Analysis
-
max time kernel
85s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
1024a9c15f5162e4ee96531b1e13bdd9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1024a9c15f5162e4ee96531b1e13bdd9.exe
Resource
win10v2004-20231222-en
General
-
Target
1024a9c15f5162e4ee96531b1e13bdd9.exe
-
Size
54KB
-
MD5
1024a9c15f5162e4ee96531b1e13bdd9
-
SHA1
51ce6484939e91b5c0c40f708fff52189d207708
-
SHA256
175e69b820fac09e44f8d067115d899dcbc26b1f4c46d7cc71b8841386c255c7
-
SHA512
2fb2fd7e151db3439468b8f52894759b84b64e6ba3760e4e7a0461ac541e55d86338ff883a7c320338ed5783175b2147f24fba323066f70f3d22d6f4cb669aa1
-
SSDEEP
768:YU5Qmsqn3fpJ8/f+EDufZJUNL9YTy1t2east7YRpcd2/nqOego9zHd19VmzezClF:1lnIufZAP1t2easWRpFUgizZVxClhH
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1692 attrib.exe 4228 attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4228 attrib.exe 1692 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1024a9c15f5162e4ee96531b1e13bdd9.exe"C:\Users\Admin\AppData\Local\Temp\1024a9c15f5162e4ee96531b1e13bdd9.exe"1⤵PID:988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s_g_l_229.bat" "2⤵PID:2128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\redload\1.bat3⤵PID:2532
-
-
-
C:\Users\Admin\AppData\Local\Temp\inl9354.tmpC:\Users\Admin\AppData\Local\Temp\inl9354.tmp2⤵PID:864
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl9354.tmp > nul3⤵PID:312
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\1024A9~1.EXE > nul2⤵PID:3372
-
-
C:\PROGRA~1\INTERN~1\iexplore.exeC:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://www.cnkankan.com/?821331⤵PID:4140
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4140 CREDAT:17410 /prefetch:22⤵PID:2060
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\redload\1.inf1⤵PID:3732
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f1⤵PID:4276
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\Users\Admin\AppData\Roaming\redload\3.bat""" /f1⤵PID:2784
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\redload\tmp1⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1692
-
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r1⤵PID:4808
-
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o2⤵PID:1568
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 D:\VolumeDH\inj.dat,MainLoad1⤵PID:3028
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\redload\2.inf1⤵PID:2464
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\redload\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}1⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4228
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?S"" /f1⤵PID:2272
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?S"" /f1⤵PID:1096
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?S"" /f1⤵PID:3208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\redload\2.bat1⤵PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
791B
MD51706b41fd446b5718a8419c0fcb35d55
SHA1d9bb8df22acdc60c754ac14982cf795df3b1b815
SHA2565c6d11ac3f220f8286455764ab2581dcb6554692d3b9974b097364d77edb3943
SHA51268c9f6170ecdfcc79fc63cb646901d2ac52a915620b159047b2c93761c261897eb5ecc15065635105637a61a840d393104c15ea8268897fb8bb2fbc1a56c626e