2004-x64
5本单位2.... .exe
windows7-x64
1本单位2.... .exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 18:24
Behavioral task
behavioral1
Sample
20240923_install.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240923_install.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
240923名录手册.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
240923名录手册.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
img01.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
img01.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
加班调休政策更新通知.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
加班调休政策更新通知.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
本单位2024年上半年工作总结和下半年工作安排.docx ... .exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
本单位2024年上半年工作总结和下半年工作安排.docx ... .exe
Resource
win10v2004-20240802-en
General
-
Target
20240923_install.exe
-
Size
6.1MB
-
MD5
af3b09dc8f43ff7698b730ff6b784ad7
-
SHA1
64b493ed97860eb865e8d43f51c1adf81dd712c9
-
SHA256
afd5e03f10dbda275fc21e9e6b2387c99ee8f5977df22cd395082b9f825a2623
-
SHA512
edf170607e74fbbabc29ff50efb2be30baa0e12a231e9ab131380ef842ce4e7874b2e03fd6acabd2b9f05a33ee1b855c3afccc43cecfbbf2b213acae65dc6efe
-
SSDEEP
98304:efRnOrG2ohf0kGVrr0K4aueL2hbiD9kl7fIJJDKnD0F9OuuJFVyYU8tK:epeGjhMk60gTwbi6IoM9O3JFV5U8tK
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 844 set thread context of 2052 844 svchost.exe 32 PID 2052 set thread context of 2984 2052 svchost.exe 33 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CENTRALPROCESSOR\0\~MHZ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 svchost.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2236 20240923_install.exe 2236 20240923_install.exe 2236 20240923_install.exe 2692 assist.exe 2692 assist.exe 2692 assist.exe 2216 assist.exe 2216 assist.exe 2216 assist.exe 844 svchost.exe 844 svchost.exe 2052 svchost.exe 2052 svchost.exe 2984 dllhost.exe 2984 dllhost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2216 assist.exe Token: SeDebugPrivilege 2216 assist.exe Token: SeDebugPrivilege 844 svchost.exe Token: SeDebugPrivilege 2052 svchost.exe Token: SeDebugPrivilege 2052 svchost.exe Token: SeDebugPrivilege 2052 svchost.exe Token: SeDebugPrivilege 2052 svchost.exe Token: SeAssignPrimaryTokenPrivilege 844 svchost.exe Token: SeIncreaseQuotaPrivilege 844 svchost.exe Token: SeSecurityPrivilege 844 svchost.exe Token: SeTakeOwnershipPrivilege 844 svchost.exe Token: SeLoadDriverPrivilege 844 svchost.exe Token: SeRestorePrivilege 844 svchost.exe Token: SeSystemEnvironmentPrivilege 844 svchost.exe Token: SeAssignPrimaryTokenPrivilege 844 svchost.exe Token: SeIncreaseQuotaPrivilege 844 svchost.exe Token: SeSecurityPrivilege 844 svchost.exe Token: SeTakeOwnershipPrivilege 844 svchost.exe Token: SeLoadDriverPrivilege 844 svchost.exe Token: SeSystemtimePrivilege 844 svchost.exe Token: SeBackupPrivilege 844 svchost.exe Token: SeRestorePrivilege 844 svchost.exe Token: SeShutdownPrivilege 844 svchost.exe Token: SeSystemEnvironmentPrivilege 844 svchost.exe Token: SeUndockPrivilege 844 svchost.exe Token: SeManageVolumePrivilege 844 svchost.exe Token: SeAssignPrimaryTokenPrivilege 844 svchost.exe Token: SeIncreaseQuotaPrivilege 844 svchost.exe Token: SeSecurityPrivilege 844 svchost.exe Token: SeTakeOwnershipPrivilege 844 svchost.exe Token: SeLoadDriverPrivilege 844 svchost.exe Token: SeRestorePrivilege 844 svchost.exe Token: SeSystemEnvironmentPrivilege 844 svchost.exe Token: SeAssignPrimaryTokenPrivilege 844 svchost.exe Token: SeIncreaseQuotaPrivilege 844 svchost.exe Token: SeSecurityPrivilege 844 svchost.exe Token: SeTakeOwnershipPrivilege 844 svchost.exe Token: SeLoadDriverPrivilege 844 svchost.exe Token: SeRestorePrivilege 844 svchost.exe Token: SeSystemEnvironmentPrivilege 844 svchost.exe Token: SeAuditPrivilege 844 svchost.exe Token: SeAssignPrimaryTokenPrivilege 844 svchost.exe Token: SeIncreaseQuotaPrivilege 844 svchost.exe Token: SeSecurityPrivilege 844 svchost.exe Token: SeTakeOwnershipPrivilege 844 svchost.exe Token: SeLoadDriverPrivilege 844 svchost.exe Token: SeSystemtimePrivilege 844 svchost.exe Token: SeBackupPrivilege 844 svchost.exe Token: SeRestorePrivilege 844 svchost.exe Token: SeShutdownPrivilege 844 svchost.exe Token: SeSystemEnvironmentPrivilege 844 svchost.exe Token: SeUndockPrivilege 844 svchost.exe Token: SeManageVolumePrivilege 844 svchost.exe Token: SeAssignPrimaryTokenPrivilege 844 svchost.exe Token: SeIncreaseQuotaPrivilege 844 svchost.exe Token: SeSecurityPrivilege 844 svchost.exe Token: SeTakeOwnershipPrivilege 844 svchost.exe Token: SeLoadDriverPrivilege 844 svchost.exe Token: SeSystemtimePrivilege 844 svchost.exe Token: SeBackupPrivilege 844 svchost.exe Token: SeRestorePrivilege 844 svchost.exe Token: SeShutdownPrivilege 844 svchost.exe Token: SeSystemEnvironmentPrivilege 844 svchost.exe Token: SeUndockPrivilege 844 svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1184 2236 20240923_install.exe 21 PID 2236 wrote to memory of 1184 2236 20240923_install.exe 21 PID 2236 wrote to memory of 1184 2236 20240923_install.exe 21 PID 2236 wrote to memory of 1184 2236 20240923_install.exe 21 PID 2236 wrote to memory of 1184 2236 20240923_install.exe 21 PID 2216 wrote to memory of 844 2216 assist.exe 13 PID 2216 wrote to memory of 844 2216 assist.exe 13 PID 2216 wrote to memory of 844 2216 assist.exe 13 PID 844 wrote to memory of 2052 844 svchost.exe 32 PID 844 wrote to memory of 2052 844 svchost.exe 32 PID 844 wrote to memory of 2052 844 svchost.exe 32 PID 844 wrote to memory of 2052 844 svchost.exe 32 PID 844 wrote to memory of 2052 844 svchost.exe 32 PID 844 wrote to memory of 2052 844 svchost.exe 32 PID 2052 wrote to memory of 2984 2052 svchost.exe 33 PID 2052 wrote to memory of 2984 2052 svchost.exe 33 PID 2052 wrote to memory of 2984 2052 svchost.exe 33 PID 2052 wrote to memory of 2984 2052 svchost.exe 33 PID 2052 wrote to memory of 2984 2052 svchost.exe 33 PID 2052 wrote to memory of 2984 2052 svchost.exe 33
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\20240923_install.exe"C:\Users\Admin\AppData\Local\Temp\20240923_install.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\assist.exe"C:\Users\Admin\AppData\Local\Temp\assist.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Program Files\Windows NT\assist.exe"C:\Program Files\Windows NT\assist.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216