Analysis
-
max time kernel
85s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
289be682bb8dc3af3cf720035c2c622b.exe
Resource
win7-20231215-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
289be682bb8dc3af3cf720035c2c622b.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
289be682bb8dc3af3cf720035c2c622b.exe
-
Size
57KB
-
MD5
289be682bb8dc3af3cf720035c2c622b
-
SHA1
d65844fdb3f84302ffe115c41cb6df5aaf5971a9
-
SHA256
8905def32331738c4a12f15cc89b53379ec4896a0dcc208995301a8c57cf3c82
-
SHA512
ef02777b8f0113913af4829f69f91a96a84a2e02f43310549626ec978ee26cd436dab06319e99c79dfd81d54cb0d6de68bbc5e2a66b648a5d35ba34b246fb599
-
SSDEEP
1536:bsPjsxbfdYfVnN2FeUnY0VqcyJcgSrTkKCyYceAx6O9Qev0wj:bsmTCVnN2UYYyqcA0TNMAxFQRwj
Score
8/10
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3720 attrib.exe 3096 attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3720 attrib.exe 3096 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\289be682bb8dc3af3cf720035c2c622b.exe"C:\Users\Admin\AppData\Local\Temp\289be682bb8dc3af3cf720035c2c622b.exe"1⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\inlA064.tmpC:\Users\Admin\AppData\Local\Temp\inlA064.tmp2⤵PID:4664
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inlA064.tmp > nul3⤵PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\289BE6~1.EXE > nul2⤵PID:2136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pds2010_check.bat" "2⤵PID:4188
-
-
C:\PROGRA~1\INTERN~1\iexplore.exeC:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?821331⤵PID:2772
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:17410 /prefetch:22⤵PID:844
-
-
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r1⤵PID:4344
-
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o2⤵PID:2976
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 D:\VolumeDH\inj.dat,MainLoad1⤵PID:2416
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\PPLive\2.inf1⤵PID:4348
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\PPLive\tmp1⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3720
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\PPLive\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}1⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3096
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\Users\Admin\AppData\Roaming\PPLive\3.bat""" /f1⤵PID:2544
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f1⤵PID:4768
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?o"" /f1⤵PID:3932
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?o"" /f1⤵PID:4920
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?o"" /f1⤵PID:3204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\PPLive\2.bat1⤵PID:4320
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\PPLive\1.inf1⤵PID:2308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\PPLive\1.bat1⤵PID:992