Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 14:45 UTC

General

  • Target

    b4f49388d7f11a3cc0ce626052047ad1.exe

  • Size

    434KB

  • MD5

    b4f49388d7f11a3cc0ce626052047ad1

  • SHA1

    80779cc07101b1bae736b927d8274484a81e3e26

  • SHA256

    65ed4cf983739effdc0bd4d8ffec4d558017a1dea18c32e80f623a32ee4c045c

  • SHA512

    0cb7369529778c1807042725b70a38d33f385767f37184d3860a8b6516daf70a6670ffbb2f5012276867eb5ffb86186eefc5e710185931c72dfffa39048c62c9

  • SSDEEP

    12288:zWWVmQdOw0tp2cYM0jz1H0n85Eny0PqprV76:V1dncYMGz1H0vhPqC

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 31 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4f49388d7f11a3cc0ce626052047ad1.exe
    "C:\Users\Admin\AppData\Local\Temp\b4f49388d7f11a3cc0ce626052047ad1.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Windows\SysWOW64\regedit.exe
      C:\Windows\regedit.exe /S C:\Windows\system32\msscp.reg
      2⤵
      • Runs .reg file with regedit
      PID:2912
    • C:\Users\Admin\AppData\Local\Temp\b4f49388d7f11a3cc0ce626052047ad1.exe
      C:\Users\Admin\AppData\Local\Temp\b4f49388d7f11a3cc0ce626052047ad1.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\SysWOW64\regedit.exe
        C:\Windows\regedit.exe /S C:\Windows\system32\msscp.reg
        3⤵
        • Runs .reg file with regedit
        PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\System\taobao.ico

    Filesize

    14KB

    MD5

    468fada123f5548ac87e57bae81f6782

    SHA1

    edb8f012c25906e6afd8bf335b495e16c440243d

    SHA256

    091c882bb307d57f2c7c42309e7ba8740130fef8c3ed772b0bc5e5505e37034d

    SHA512

    635ec26c88c2394dd4f2a81b9aea8f429a91adfeb37ae34e51b03f3cf8e503c123c3685938f40cea07d6146e0c7113aadbe62fa528f1f6d8b995e617fd68a4aa

  • C:\Windows\SysWOW64\msscp.reg

    Filesize

    228B

    MD5

    2d06a424ad1c7611ea9caad93892ea26

    SHA1

    a901e15c2ecea498f1ca8ffc5d5c32bd3f0169d8

    SHA256

    8c19027357bcb3170b6844aec44cd4c143c7b795d5df52ff89426615010f715c

    SHA512

    3199dffce9d7625d9e01d7a06c912d3629e5f3d98d3935763df6b323807d46f24a40876d78d5ae7f7ac83c90e498e7c4810d88993904dbca1036e8c06833ccdf

  • memory/2840-0-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2840-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2840-5-0x0000000001FA0000-0x000000000201D000-memory.dmp

    Filesize

    500KB

  • memory/2840-35-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2892-6-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2892-10-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/2892-34-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.