Overview
overview
10Static
static
10ScreenCapt...r1.exe
windows7-x64
1ScreenCapt...r2.exe
windows7-x64
1ScreenCapt...rt.exe
windows7-x64
1ScreenCapt...er.exe
windows7-x64
1ScreenCapt...ck.exe
windows7-x64
1ScreenCapt...k1.exe
windows7-x64
1ScreenCapt...k2.exe
windows7-x64
1Setup (5).exe
windows7-x64
7Setup (6).exe
windows7-x64
7Supplement...16.scr
windows7-x64
3T1.exe
windows7-x64
10T1_b7afca7...b5.exe
windows7-x64
10TeenTube_90767.exe
windows7-x64
10Trojan-Ran....a.exe
windows7-x64
3Tuyen bo c...ed.doc
windows7-x64
4Tuyen bo c...ed.doc
windows7-x64
4UNPACKED.exe
windows7-x64
9Uninstall (2).exe
windows7-x64
3Uninstall.exe
windows7-x64
3Upx.exe
windows7-x64
5screenshot2016.exe
windows7-x64
7sidacertification.exe
windows7-x64
3spora.exe
windows7-x64
10svhost.exe
windows7-x64
10sys100s.exe_.exe
windows7-x64
9tordll.dll
windows7-x64
3uacbypass.exe
windows7-x64
3unpack.exe
windows7-x64
10unpacked.ex_.exe
windows7-x64
9unpacked.mem.exe
windows7-x64
10upd.exe
windows7-x64
6verhdiehndi.bat
windows7-x64
8Analysis
-
max time kernel
292s -
max time network
264s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:39
Behavioral task
behavioral1
Sample
ScreenCapture_Win8.MalwareScanner1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ScreenCapture_Win8.MalwareScanner2.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
ScreenCapture_Win8.PopupAlert.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
ScreenCapture_Win8.TaskServer.exe
Resource
win7-20241023-en
Behavioral task
behavioral5
Sample
ScreenCapture_Win8.WindowsLock.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ScreenCapture_Win8.WindowsLock1.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
ScreenCapture_Win8.WindowsLock2.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Setup (5).exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
Setup (6).exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Supplementary Agreement 26_01_2016.scr
Resource
win7-20240708-en
Behavioral task
behavioral11
Sample
T1.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
T1_b7afca788487347804156f052c613db5.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
TeenTube_90767.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Trojan-Ransom.Win32.Telecrypt.a.exe
Resource
win7-20241010-en
Behavioral task
behavioral15
Sample
Tuyen bo chung Viet Nam - Hoa Ky - Infected and EnCrypted.doc
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Tuyen bo chung Viet Nam - Hoa Ky - Infected.doc
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
UNPACKED.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
Uninstall (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Upx.exe
Resource
win7-20241010-en
Behavioral task
behavioral21
Sample
screenshot2016.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
sidacertification.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
spora.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
svhost.exe
Resource
win7-20240708-en
Behavioral task
behavioral25
Sample
sys100s.exe_.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
tordll.dll
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
uacbypass.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
unpack.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
unpacked.ex_.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
unpacked.mem.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
upd.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
verhdiehndi.bat
Resource
win7-20240903-en
General
-
Target
svhost.exe
-
Size
350KB
-
MD5
6fb915548ae2ce60326488761dedbe62
-
SHA1
cd2f503b3194f1e0987f7cfee123ffc323dbe5c1
-
SHA256
3594a403aca3195c3e9b74f95669e33548a06bfaccf6e9bc02b86767d38d214e
-
SHA512
51ee2953cb70a3b0ae344cc274381adebf77fc249732189c77d1e8dc8682040ad0ae6faf850a40af58fa63a13b0e75286562204e40f02da480e5444047095828
-
SSDEEP
6144:R19M6S33QFnHZxkcdaGB/D2IlV2qDClJL3tcTzQzerIaQTt7HYRh4E7kYFIhVF38:r9pSHKHZxkMBL2IlnYa18aOt74Ry+qhc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
reg.exereg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe, C:\\Program Files\\Common Files\\qip\\svhost.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe, C:\\Program Files\\Common Files\\qip\\svhost.exe" reg.exe -
Executes dropped EXE 2 IoCs
Processes:
1.exenetprotocol.exepid process 2692 1.exe 2828 netprotocol.exe -
Loads dropped DLL 4 IoCs
Processes:
cmd.exe1.exepid process 2808 cmd.exe 2808 cmd.exe 2692 1.exe 2692 1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Netprotocol = "C:\\Users\\Admin\\AppData\\Roaming\\netprotocol.exe" 1.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 2 IoCs
-
Processes:
resource yara_rule C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\1.exe upx behavioral24/memory/2808-8-0x0000000000120000-0x000000000015A000-memory.dmp upx C:\Users\Admin\AppData\Roaming\netprotocol.exe upx -
Drops file in Program Files directory 2 IoCs
Processes:
attrib.exeattrib.exedescription ioc process File opened for modification C:\Program Files\Common Files\qip attrib.exe File opened for modification C:\Program Files\Common Files\qip\svhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exe1.execmd.execmd.execmd.exeattrib.exesvhost.execmd.exereg.exereg.exeattrib.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
cmd.exepid process 2728 cmd.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
svhost.execmd.exe1.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1748 wrote to memory of 2808 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2808 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2808 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2808 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2728 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2728 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2728 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2728 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2168 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2168 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2168 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2168 1748 svhost.exe cmd.exe PID 2808 wrote to memory of 2692 2808 cmd.exe 1.exe PID 2808 wrote to memory of 2692 2808 cmd.exe 1.exe PID 2808 wrote to memory of 2692 2808 cmd.exe 1.exe PID 2808 wrote to memory of 2692 2808 cmd.exe 1.exe PID 1748 wrote to memory of 2604 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2604 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2604 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2604 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2616 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2616 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2616 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2616 1748 svhost.exe cmd.exe PID 2692 wrote to memory of 2828 2692 1.exe netprotocol.exe PID 2692 wrote to memory of 2828 2692 1.exe netprotocol.exe PID 2692 wrote to memory of 2828 2692 1.exe netprotocol.exe PID 2692 wrote to memory of 2828 2692 1.exe netprotocol.exe PID 1748 wrote to memory of 2628 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2628 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2628 1748 svhost.exe cmd.exe PID 1748 wrote to memory of 2628 1748 svhost.exe cmd.exe PID 2168 wrote to memory of 376 2168 cmd.exe reg.exe PID 2168 wrote to memory of 376 2168 cmd.exe reg.exe PID 2168 wrote to memory of 376 2168 cmd.exe reg.exe PID 2168 wrote to memory of 376 2168 cmd.exe reg.exe PID 2604 wrote to memory of 844 2604 cmd.exe reg.exe PID 2604 wrote to memory of 844 2604 cmd.exe reg.exe PID 2604 wrote to memory of 844 2604 cmd.exe reg.exe PID 2604 wrote to memory of 844 2604 cmd.exe reg.exe PID 2628 wrote to memory of 264 2628 cmd.exe attrib.exe PID 2628 wrote to memory of 264 2628 cmd.exe attrib.exe PID 2628 wrote to memory of 264 2628 cmd.exe attrib.exe PID 2628 wrote to memory of 264 2628 cmd.exe attrib.exe PID 2616 wrote to memory of 572 2616 cmd.exe attrib.exe PID 2616 wrote to memory of 572 2616 cmd.exe attrib.exe PID 2616 wrote to memory of 572 2616 cmd.exe attrib.exe PID 2616 wrote to memory of 572 2616 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 572 attrib.exe 264 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\1.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\1.exeC:\USERS\ADMIN\APPDATA\LOCAL\TEMP\1.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe4⤵
- Executes dropped EXE
PID:2828
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move /y "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\svhost.exe" "C:\Program Files\Common Files\qip\svhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v shell /t reg_sz /d "Explorer.exe, C:\Program Files\Common Files\qip\svhost.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\reg.exereg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v shell /t reg_sz /d "Explorer.exe, C:\Program Files\Common Files\qip\svhost.exe" /f3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:376
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon " /v shell /t reg_sz /d "Explorer.exe, C:\Program Files\Common Files\qip\svhost.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\reg.exereg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon " /v shell /t reg_sz /d "Explorer.exe, C:\Program Files\Common Files\qip\svhost.exe" /f3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:844
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Program Files\Common Files\qip\svhost.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Program Files\Common Files\qip\svhost.exe"3⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:572
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Program Files\Common Files\qip"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Program Files\Common Files\qip"3⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:264
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD57f550991510e8dd336b4321d719279b7
SHA13070f320a8f184ab1193dfc8cbfde6d5f91964c3
SHA256905246be7f2ac87e583b541364513dd82a10e4751c615e6490ab80be6825f48c
SHA512d0b6bad92cf6d6f8a98f0f343fdc6cb6b5a1e38c0fffa4b7209e0f3677aec8ddb8d678b55c3273aa59f9924353337a898dc74d85663321cda755ff36f9f0f858
-
Filesize
80KB
MD5c6e74cb0d7e7360d2815233db46955c8
SHA102564a38bdac76485b63733636df50038f2b46c0
SHA256b707cc9a8f323a32054401eb2e41dc88f49c727956cddb1f540793ba896cc41e
SHA5122ef09cecec6313a5ee8b2023bb6cc2e812dd2ff7c670d2c9f7e75576f53c987cf115b84f8e2795429d431168b1c232acbea61afe00b47ed488cf03ecd9481487