Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
01f410626ae538b0c69dd59c1667176b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01f410626ae538b0c69dd59c1667176b.exe
Resource
win10v2004-20231215-en
General
-
Target
01f410626ae538b0c69dd59c1667176b.exe
-
Size
434KB
-
MD5
01f410626ae538b0c69dd59c1667176b
-
SHA1
7888bb4114d2ee3ea42705a12890faeadd872d42
-
SHA256
3776fd23d3a8339b6af512ba2abe2bc93cc955feb2cc85165663e15863a7c35e
-
SHA512
a3a92315c2869ed058e78a79913bf2dd0437f2f89f7053d9b4bc32f7895e49fa98ff4287cfcb99edb76294ec75b78f8ed1b8de4e9fe6b99d005b7d9704cab2c1
-
SSDEEP
12288:aWWVmQdOw0tp2cYM0jz1H0n85Eny0Pqi1b1AVM:01dncYMGz1H0vhPqir
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 01f410626ae538b0c69dd59c1667176b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 01f410626ae538b0c69dd59c1667176b.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "1" 01f410626ae538b0c69dd59c1667176b.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\WINDOWS\system32\drivers\etc\hosts 01f410626ae538b0c69dd59c1667176b.exe File created C:\WINDOWS\system32\drivers\etc\hosts 01f410626ae538b0c69dd59c1667176b.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msscp.reg 01f410626ae538b0c69dd59c1667176b.exe File created C:\Windows\SysWOW64\msscp.reg 01f410626ae538b0c69dd59c1667176b.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\taobao.ico 01f410626ae538b0c69dd59c1667176b.exe File opened for modification C:\Program Files\Common Files\System\taobao.ico 01f410626ae538b0c69dd59c1667176b.exe -
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TYPEDURLS 01f410626ae538b0c69dd59c1667176b.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://t.wozhao123.com" 01f410626ae538b0c69dd59c1667176b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://t.wozhao123.com" 01f410626ae538b0c69dd59c1667176b.exe -
Modifies registry class 31 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile 01f410626ae538b0c69dd59c1667176b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\ = "htmfileico" 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\shell\open 01f410626ae538b0c69dd59c1667176b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\PlayFlashDXA\cdafile2 = "191823" 01f410626ae538b0c69dd59c1667176b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\PlayFlashDXA\9 = "1" 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\shell\open\command 01f410626ae538b0c69dd59c1667176b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\ = "htmlfile" 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.html 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\shell\open\command 01f410626ae538b0c69dd59c1667176b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\iexplore.exe\" \"%1\"" 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon 01f410626ae538b0c69dd59c1667176b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\ = "htmfile" 01f410626ae538b0c69dd59c1667176b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\iexplore.exe\" \"%1\"" 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon 01f410626ae538b0c69dd59c1667176b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\ = "htmfileico" 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm 01f410626ae538b0c69dd59c1667176b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\DefaultIcon\ = "C:\\Program Files\\Common Files\\System\\taobao.ico" 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PlayFlashDXA 01f410626ae538b0c69dd59c1667176b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "C:\\Program Files\\internet explorer\\IEXPLORE.EXE,0" 01f410626ae538b0c69dd59c1667176b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "C:\\Program Files\\internet explorer\\IEXPLORE.EXE,0" 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\shell 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\DefaultIcon 01f410626ae538b0c69dd59c1667176b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\DefaultIcon\ = "C:\\Program Files\\Common Files\\System\\taobao.ico" 01f410626ae538b0c69dd59c1667176b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\ = "htmfile" 01f410626ae538b0c69dd59c1667176b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\PlayFlashDXA\9 = "0" 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.html 01f410626ae538b0c69dd59c1667176b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\ = "htmlfile" 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile 01f410626ae538b0c69dd59c1667176b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\DefaultIcon 01f410626ae538b0c69dd59c1667176b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\PlayFlashDXA\1 = "20231229" 01f410626ae538b0c69dd59c1667176b.exe -
Runs .reg file with regedit 2 IoCs
pid Process 2732 regedit.exe 2756 regedit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2732 1728 01f410626ae538b0c69dd59c1667176b.exe 28 PID 1728 wrote to memory of 2732 1728 01f410626ae538b0c69dd59c1667176b.exe 28 PID 1728 wrote to memory of 2732 1728 01f410626ae538b0c69dd59c1667176b.exe 28 PID 1728 wrote to memory of 2732 1728 01f410626ae538b0c69dd59c1667176b.exe 28 PID 1728 wrote to memory of 2220 1728 01f410626ae538b0c69dd59c1667176b.exe 29 PID 1728 wrote to memory of 2220 1728 01f410626ae538b0c69dd59c1667176b.exe 29 PID 1728 wrote to memory of 2220 1728 01f410626ae538b0c69dd59c1667176b.exe 29 PID 1728 wrote to memory of 2220 1728 01f410626ae538b0c69dd59c1667176b.exe 29 PID 2220 wrote to memory of 2756 2220 01f410626ae538b0c69dd59c1667176b.exe 30 PID 2220 wrote to memory of 2756 2220 01f410626ae538b0c69dd59c1667176b.exe 30 PID 2220 wrote to memory of 2756 2220 01f410626ae538b0c69dd59c1667176b.exe 30 PID 2220 wrote to memory of 2756 2220 01f410626ae538b0c69dd59c1667176b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f410626ae538b0c69dd59c1667176b.exe"C:\Users\Admin\AppData\Local\Temp\01f410626ae538b0c69dd59c1667176b.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe /S C:\Windows\system32\msscp.reg2⤵
- Runs .reg file with regedit
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\01f410626ae538b0c69dd59c1667176b.exeC:\Users\Admin\AppData\Local\Temp\01f410626ae538b0c69dd59c1667176b.exe2⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe /S C:\Windows\system32\msscp.reg3⤵
- Runs .reg file with regedit
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5468fada123f5548ac87e57bae81f6782
SHA1edb8f012c25906e6afd8bf335b495e16c440243d
SHA256091c882bb307d57f2c7c42309e7ba8740130fef8c3ed772b0bc5e5505e37034d
SHA512635ec26c88c2394dd4f2a81b9aea8f429a91adfeb37ae34e51b03f3cf8e503c123c3685938f40cea07d6146e0c7113aadbe62fa528f1f6d8b995e617fd68a4aa
-
Filesize
1KB
MD504582f0454992dcdd3c384d0730a98a1
SHA152296a9dac4ee0876fefb42fd1a1c588ae3a865f
SHA256878126f2a00b67331d99b05158498b0ad40217de099a5b3534d1b7aeb3a35d19
SHA5122db49de10dd7b1fc27ae838fab4441e76aeae151b55de7b29f10c4750b5ed29a692f496cb7b5e01021a5cac8482deeb74687d88a016cb82b6ef9814a855cefc5
-
Filesize
336B
MD545c2ffcb48ade649255bc861d1928963
SHA14a7042765fab8063c2383fb9cde3a4ece24a0628
SHA256658a998e67711f328b0a8a5dd1ccb6738d0fc0abd0351c71270c4fc4b490fa71
SHA51270cfa5b430e18a589e0d88284d5a79433a3b7351767ccf1500349b8e44ab2a8f3c5dffd86124cccf4b326dac5f93dd3ef7c48873fa58c0b3413eb629ef9c53db