Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 05:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
金稅五期(电脑版)-uninstall.exe
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
金稅五期(电脑版)-uninstall.exe
Resource
win10v2004-20241007-en
8 signatures
150 seconds
General
-
Target
金稅五期(电脑版)-uninstall.exe
-
Size
21.0MB
-
MD5
98ea3184eb9c88f9a8282e54b9b1df9d
-
SHA1
9ca39e8afaf165879687edba4f9d725945292b33
-
SHA256
7ad5db6178d3de2392f041b5402e9173bc0803d61e06b534c529bbcb5fa8ad37
-
SHA512
82a59577369a2c0bd84f2c11c1e88f4d2b1b58e985b07fed0535b7bd1badd85ad7cb3fbc3454b61d9bfcaa0efc08d45fbb5373686e2e567d8d114d78feba888f
-
SSDEEP
393216:9RbyUI273CAabyUI273CAjLeLfonQH3is0MIb63aL54BTRJsv6tWKFdu9Cd:9RbNIgyAabNIgyAqcSBT
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4600 set thread context of 2184 4600 svchost.exe 87 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHZ svchost.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3576 金稅五期(电脑版)-uninstall.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3576 金稅五期(电脑版)-uninstall.exe 3576 金稅五期(电脑版)-uninstall.exe 4600 svchost.exe 4600 svchost.exe 2184 dllhost.exe 2184 dllhost.exe 2184 dllhost.exe 2184 dllhost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 2184 dllhost.exe 2184 dllhost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe 4600 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3576 金稅五期(电脑版)-uninstall.exe Token: SeDebugPrivilege 4600 svchost.exe Token: SeDebugPrivilege 4600 svchost.exe Token: SeDebugPrivilege 4600 svchost.exe Token: SeDebugPrivilege 4600 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3576 金稅五期(电脑版)-uninstall.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3576 wrote to memory of 1156 3576 金稅五期(电脑版)-uninstall.exe 20 PID 3576 wrote to memory of 1156 3576 金稅五期(电脑版)-uninstall.exe 20 PID 3576 wrote to memory of 1156 3576 金稅五期(电脑版)-uninstall.exe 20 PID 3576 wrote to memory of 1156 3576 金稅五期(电脑版)-uninstall.exe 20 PID 4600 wrote to memory of 2184 4600 svchost.exe 87 PID 4600 wrote to memory of 2184 4600 svchost.exe 87 PID 4600 wrote to memory of 2184 4600 svchost.exe 87 PID 4600 wrote to memory of 2184 4600 svchost.exe 87 PID 4600 wrote to memory of 2184 4600 svchost.exe 87
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1156
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
-
C:\Users\Admin\AppData\Local\Temp\金稅五期(电脑版)-uninstall.exe"C:\Users\Admin\AppData\Local\Temp\金稅五期(电脑版)-uninstall.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3576