Analysis
-
max time kernel
125s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 20:32
Behavioral task
behavioral1
Sample
河源下载站-cngr.cn.url
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
河源下载站-cngr.cn.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
淘宝热卖.url
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
淘宝热卖.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
腾龙刷车软件-免费版.exe
Resource
win7-20220901-en
General
-
Target
河源下载站-cngr.cn.url
-
Size
110B
-
MD5
87d5540eb47b60f225cc6d5e9ec5d3b5
-
SHA1
bb87c8cd2721eed95ed96cfed3c23a71dd636743
-
SHA256
7503e8e9530726e8934149fb2afc1a9638d8a4727cc05c6bed1c1b1539dc43fa
-
SHA512
ed81acc65c042f99ed20b511a755606e13619ddbd7e05125ecbcf5342ac9239329184d8b1b45d47ee4fc0ef4c62e06b2bd806b73f0f5c852173798e76d23a951
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{268E5207-497C-40AA-B2ED-A46435511A5C}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{04A714C3-0787-415F-B3A6-9BC2727A1F18}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\河源下载站-cngr.cn.url1⤵PID:1544
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:736