Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
1048b55d549d456b05d057b067faa185.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1048b55d549d456b05d057b067faa185.exe
Resource
win10v2004-20231215-en
General
-
Target
1048b55d549d456b05d057b067faa185.exe
-
Size
54KB
-
MD5
1048b55d549d456b05d057b067faa185
-
SHA1
e14b56b39d4ea871b17e19d9ffaeac1fa6381a83
-
SHA256
ae2a04f94bd9c46c979ac213edcc026692c54f9ec2afbeaa8b03752ae4f792bc
-
SHA512
f7021f00e9c4f5f7069aaac72f09a3df4c2775d417f0c9f199272b43e44aa8e00f77c4d78e4a99f533af908a0cf559c2913bc08dd06edb8e17920c0e415f6726
-
SSDEEP
768:gNh5DfiT2+IXeIt1wgOP+kw+tNwsxQkHPrz+N35yKNQbJItygam7RIEMrOQYz0+w:gZWKJJMguNNdxzHni3gkkJIv7R9wg0a0
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1844 attrib.exe 872 attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2076 2916 1048b55d549d456b05d057b067faa185.exe 31 PID 2916 wrote to memory of 2076 2916 1048b55d549d456b05d057b067faa185.exe 31 PID 2916 wrote to memory of 2076 2916 1048b55d549d456b05d057b067faa185.exe 31 PID 2916 wrote to memory of 2076 2916 1048b55d549d456b05d057b067faa185.exe 31 PID 2076 wrote to memory of 2408 2076 cmd.exe 33 PID 2076 wrote to memory of 2408 2076 cmd.exe 33 PID 2076 wrote to memory of 2408 2076 cmd.exe 33 PID 2076 wrote to memory of 2408 2076 cmd.exe 33 PID 2408 wrote to memory of 1708 2408 cmd.exe 35 PID 2408 wrote to memory of 1708 2408 cmd.exe 35 PID 2408 wrote to memory of 1708 2408 cmd.exe 35 PID 2408 wrote to memory of 1708 2408 cmd.exe 35 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1844 attrib.exe 872 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1048b55d549d456b05d057b067faa185.exe"C:\Users\Admin\AppData\Local\Temp\1048b55d549d456b05d057b067faa185.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\glk_300_211.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\datread\1.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\PROGRA~1\INTERN~1\iexplore.exeC:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://wWW.cnkankan.com/?821334⤵PID:1708
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:25⤵PID:1384
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\datread\1.inf4⤵PID:2316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\datread\2.bat4⤵PID:2988
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?S"" /f5⤵PID:1060
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?S"" /f5⤵PID:1636
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?S"" /f5⤵PID:1880
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f5⤵PID:980
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\Users\Admin\AppData\Roaming\datread\3.bat""" /f5⤵PID:3044
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\datread\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1844
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\datread\tmp5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:872
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\datread\2.inf5⤵PID:3040
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 D:\VolumeDH\inj.dat,MainLoad5⤵PID:2496
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
858B
MD5d727e34e3f5eb5ee1ce17fe4c66bf617
SHA1ea796e8b305510775d244f30758e125a01569626
SHA256d0cd1c2b674ee72b000ecacb181addd7735f4c3478731c23f4649e312e4c607d
SHA512ae3028364bf02b3e7c78d7a44a3305537c16d7feefb9dd968296b86425babaccee81af0c40eb7f8f374266df0e2c3c1a08b6b951ceaddc55572d6f0f1e85705c
-
Filesize
54B
MD55dd457b845e53fce36e6b543764337e4
SHA1eb7f8ce82274afa5702b20eb5ba133bb71bcb8d6
SHA2560a2c605c32f2e9b3eda6f18df3d8c1fc2d87922b9bb23d6c3a9de3aa3f383992
SHA5120fea97ddf333c178ca4805fc85f8b66f81a7906d1cc7bf440206aff50cc711643e90115f046077a323b3cc78deeb704f7eb8a934d0a1cd011f6a3ad67057c9f6
-
Filesize
3KB
MD570c32a548388769424935af37d73cabc
SHA12411e148d5bc6b82403e1d7491293810ba76c8a2
SHA256bd69b2f6f82d1ef3e608423e03c51f40290bdc9e6c2c27b72fa068ca2a9fb8ee
SHA512785184d29875bb7c89f0bc3ed6ed00bab3cc919af42af0a8e34c05b948be2e14a33b2256a7e6083325571b55e4a19321666fe6243909dd6e96ad9bf0767bf006
-
Filesize
212B
MD5c29a919c64a4a5a9adbe8c63503cde35
SHA135915bcdf2ba01df5052203624950465534a7bf5
SHA256fc261f82f96d7e2897f4b6e36960758b9c45985b88a4ca9934e7fb56c0cb3519
SHA51293308daeb61d1b91cab1e01f6fca69511463688fff6581d9f420e9fadb7b61e6e03381366c04232434cdfc31a086e5f7f068d77e6a35dfe1a104edd5cc138428
-
Filesize
410B
MD566a1f0147fed7ddd19e9bb7ff93705c5
SHA19d803c81ea2195617379b880b227892ba30b0bf6
SHA2564f45ce85e221352f7fe26e04968c7f7267dc24b55cf2b72b929b4c90e48cb764
SHA512cfe51756ddec75d240249980a4d27870d15983add25058e4d0da4d8a3ea11384d4d228d6cbc95091f91e516e1ab4dfb1e315941dbd95bf717d4b31936311d597
-
Filesize
3KB
MD52dccbc7c9d8e6493c16fab45e323b10c
SHA1b64f49270de7be232bfdce99cd7670af82baf73e
SHA25636b2154f812901d1b2dc99d91c960a012a30411fc8b39fa32c74157fef53d3f7
SHA51290e03bad493dc480f9d6bc976bf9028589522f3b04c5dd0222efffea4b237941b0e594ba51e880c657945c80ff80bb136d6caae6b3841398e9753c7fa47c3f3a
-
Filesize
1.8MB
MD5b84f9ac7fd3b7b3add1dd7d0c4252845
SHA11af1a2f867c902d383e36d418f930dcb1f50f4bb
SHA256a9c635fb9a9f39a5c4ff35279c973118eb36bb14c84dfee9ce616898db3e06c5
SHA512f236f5d495330b0ddb7d14f943a2306f995e6cbeec865f5c979cdd2efb18eff2db54a04f51f6e44516814e369ffb47a8835514b4157dd356e9114c4b4b36d94a