Analysis

  • max time kernel
    115s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2024 22:07

General

  • Target

    127fa3cb3fa54d580eb0369fcca7640f388e0ed85c14a3661bd6d0aa5db43082.exe

  • Size

    232KB

  • MD5

    f58a38386bfb38a323a8081660ddef80

  • SHA1

    af55b0bf9cde4194a9b55cf03eb9613205c79122

  • SHA256

    127fa3cb3fa54d580eb0369fcca7640f388e0ed85c14a3661bd6d0aa5db43082

  • SHA512

    f616c62ee3bf29dd22a01d072e993b15e43658bbb757d5553ae27daabe5623b18871c284536f0894057df77c46c970feba16e9e4be91c91bb20abbd196f1d0b7

  • SSDEEP

    3072:k1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1Vne1i/NU82OMYcYU:Ci/NjO5xbg/CSUFLTwMjs6wi/N+O7

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs
  • Views/modifies file attributes 1 TTPs 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\127fa3cb3fa54d580eb0369fcca7640f388e0ed85c14a3661bd6d0aa5db43082.exe
    "C:\Users\Admin\AppData\Local\Temp\127fa3cb3fa54d580eb0369fcca7640f388e0ed85c14a3661bd6d0aa5db43082.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4364
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4364 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1656
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:2696
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • Suspicious use of WriteProcessMemory
      PID:4220
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:4908
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
        3⤵
        • Views/modifies file attributes
        PID:1704
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:4952
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • Suspicious use of WriteProcessMemory
      PID:4988
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:3912
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\WINDOWS\windows.exe"
        3⤵
        • Drops file in Windows directory
        • Views/modifies file attributes
        PID:4656
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"
      2⤵
      • Hide Artifacts: Hidden Files and Directories
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "c:\system.exe"
        3⤵
        • Views/modifies file attributes
        PID:4756
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4128,i,8915411528919259905,1376069533550353705,262144 --variations-seed-version --mojo-platform-channel-handle=3776 /prefetch:8
    1⤵
      PID:4924

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Active Setup

    1
    T1547.014

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Active Setup

    1
    T1547.014

    Defense Evasion

    Modify Registry

    3
    T1112

    Hide Artifacts

    2
    T1564

    Hidden Files and Directories

    2
    T1564.001

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07DB822C3548410165E7DFA39F71BDE_5D5868E022B51140803CC8EE59C05FA9
      Filesize

      1KB

      MD5

      1cc3e8eb1dccaebb9cf5861548cff859

      SHA1

      39879ef62c696ac63a1d2a4d73b0991be4af2b4b

      SHA256

      2aad2744daae3bdbb50e6003b4d4ac2df0136b762761af925f8eba8587888899

      SHA512

      672f4f3684d219d8fb4ba91eb12d34203c5d133d0abec90372fd84d7e9f93b08203c44424fd887eda7ebb6f15d75c4038edaa63ce994b9895524be25554c6ac2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07DB822C3548410165E7DFA39F71BDE_5D5868E022B51140803CC8EE59C05FA9
      Filesize

      414B

      MD5

      03ce770dd136fd93fb0964fffbe5819f

      SHA1

      f6068f99e6cf27635767573f461363e1c3f7784a

      SHA256

      db21f411cca041ebe07735cdc8984e4e39924971fd11136b7c2db676d148d970

      SHA512

      9e3825133fd696eee4d780443607f9e4c633fe4be6f6db363684e3cc5c894e7ebd7bdc666aa1ceeecef5d3f9c0cef38009f923a617de933c955fce5e43ad5465

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07DB822C3548410165E7DFA39F71BDE_5D5868E022B51140803CC8EE59C05FA9
      Filesize

      414B

      MD5

      67b963d47480a135ea006e41d54bca78

      SHA1

      a4362796b36d64de0c48c07d346d23bcd0a02a84

      SHA256

      3893159a73208b848309b2eb90c1538c41964ddb2b37e4bde08af8e5e8cdf0da

      SHA512

      3a14b3fb8758b62ae242cda5ff9ae395c8ee5e5b58612f2dfef7b6e691a1ab874cc03e3bef9ae421a7ad3fe3c5baf6e19757ca98b048d86380955e2d32a874e9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\T3O0220F\favicon[1].htm
      Filesize

      776B

      MD5

      0542ad8156f4dfca7ddcfcb62a6cb452

      SHA1

      485282ba12fc0daf6f6aed96f1ababb8f91a6324

      SHA256

      c90cdefdb6d7ad5a9a132e0d3b74ecdb5b0d5b442da482129ba67925a2f47e8f

      SHA512

      0b41affa129277bf4b17d3e103dc4c241bc2ac338858cc17c22e172ec2ac65539b63e802246efb462cd134d99907d9c5ed9bc03937cadcca3155b703ac6e3195

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\T3O0220F\js-sdk-pro.min[1].js
      Filesize

      33KB

      MD5

      24bb520e9517f2ed3ed987b46aeaf723

      SHA1

      846723563d7dd2bff3954f93633b11af0103adc8

      SHA256

      d1f1bfe698f2ffb7b3e7a885a301d58f9554d45df0a31c3e8b53c84b33c80d27

      SHA512

      31afbcd2ee87c84cc3e56355da8ddc741a69d918c2687984265745d8046deb18c494cbca6aaf8d4eae6b035e888e6f7cf9b0d59a255f2714963d7b3edbb3c87f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\T3O0220F\suggestions[1].en-US
      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\WINDOWS\windows.exe
      Filesize

      232KB

      MD5

      ea4979e12d27ecdc97fd206664e3004d

      SHA1

      49e6d5491119f9c1b7fdcafde98e98bd87173724

      SHA256

      87ccdb80c9c44b71253c2f5af8a4d682821f482df9523545eb42700d9dca8986

      SHA512

      7e23a30765eacfde91005776e26cf8d9b5ca256cf1c82c1029a356fc9cde850965d813837d55adc023eb58039a27a70c7569bd65404ad850e13cd0f165f8c90e

    • C:\system.exe
      Filesize

      232KB

      MD5

      e333ecd9caadaf115057ace35fe0fdd4

      SHA1

      c41e49d6f74010275af5a1d07406d034db5a98ef

      SHA256

      e54fd5987e73b0e80017325e1e3ec38ad149c40c637854c7154d6861f9f7e449

      SHA512

      2cbf8cab9e731042cfeb370f2889c6784a5f74367f8e614ac34c2ea786c8c181672c4a131cb99df971420eee9ef3f2f783954cf48b5d4e1a5947a1c9df1c4e15

    • memory/4660-0-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/4660-388-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB