Analysis

  • max time kernel
    176s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 15:05

General

  • Target

    02e4fe7ecd54475b869b9492fd254002.exe

  • Size

    58KB

  • MD5

    02e4fe7ecd54475b869b9492fd254002

  • SHA1

    404a9bb26e7a7a475a01e47320bb1be282ba0163

  • SHA256

    3e38fb16a4489c43312720848eec12c3c4290f140894656bf5e5a8d345c7bb96

  • SHA512

    b7831a37b6b3ac2ecd44f5863545f350dd589dfff43eb3d062755e203b9fcaf00df79b8e5ee7bb97874fd3239b6cdeeb44895a53669849fd488ea34db440c2d1

  • SSDEEP

    768:61tCn/5uXkmSAV+HIJVtGTdLbRbMlvgIMYToQFTZJK536KQyi/7cgqt:WqoX8AV+otOdfIgIMYToQF9JKl3iTcgc

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02e4fe7ecd54475b869b9492fd254002.exe
    "C:\Users\Admin\AppData\Local\Temp\02e4fe7ecd54475b869b9492fd254002.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cuteftpmac09.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3664
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\1.bat
        3⤵
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1452
        • C:\PROGRA~1\INTERN~1\iexplore.exe
          C:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?82133
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3768
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3768 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1828
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\1.inf
          4⤵
            PID:944
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\2.bat
            4⤵
            • Drops file in Program Files directory
            • Suspicious use of WriteProcessMemory
            PID:1924
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?o"" /f
              5⤵
              • Modifies Internet Explorer settings
              • Modifies Internet Explorer start page
              PID:4108
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?o"" /f
              5⤵
              • Modifies Internet Explorer settings
              • Modifies Internet Explorer start page
              PID:3108
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f
              5⤵
              • Modifies registry class
              PID:3680
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\PROGRA~1\FREERA~1\3.bat""" /f
              5⤵
              • Modifies registry class
              PID:4740
            • C:\Windows\SysWOW64\attrib.exe
              attrib +s +h C:\PROGRA~1\FREERA~1\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}
              5⤵
              • Sets file to hidden
              • Drops file in Program Files directory
              • Views/modifies file attributes
              PID:2472
            • C:\Windows\SysWOW64\attrib.exe
              attrib +s +h C:\PROGRA~1\FREERA~1\tmp
              5⤵
              • Sets file to hidden
              • Drops file in Program Files directory
              • Views/modifies file attributes
              PID:2292
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32 D:\VolumeDH\inj.dat,MainLoad
              5⤵
                PID:5040
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\2.inf
                5⤵
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:4448
                • C:\Windows\SysWOW64\runonce.exe
                  "C:\Windows\system32\runonce.exe" -r
                  6⤵
                  • Checks processor information in registry
                  • Suspicious use of WriteProcessMemory
                  PID:4560
                  • C:\Windows\SysWOW64\grpconv.exe
                    "C:\Windows\System32\grpconv.exe" -o
                    7⤵
                      PID:4964
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?o"" /f
                  5⤵
                    PID:1124
            • C:\Users\Admin\AppData\Local\Temp\inlCA33.tmp
              C:\Users\Admin\AppData\Local\Temp\inlCA33.tmp
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2612
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inlCA33.tmp > nul
                3⤵
                  PID:3696
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\02E4FE~1.EXE > nul
                2⤵
                  PID:3008

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\PROGRA~1\FREERA~1\1.bat

                      Filesize

                      3KB

                      MD5

                      b7c5e3b416b1d1b5541ef44662e1a764

                      SHA1

                      8bff7ea2be2f3cf29f2381d8007198b5991ca3ae

                      SHA256

                      f1a2f9fdebb3cac24756e53fa5e1628b2bd1cc130480c1878e3b3bc880575cd1

                      SHA512

                      65dbd6a7a7cf6fec00e6b0f1d7d5655769e6087ad09cad74c91c5a3395e675ac8f9df5c7185327e6f8dd03ddb60504400f54237d9e4b53c8b08e7e3d41ee61fc

                    • C:\PROGRA~1\FREERA~1\1.inf

                      Filesize

                      492B

                      MD5

                      34c14b8530e1094e792527f7a474fe77

                      SHA1

                      f71c4e9091140256b34c18220d1dd1efab1f301d

                      SHA256

                      fe0dfb3458bfe2a3632d365e00765fa10f14d62e7dfa8b70a055c7eb9fdb6713

                      SHA512

                      25bb09b526e1e9f5c6052f1f7c36b37c956c1b5649936af8df3abfcf120c931f3d2603e17a061cb99d8c8074bfb1973a5423cce89762fca53cd46aeb3e8944a2

                    • C:\PROGRA~1\FREERA~1\2.bat

                      Filesize

                      3KB

                      MD5

                      6b78cb8ced798ca5df5612dd62ce0965

                      SHA1

                      5a9c299393b96b0bf8f6770e3c7b0318a9e2e0cf

                      SHA256

                      81f64f42edfac2863a55db8fabd528c4eefc67f7e658cad6a57eeec862e444e3

                      SHA512

                      b387ba10021f3284d1406d520a2c8b3ba0c87922d67c79394c1aa50c631194519ac6bb5b898956533f040d48e1c7b202734e0075f8fc8c8bfab82c8ef359b28e

                    • C:\PROGRA~1\FREERA~1\2.inf

                      Filesize

                      230B

                      MD5

                      f6dcb2862f6e7f9e69fb7d18668c59f1

                      SHA1

                      bb23dbba95d8af94ecc36a7d2dd4888af2856737

                      SHA256

                      c68fe97c64b68f00b3cc853ae6a6d324b470a558df57eac2593487978592eb2c

                      SHA512

                      eefe630b776d2144df39e9c385824374b3d546e30293d7efe10cc2d6bf6f2c932162bf80add1c8ca58afcc868ad02b3ffc104c0f111f3827f4385ee9f26f5e75

                    • C:\PROGRA~1\FREERA~1\4.bat

                      Filesize

                      3.1MB

                      MD5

                      23ad60a9ec87c1164e96ae7f8981311a

                      SHA1

                      287e89ac9c7ea2117591f450f8a1f21736f81871

                      SHA256

                      02bba52f33d88c599990f5accce3c6e91b3a5fa93b2b325e40647328ef9b37ab

                      SHA512

                      c8b7551db2829582d425cadc6f21e83eafd6b8e2b77eb77ae08bf3ac2af477290e4794fc5a936fa1f594200a97fb70433fbbfbad1ec6e3199b371086f4392c87

                    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver2348.tmp

                      Filesize

                      15KB

                      MD5

                      1a545d0052b581fbb2ab4c52133846bc

                      SHA1

                      62f3266a9b9925cd6d98658b92adec673cbe3dd3

                      SHA256

                      557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

                      SHA512

                      bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

                    • C:\Users\Admin\AppData\Local\Temp\cuteftpmac09.bat

                      Filesize

                      36B

                      MD5

                      0b53221b1332efb76ebd2ab7120ff78f

                      SHA1

                      e3dda4d21e35819eaf50e50c2aab2950ff1505b5

                      SHA256

                      05bbda79058985c35a48637dcbc66c73176e1f7e4c95e8aef8b762066b780388

                      SHA512

                      877637688f255d94b94feb3b2444678836db41644f6e1a7d1f902c8c12bab45785393a8f210215eebcdcb3526002632863bf54f026047aa1edee8481b26dddcd

                    • C:\Users\Admin\AppData\Local\Temp\inlCA33.tmp

                      Filesize

                      2.8MB

                      MD5

                      18cefb8614b701d368ccd27029f1a2f3

                      SHA1

                      b65449d88f516e4ef78569f6170d87135170043a

                      SHA256

                      b5f70822d5e88b4a580bfec9abe6185114f8ad40790c0de402094e326f9bd8d3

                      SHA512

                      36e23a29b0e4c6b808bd538ccf1358b7307ae6701cddcf7898a5e4ad2f5ba28dbce3bbe4f4b4535bd05ff37b929579d18bcbad5f3d4689e0c82a653a8e98104b

                    • C:\Users\Admin\AppData\Local\Temp\inlCA33.tmp

                      Filesize

                      1.4MB

                      MD5

                      8a9d2a24382dc7c6d33a8ea4600294ce

                      SHA1

                      5b7502a8dbe465c469ee339e80e7dc2a39049240

                      SHA256

                      f90c2caa82f376fbf510acaa5e452624d757fd4ae6f8f438741306f3814d4d0b

                      SHA512

                      a3c360db93669a209bb251c5f51ae6a2512a32ae0156039fa1df13e7aac0aa71b3c1e3508bf716e419919597ce459f08b253d31d7b2aa0d69186e65cb1649571

                    • C:\Users\Admin\AppData\Local\Temp\winrar_config.tmp

                      Filesize

                      611B

                      MD5

                      f6452f541207729878acc3efad9e53bc

                      SHA1

                      4584fd614383c394b09bbca936f35bf8bb0efcb3

                      SHA256

                      8287849f311e6c21ee79fd6cb695742833134f0ab249ba6ebd51f9588b88e1a9

                      SHA512

                      b41131969c8a4315ed0ffc492291f3a8f1ebde2a951090357b4f14d17db228bbd5432de23636ed65c97ad691820ea23fa18490dbe6638493f186ec32d589a2ed

                    • memory/3476-10-0x00000000001D0000-0x00000000001D3000-memory.dmp

                      Filesize

                      12KB

                    • memory/3476-5-0x0000000000930000-0x0000000000957000-memory.dmp

                      Filesize

                      156KB

                    • memory/3476-120-0x0000000000930000-0x0000000000957000-memory.dmp

                      Filesize

                      156KB

                    • memory/3476-0-0x0000000000930000-0x0000000000957000-memory.dmp

                      Filesize

                      156KB

                    • memory/3476-1-0x00000000001D0000-0x00000000001D3000-memory.dmp

                      Filesize

                      12KB

                    • memory/3768-96-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-108-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-81-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-80-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-86-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-78-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-84-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-88-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-89-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-90-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-91-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-92-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-94-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-77-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-98-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-99-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-100-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-101-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-102-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-75-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-74-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-79-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-109-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-110-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-114-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-115-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-116-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-117-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-119-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-118-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-73-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-128-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-72-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-70-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-139-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-140-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-138-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-141-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-142-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-144-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-145-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB

                    • memory/3768-55-0x00007FFA31010000-0x00007FFA3107E000-memory.dmp

                      Filesize

                      440KB