Overview
overview
9Static
static
9momicAlar_...��.cmd
windows7-x64
1momicAlar_...��.cmd
windows10-2004-x64
7momicAlar_...��.cmd
windows7-x64
1momicAlar_...��.cmd
windows10-2004-x64
7momicAlar_...��.url
windows7-x64
1momicAlar_...��.url
windows10-2004-x64
1momicAlar_...er.dll
windows7-x64
1momicAlar_...er.dll
windows10-2004-x64
1momicAlar_...ta.dll
windows7-x64
8momicAlar_...ta.dll
windows10-2004-x64
8momicAlar_...��.exe
windows7-x64
8momicAlar_...��.exe
windows10-2004-x64
8momicAlar_...��.exe
windows7-x64
9momicAlar_...��.exe
windows10-2004-x64
9momicAlar_...��.url
windows7-x64
1momicAlar_...��.url
windows10-2004-x64
1momicAlar_...��.url
windows7-x64
1momicAlar_...��.url
windows10-2004-x64
1Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 22:03
Behavioral task
behavioral1
Sample
momicAlar_gpxz/!)支持我们的网站.cmd
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
momicAlar_gpxz/!)支持我们的网站.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
momicAlar_gpxz/@使用帮助.cmd
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
momicAlar_gpxz/@使用帮助.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/BaiDu_谷普下载.url
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/BaiDu_谷普下载.url
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/ConfigCenter.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/ConfigCenter.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/jedata.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/jedata.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/米乐营销 - 旺旺状态检测 测试版.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/米乐营销 - 旺旺状态检测 测试版.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/补丁.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
momicAlar_gpxz/momicAlar_gpxz/momicAlar/momicAlar/补丁.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
momicAlar_gpxz/哥乖.url
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
momicAlar_gpxz/哥乖.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
momicAlar_gpxz/在线游戏.url
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
momicAlar_gpxz/在线游戏.url
Resource
win10v2004-20220812-en
General
-
Target
momicAlar_gpxz/!)支持我们的网站.cmd
-
Size
1KB
-
MD5
64dbeaf8befb07b01a4989021ddfbb1e
-
SHA1
10c4305148c4f7fb641a0ada7c03f6cbc77a3386
-
SHA256
e58bd470891c6bbd4420633a502ee23ccefad1d70cd5b11c2c1b87c67ca29312
-
SHA512
018d2e7aa65aa54ca34c82e1ac5e7b3a618afcb100d5e33eae39deab010dba4130cbcdfaadc83cff544a2eb7bc9a4aef73d1a4faa849b27f389e3fdd3c53c7bb
Malware Config
Signatures
-
Processes:
regedit.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.babaw.com/" regedit.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\SearchScopes regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{2153705A-F2F9-4220-83D8-EC1CEB581D21}" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\SearchScopes\Version = "1" regedit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
regedit.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.babaw.com/" regedit.exe -
Modifies registry class 3 IoCs
Processes:
regedit.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE http://www.babaw.com/" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\command regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command regedit.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 2044 regedit.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2016 wrote to memory of 2044 2016 cmd.exe regedit.exe PID 2016 wrote to memory of 2044 2016 cmd.exe regedit.exe PID 2016 wrote to memory of 2044 2016 cmd.exe regedit.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\momicAlar_gpxz\!)支持我们的网站.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\regedit.exeREGEDIT /S "C:\Users\Admin\AppData\Local\Temp.\DefOpen.reg"2⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Runs .reg file with regedit
PID:2044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
631B
MD521f47278069c8af79dc89aa668dfd3b4
SHA1675d72919fd5b9653e3e4086c70ecb488649bd70
SHA25679cc698586900744c993772ed6526bfa58d95de77a3ccb68929558dd3962c17e
SHA5126c32703688520d1d65d025773315f82d278089e25924b3af89793123221265d86036512a2405b9cca8a26d83016c6da3ef03af88884b9c26bf9fe3a922903431