Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-01-2024 14:51
Static task
static1
Behavioral task
behavioral1
Sample
6fb50713314e5efdea6285202214fbbf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6fb50713314e5efdea6285202214fbbf.exe
Resource
win10v2004-20231215-en
General
-
Target
6fb50713314e5efdea6285202214fbbf.exe
-
Size
54KB
-
MD5
6fb50713314e5efdea6285202214fbbf
-
SHA1
0ca70c75795286d099e1ab7559b8f8a5c5061df6
-
SHA256
51c2c22dd1b44e70b2b5ce8a9bb10b279527e03dbfb60d0810e7b4b2dc1c2dc3
-
SHA512
855df736f424c765a7561a11807af24fefc64cb5d6a10bddfe0cd525be6249f30c26523abbaca320653bcf210d1efc2a174182ba37fdb2bf24878ba012a8fd40
-
SSDEEP
1536:/KZiivgFkkHnjXVJj+AvIvWC61AIRNG4ij:UvcDHnjFByvb613A
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 712 attrib.exe 112 attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 712 attrib.exe 112 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb50713314e5efdea6285202214fbbf.exe"C:\Users\Admin\AppData\Local\Temp\6fb50713314e5efdea6285202214fbbf.exe"1⤵PID:2736
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\s_min_run.bat" "2⤵PID:324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\redload\1.bat3⤵PID:784
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.71628.com/?S"" /f4⤵PID:304
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\tmp" /v "key" /d ""http://www.71628.com/?S"" /f4⤵PID:672
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.71628.com/?S"" /f4⤵PID:892
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\Users\Admin\AppData\Roaming\redload\3.bat""" /f4⤵PID:852
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f4⤵PID:576
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\redload\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:712
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\redload\tmp4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:112
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\redload\2.inf4⤵PID:2612
-
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r5⤵PID:1516
-
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o6⤵PID:1156
-
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 D:\VolumeDH\inj.dat,MainLoad4⤵PID:1444
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
790B
MD5b18422bf438bbb7798280375a7bc0976
SHA1c1b77b35e3a38ff2ad119f25e548beb5ff68c2e2
SHA256ee8709e751067193dccdfe218108bdae6a30919d7b6c860bc848c7cc4b242fa4
SHA51223cb9c74905f514a2bf4ef91afc53ceb08230b3ce68e3eab17bb36c674260d143a7e7105958ff4ed5c2a416bddffb3c7e28dcf8060cbf323c7e4cab71f613176
-
Filesize
54B
MD5504490369970f1c0eb580afbcdf91618
SHA1b52f65cd538e6c998b2c7e3167f9c8e8fa6c7971
SHA256a13a0579286521f0d7cb55fc7d28c6d33f14c0573e9e69f7584fa4008a8e7d43
SHA5125495ce79abf0fc4ffbfaf9aefa484145f4e0d3e8457be0e2e4dfb1284fb5413016f2d9867e2386db5c4f7b51863bfffeae8ea6bd879053fdf6a928ab2a0857ad
-
Filesize
3KB
MD558db0fb8d73a32c0e8057a6f78c16d07
SHA15cca0167d57e8bc9a8a228134db7456bfedeb63e
SHA2565191c4b522b9dd8369363060d5e03b2728f71c09855daf1ebc418f592c50029a
SHA512829e9da755fdd4c0b0b276ee47775af66f264ac7ae0e8bb8dec1480a038c58cb6d9e9cdd3706ca7b412f6d143ea6e1034da9993220ae0329e1323d9c5c5ab75a
-
Filesize
248B
MD52197ffb407fb3b2250045c084f73b70a
SHA13d0efbacba73ac5e8d77f0d25d63fc424511bcf6
SHA256a1a42f5a41ce65135b1ad525eabc04cce89ee07d2f51d06e5e1dea6047081591
SHA512b35a99e144da3f02de71158f58a6b937435d1bce941126a554783c667654b880527b11ba8a5c0fcf093ce28863ea4f5e60f73f8f973a727f177d584d2e9c80fe
-
Filesize
2.7MB
MD57fdeaf11a17ed286f325a8fa07c0d137
SHA1a8756aea84733a8b1418e03d73630cfa4816fc51
SHA256eb7ea66c9e11db914999ee5ef7fd0d139821899de3ee8ab362da7a1a492befd6
SHA5126f5a3c28a77d2a76d9c5138f1c24000ec7fb720bd33e54e0fd72d457603abede4d99926e3bda4a71ade9bae6c2231e6cc940364458714f3c5ba93f7a6a34debf