Overview
overview
6Static
static
AutoReg.exe
windows7-x64
6AutoReg.exe
windows10-2004-x64
6main9.htm
windows7-x64
1main9.htm
windows10-2004-x64
1www.168318...XP.url
windows7-x64
1www.168318...XP.url
windows10-2004-x64
1使用说明.htm
windows7-x64
1使用说明.htm
windows10-2004-x64
1小游戏.url
windows7-x64
1小游戏.url
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
AutoReg.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AutoReg.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
main9.htm
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
main9.htm
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
www.168318.com -- 一路发,升又发 - Powered By BBSXP.url
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
www.168318.com -- 一路发,升又发 - Powered By BBSXP.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
使用说明.htm
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
使用说明.htm
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
小游戏.url
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
小游戏.url
Resource
win10v2004-20220812-en
General
-
Target
AutoReg.exe
-
Size
3.5MB
-
MD5
3b495949f589588064b6a4097f27d79f
-
SHA1
6cfca65e3d414dd8111c4e49f614024deb99fb31
-
SHA256
e33b1b70563ec14243c4030cc173316eaa85453f0ddac28afd7b47aceb55d5bf
-
SHA512
6ca3f875afca22067acc53fbb6eab228a31457ccd0030da885ef0da0f1d5c4c7828b6e55d059f4fd053d049f0d43b09dd1322517e5e746391d9593437cf64a74
-
SSDEEP
98304:DmJkREXM39UBJ1OgvRAyFGT63p2FGT63p:0kIkYvJAfele
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AutoReg.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4220 AutoReg.exe 4220 AutoReg.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4220 AutoReg.exe 4220 AutoReg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4220 AutoReg.exe 4220 AutoReg.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4220 wrote to memory of 3780 4220 AutoReg.exe 84 PID 4220 wrote to memory of 3780 4220 AutoReg.exe 84 PID 4220 wrote to memory of 3780 4220 AutoReg.exe 84 PID 4220 wrote to memory of 792 4220 AutoReg.exe 86 PID 4220 wrote to memory of 792 4220 AutoReg.exe 86 PID 4220 wrote to memory of 792 4220 AutoReg.exe 86 PID 4220 wrote to memory of 3572 4220 AutoReg.exe 88 PID 4220 wrote to memory of 3572 4220 AutoReg.exe 88 PID 4220 wrote to memory of 3572 4220 AutoReg.exe 88 PID 4220 wrote to memory of 208 4220 AutoReg.exe 90 PID 4220 wrote to memory of 208 4220 AutoReg.exe 90 PID 4220 wrote to memory of 208 4220 AutoReg.exe 90 PID 4220 wrote to memory of 3664 4220 AutoReg.exe 92 PID 4220 wrote to memory of 3664 4220 AutoReg.exe 92 PID 4220 wrote to memory of 3664 4220 AutoReg.exe 92 PID 4220 wrote to memory of 3864 4220 AutoReg.exe 94 PID 4220 wrote to memory of 3864 4220 AutoReg.exe 94 PID 4220 wrote to memory of 3864 4220 AutoReg.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoReg.exe"C:\Users\Admin\AppData\Local\Temp\AutoReg.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\~RomDmp1\RomDump.com > C:\Users\Admin\AppData\Local\Temp\~RomDmp1\Rom.dmp2⤵PID:3780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\~RomDmp1\RomDump.com > C:\Users\Admin\AppData\Local\Temp\~RomDmp1\Rom.dmp2⤵PID:792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\~RomDmp1\RomDump.com > C:\Users\Admin\AppData\Local\Temp\~RomDmp1\Rom.dmp2⤵PID:3572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\~RomDmp1\RomDump.com > C:\Users\Admin\AppData\Local\Temp\~RomDmp1\Rom.dmp2⤵PID:208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\~RomDmp1\RomDump.com > C:\Users\Admin\AppData\Local\Temp\~RomDmp1\Rom.dmp2⤵PID:3664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\~RomDmp1\RomDump.com > C:\Users\Admin\AppData\Local\Temp\~RomDmp1\Rom.dmp2⤵PID:3864
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD574ea83a987cf7e29fe79b16b15b4bbed
SHA1452a79ee1211fad2efdfaf203e4b092f937208fc
SHA2569b327617c8c6fc6c70b7ada3ea40edcb143f0925d0c33fbb8a0a366020deed9d
SHA51235334ba33584b60b2774a4404706d88382b4ab647a3e9afe231e7910246c6fb851a2ae860652771fe2809e40abdc922d75f08616b8dc1ea16e2eefa572000355
-
Filesize
46B
MD574ea83a987cf7e29fe79b16b15b4bbed
SHA1452a79ee1211fad2efdfaf203e4b092f937208fc
SHA2569b327617c8c6fc6c70b7ada3ea40edcb143f0925d0c33fbb8a0a366020deed9d
SHA51235334ba33584b60b2774a4404706d88382b4ab647a3e9afe231e7910246c6fb851a2ae860652771fe2809e40abdc922d75f08616b8dc1ea16e2eefa572000355
-
Filesize
46B
MD574ea83a987cf7e29fe79b16b15b4bbed
SHA1452a79ee1211fad2efdfaf203e4b092f937208fc
SHA2569b327617c8c6fc6c70b7ada3ea40edcb143f0925d0c33fbb8a0a366020deed9d
SHA51235334ba33584b60b2774a4404706d88382b4ab647a3e9afe231e7910246c6fb851a2ae860652771fe2809e40abdc922d75f08616b8dc1ea16e2eefa572000355
-
Filesize
46B
MD574ea83a987cf7e29fe79b16b15b4bbed
SHA1452a79ee1211fad2efdfaf203e4b092f937208fc
SHA2569b327617c8c6fc6c70b7ada3ea40edcb143f0925d0c33fbb8a0a366020deed9d
SHA51235334ba33584b60b2774a4404706d88382b4ab647a3e9afe231e7910246c6fb851a2ae860652771fe2809e40abdc922d75f08616b8dc1ea16e2eefa572000355
-
Filesize
46B
MD574ea83a987cf7e29fe79b16b15b4bbed
SHA1452a79ee1211fad2efdfaf203e4b092f937208fc
SHA2569b327617c8c6fc6c70b7ada3ea40edcb143f0925d0c33fbb8a0a366020deed9d
SHA51235334ba33584b60b2774a4404706d88382b4ab647a3e9afe231e7910246c6fb851a2ae860652771fe2809e40abdc922d75f08616b8dc1ea16e2eefa572000355
-
Filesize
46B
MD574ea83a987cf7e29fe79b16b15b4bbed
SHA1452a79ee1211fad2efdfaf203e4b092f937208fc
SHA2569b327617c8c6fc6c70b7ada3ea40edcb143f0925d0c33fbb8a0a366020deed9d
SHA51235334ba33584b60b2774a4404706d88382b4ab647a3e9afe231e7910246c6fb851a2ae860652771fe2809e40abdc922d75f08616b8dc1ea16e2eefa572000355