Overview
overview
7Static
static
71.vbs
windows7-x64
11.vbs
windows10-2004-x64
13.bat
windows7-x64
13.bat
windows10-2004-x64
13.vbs
windows7-x64
33.vbs
windows10-2004-x64
3bho.exe
windows7-x64
3bho.exe
windows10-2004-x64
3t2.exe
windows7-x64
7t2.exe
windows10-2004-x64
7test.exe
windows7-x64
7test.exe
windows10-2004-x64
7Analysis
-
max time kernel
144s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 08:03
Behavioral task
behavioral1
Sample
1.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1.vbs
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
3.bat
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
3.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
3.vbs
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
3.vbs
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
bho.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
bho.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
t2.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
t2.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
test.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
test.exe
Resource
win10v2004-20231215-en
General
-
Target
3.bat
-
Size
1KB
-
MD5
598a85adc5bbc3928454260ab745e7a7
-
SHA1
0f7a67b353ffc10efb2557ce60032a994cd149ab
-
SHA256
d6b54f6dcf009752cff0d57f70c0f91a8678e611d083a8d1c9bed35e7df4924d
-
SHA512
c66eb5f9057eaf5152405478c1e13252b96e4d332ef408f1c155c2513009d1da72995465fe3d8aaee7a65871521a662c2d942f82fbd617fce24f69815d91e5dc
Malware Config
Signatures
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage reg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 808 2704 cmd.exe 15 PID 2704 wrote to memory of 808 2704 cmd.exe 15 PID 2704 wrote to memory of 4792 2704 cmd.exe 19 PID 2704 wrote to memory of 4792 2704 cmd.exe 19
Processes
-
C:\Windows\system32\reg.exereg del "HKEY_CLASSES_ROOT\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command" /v1⤵PID:808
-
C:\Windows\system32\reg.exereg add "HKEY_CLASSES_ROOT\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command" /v "" /d "C:\Program Files\Internet Explorer\iexplore.exe http://www.006dh.com/?cnfree" /f1⤵
- Modifies registry class
PID:4792
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\3.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2704