Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/01/2024, 13:47

General

  • Target

    3d03d06498147d9797b194483343e7bc.exe

  • Size

    58KB

  • MD5

    3d03d06498147d9797b194483343e7bc

  • SHA1

    82a6fc72b53a6172552f5652eeff3978193c4bd5

  • SHA256

    b897b6b0ab04f40c82baee47e302a5201adb0efe6a70131f57f0c9bc023f3cc0

  • SHA512

    dfb51b709a006baf3da587c681c93cbc94802aa0e47daae3ce5ecb97c4a9a7296527528335482b05cfbcc278b5f5651e10179dc9ef3a913015f3cd102370e84c

  • SSDEEP

    768:61tCn/5uXkmSAV+HIJVtGTdLbRbMlvgIMYToQFTZJK536KQyi/7cgqT:WqoX8AV+otOdfIgIMYToQF9JKl3iTcgq

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d03d06498147d9797b194483343e7bc.exe
    "C:\Users\Admin\AppData\Local\Temp\3d03d06498147d9797b194483343e7bc.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cuteftpmac09.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4880
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\1.bat
        3⤵
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:4892
        • C:\PROGRA~1\INTERN~1\iexplore.exe
          C:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?82133
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4912
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4912 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2340
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\1.inf
          4⤵
            PID:4276
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\2.bat
            4⤵
            • Drops file in Program Files directory
            • Suspicious use of WriteProcessMemory
            PID:4464
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?o"" /f
              5⤵
              • Modifies Internet Explorer settings
              • Modifies Internet Explorer start page
              PID:4100
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?o"" /f
              5⤵
                PID:1636
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f
                5⤵
                • Modifies registry class
                PID:4840
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?o"" /f
                5⤵
                • Modifies Internet Explorer settings
                • Modifies Internet Explorer start page
                PID:4964
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\PROGRA~1\FREERA~1\3.bat""" /f
                5⤵
                • Modifies registry class
                PID:1304
              • C:\Windows\SysWOW64\attrib.exe
                attrib +s +h C:\PROGRA~1\FREERA~1\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}
                5⤵
                • Sets file to hidden
                • Drops file in Program Files directory
                • Views/modifies file attributes
                PID:5084
              • C:\Windows\SysWOW64\attrib.exe
                attrib +s +h C:\PROGRA~1\FREERA~1\tmp
                5⤵
                • Sets file to hidden
                • Drops file in Program Files directory
                • Views/modifies file attributes
                PID:3632
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32 D:\VolumeDH\inj.dat,MainLoad
                5⤵
                  PID:4520
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\2.inf
                  5⤵
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:4148
          • C:\Users\Admin\AppData\Local\Temp\inlD832.tmp
            C:\Users\Admin\AppData\Local\Temp\inlD832.tmp
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3504
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inlD832.tmp > nul
              3⤵
                PID:640
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3D03D0~1.EXE > nul
              2⤵
                PID:4608
            • C:\Windows\SysWOW64\runonce.exe
              "C:\Windows\system32\runonce.exe" -r
              1⤵
              • Checks processor information in registry
              • Suspicious use of WriteProcessMemory
              PID:3880
              • C:\Windows\SysWOW64\grpconv.exe
                "C:\Windows\System32\grpconv.exe" -o
                2⤵
                  PID:1912

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\PROGRA~1\FREERA~1\1.bat

                Filesize

                3KB

                MD5

                b7c5e3b416b1d1b5541ef44662e1a764

                SHA1

                8bff7ea2be2f3cf29f2381d8007198b5991ca3ae

                SHA256

                f1a2f9fdebb3cac24756e53fa5e1628b2bd1cc130480c1878e3b3bc880575cd1

                SHA512

                65dbd6a7a7cf6fec00e6b0f1d7d5655769e6087ad09cad74c91c5a3395e675ac8f9df5c7185327e6f8dd03ddb60504400f54237d9e4b53c8b08e7e3d41ee61fc

              • C:\PROGRA~1\FREERA~1\1.inf

                Filesize

                492B

                MD5

                34c14b8530e1094e792527f7a474fe77

                SHA1

                f71c4e9091140256b34c18220d1dd1efab1f301d

                SHA256

                fe0dfb3458bfe2a3632d365e00765fa10f14d62e7dfa8b70a055c7eb9fdb6713

                SHA512

                25bb09b526e1e9f5c6052f1f7c36b37c956c1b5649936af8df3abfcf120c931f3d2603e17a061cb99d8c8074bfb1973a5423cce89762fca53cd46aeb3e8944a2

              • C:\PROGRA~1\FREERA~1\2.bat

                Filesize

                3KB

                MD5

                6b78cb8ced798ca5df5612dd62ce0965

                SHA1

                5a9c299393b96b0bf8f6770e3c7b0318a9e2e0cf

                SHA256

                81f64f42edfac2863a55db8fabd528c4eefc67f7e658cad6a57eeec862e444e3

                SHA512

                b387ba10021f3284d1406d520a2c8b3ba0c87922d67c79394c1aa50c631194519ac6bb5b898956533f040d48e1c7b202734e0075f8fc8c8bfab82c8ef359b28e

              • C:\PROGRA~1\FREERA~1\2.inf

                Filesize

                230B

                MD5

                f6dcb2862f6e7f9e69fb7d18668c59f1

                SHA1

                bb23dbba95d8af94ecc36a7d2dd4888af2856737

                SHA256

                c68fe97c64b68f00b3cc853ae6a6d324b470a558df57eac2593487978592eb2c

                SHA512

                eefe630b776d2144df39e9c385824374b3d546e30293d7efe10cc2d6bf6f2c932162bf80add1c8ca58afcc868ad02b3ffc104c0f111f3827f4385ee9f26f5e75

              • C:\PROGRA~1\FREERA~1\4.bat

                Filesize

                74KB

                MD5

                79a2ca3aa796e5094ec2e721664d4c38

                SHA1

                a277ce8ba0ac65b2fe5a2506f7c82eff257b2c54

                SHA256

                508a2dab84184cbbb710c74fae664466da536f5edd13d15d948d7674df179540

                SHA512

                58666f2dc8f87c3754455411b56420bd6a10d9e43540718d2a6be14b77b3d63e0eb19ad2b772f894c39469bd095c9275b0c51ea196a891f573c9a7ef95615504

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver5DDA.tmp

                Filesize

                15KB

                MD5

                1a545d0052b581fbb2ab4c52133846bc

                SHA1

                62f3266a9b9925cd6d98658b92adec673cbe3dd3

                SHA256

                557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

                SHA512

                bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GUTCV3OF\suggestions[1].en-US

                Filesize

                17KB

                MD5

                5a34cb996293fde2cb7a4ac89587393a

                SHA1

                3c96c993500690d1a77873cd62bc639b3a10653f

                SHA256

                c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                SHA512

                e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

              • C:\Users\Admin\AppData\Local\Temp\cuteftpmac09.bat

                Filesize

                36B

                MD5

                0b53221b1332efb76ebd2ab7120ff78f

                SHA1

                e3dda4d21e35819eaf50e50c2aab2950ff1505b5

                SHA256

                05bbda79058985c35a48637dcbc66c73176e1f7e4c95e8aef8b762066b780388

                SHA512

                877637688f255d94b94feb3b2444678836db41644f6e1a7d1f902c8c12bab45785393a8f210215eebcdcb3526002632863bf54f026047aa1edee8481b26dddcd

              • C:\Users\Admin\AppData\Local\Temp\inlD832.tmp

                Filesize

                2.7MB

                MD5

                e4e34df3f1f29ab783d5e0efa8596be1

                SHA1

                79e0d662e0f8cfd2ce98adc65b32ca68578ae315

                SHA256

                ff2803778d0cab75e079f32c9b7a913e370ee4733955e3c9709a1558168712c8

                SHA512

                363ec9c513b62676b8bb54daf43955d414e01d1347930fc7b91b92e3145236c9249a6f528dd46b750d9069c58e4bd8c968d2c0880bbac5071e9c7511b78e98d7

              • C:\Users\Admin\AppData\Local\Temp\inlD832.tmp

                Filesize

                1.7MB

                MD5

                635fd745bd1ee0ee57f6c05e3b144193

                SHA1

                61fd61cafa96f786fbb5fd2eb0f15df4312326f9

                SHA256

                c68a322d6d069ce5b633c39b0f31f56581632124d3ca317dfe635e6c16fd27a8

                SHA512

                75a2509f7696c9b1b39359750c6b2fabb7902b43d92dd491434fe40bc17634e8d5a9ae135c1fa31d270486060d0f57d4ffdb2ada53804d050ab07499e824857e

              • C:\Users\Admin\AppData\Local\Temp\winrar_config.tmp

                Filesize

                611B

                MD5

                f6452f541207729878acc3efad9e53bc

                SHA1

                4584fd614383c394b09bbca936f35bf8bb0efcb3

                SHA256

                8287849f311e6c21ee79fd6cb695742833134f0ab249ba6ebd51f9588b88e1a9

                SHA512

                b41131969c8a4315ed0ffc492291f3a8f1ebde2a951090357b4f14d17db228bbd5432de23636ed65c97ad691820ea23fa18490dbe6638493f186ec32d589a2ed

              • memory/3224-0-0x00000000000A0000-0x00000000000C7000-memory.dmp

                Filesize

                156KB

              • memory/3224-76-0x00000000000A0000-0x00000000000C7000-memory.dmp

                Filesize

                156KB

              • memory/3224-11-0x0000000000B00000-0x0000000000B03000-memory.dmp

                Filesize

                12KB

              • memory/3224-7-0x00000000000A0000-0x00000000000C7000-memory.dmp

                Filesize

                156KB

              • memory/3224-1-0x0000000000B00000-0x0000000000B03000-memory.dmp

                Filesize

                12KB

              • memory/4912-90-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-105-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-79-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-77-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-82-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-74-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-84-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-80-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-87-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-88-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-93-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-91-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-73-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-89-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-95-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-96-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-97-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-72-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-99-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-103-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-106-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-75-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-107-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-104-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-112-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-113-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-111-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-114-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-115-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-71-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-125-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-70-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-57-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-135-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-139-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-141-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-138-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-137-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-136-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-148-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-152-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-51-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB

              • memory/4912-45-0x00007FFF03E30000-0x00007FFF03E9E000-memory.dmp

                Filesize

                440KB