Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:22
Behavioral task
behavioral1
Sample
37d5e417da86a9a87b32ae9a1b7bd4e5.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
37d5e417da86a9a87b32ae9a1b7bd4e5.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
37d5e417da86a9a87b32ae9a1b7bd4e5.exe
-
Size
60KB
-
MD5
37d5e417da86a9a87b32ae9a1b7bd4e5
-
SHA1
cbf73efc25e4d569cc59b120a4a6afb8ee27381c
-
SHA256
d004de48afd67e10306cb6fd64010dd6b555cd2d504603b36054ed078a31121d
-
SHA512
9bcf1b1872100201cd4749c27e85e253fec30fb4bdcd8f32c668c91b963d2101efa37d059689bac28c5b9c96b64a23fc5adb5e5c863cf842f952073c9c211d86
-
SSDEEP
1536:Qv7xcpf2M/jBIuR+QAMPbemPN9csAlmco8xpDEl:7pf2kjBI2lvPAvccD4l
Score
10/10
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "1" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\QQ = "D:\\Program\\3608\\QQ.exe" regedit.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\msscp.reg 37d5e417da86a9a87b32ae9a1b7bd4e5.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\web\Index.htm 37d5e417da86a9a87b32ae9a1b7bd4e5.exe File opened for modification C:\Windows\web\Index.htm 37d5e417da86a9a87b32ae9a1b7bd4e5.exe File created C:\Windows\web\Index.html 37d5e417da86a9a87b32ae9a1b7bd4e5.exe File opened for modification C:\Windows\web\Index.html 37d5e417da86a9a87b32ae9a1b7bd4e5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TYPEDURLS 37d5e417da86a9a87b32ae9a1b7bd4e5.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.pmw8.com/?sh" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.pmw8.com/?sh" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\DefaultIcon 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ɾ³ý(&D)\Command 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÖØÃüÃû(&M) 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\Attributes = "0" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÊôÐÔ(&R)\Command 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÖØÃüÃû(&M)\Command 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÖØÃüÃû(&M)\Command\ = "Rundll32.exe" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O) 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\1 = "20240110" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÊôÐÔ(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O)\Command 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\HideFolderVerbs 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ɾ³ý(&D) 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O)\ = "´ò¿ªÖ÷Ò³(&H)" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\10 = "1" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8} 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\IEXPLORE.EXE" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O)\Command\ = "iexplore.exe C:\\WINDOWS\\Web\\index.html" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\HideOnDesktopPerUser 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\cdafile2 = "23026" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\10 = "0" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ = "Internet Explorer" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÊôÐÔ(&R) 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ɾ³ý(&D)\Command\ = "Rundll32.exe" 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\WantsParseDisplayName 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 37d5e417da86a9a87b32ae9a1b7bd4e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder 37d5e417da86a9a87b32ae9a1b7bd4e5.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2140 regedit.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2140 2076 37d5e417da86a9a87b32ae9a1b7bd4e5.exe 15 PID 2076 wrote to memory of 2140 2076 37d5e417da86a9a87b32ae9a1b7bd4e5.exe 15 PID 2076 wrote to memory of 2140 2076 37d5e417da86a9a87b32ae9a1b7bd4e5.exe 15 PID 2076 wrote to memory of 2140 2076 37d5e417da86a9a87b32ae9a1b7bd4e5.exe 15 PID 2076 wrote to memory of 1736 2076 37d5e417da86a9a87b32ae9a1b7bd4e5.exe 14 PID 2076 wrote to memory of 1736 2076 37d5e417da86a9a87b32ae9a1b7bd4e5.exe 14 PID 2076 wrote to memory of 1736 2076 37d5e417da86a9a87b32ae9a1b7bd4e5.exe 14 PID 2076 wrote to memory of 1736 2076 37d5e417da86a9a87b32ae9a1b7bd4e5.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\37d5e417da86a9a87b32ae9a1b7bd4e5.exeC:\Users\Admin\AppData\Local\Temp\37d5e417da86a9a87b32ae9a1b7bd4e5.exe1⤵
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Modifies registry class
PID:1736
-
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe /S C:\Windows\system32\msscp.reg1⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:2140
-
C:\Users\Admin\AppData\Local\Temp\37d5e417da86a9a87b32ae9a1b7bd4e5.exe"C:\Users\Admin\AppData\Local\Temp\37d5e417da86a9a87b32ae9a1b7bd4e5.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2076