Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 14:45
Static task
static1
Behavioral task
behavioral1
Sample
b4f49388d7f11a3cc0ce626052047ad1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4f49388d7f11a3cc0ce626052047ad1.exe
Resource
win10v2004-20240226-en
General
-
Target
b4f49388d7f11a3cc0ce626052047ad1.exe
-
Size
434KB
-
MD5
b4f49388d7f11a3cc0ce626052047ad1
-
SHA1
80779cc07101b1bae736b927d8274484a81e3e26
-
SHA256
65ed4cf983739effdc0bd4d8ffec4d558017a1dea18c32e80f623a32ee4c045c
-
SHA512
0cb7369529778c1807042725b70a38d33f385767f37184d3860a8b6516daf70a6670ffbb2f5012276867eb5ffb86186eefc5e710185931c72dfffa39048c62c9
-
SSDEEP
12288:zWWVmQdOw0tp2cYM0jz1H0n85Eny0PqprV76:V1dncYMGz1H0vhPqC
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" b4f49388d7f11a3cc0ce626052047ad1.exe Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" b4f49388d7f11a3cc0ce626052047ad1.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "1" b4f49388d7f11a3cc0ce626052047ad1.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msscp.reg b4f49388d7f11a3cc0ce626052047ad1.exe File opened for modification C:\Windows\SysWOW64\msscp.reg b4f49388d7f11a3cc0ce626052047ad1.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\taobao.ico b4f49388d7f11a3cc0ce626052047ad1.exe File opened for modification C:\Program Files\Common Files\System\taobao.ico b4f49388d7f11a3cc0ce626052047ad1.exe -
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TYPEDURLS b4f49388d7f11a3cc0ce626052047ad1.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://n.srpkw.com" b4f49388d7f11a3cc0ce626052047ad1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://n.srpkw.com" b4f49388d7f11a3cc0ce626052047ad1.exe -
Modifies registry class 31 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\.htm b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a b4f49388d7f11a3cc0ce626052047ad1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\ = "htmfileico" b4f49388d7f11a3cc0ce626052047ad1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\ = "htmfileico" b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\DefaultIcon b4f49388d7f11a3cc0ce626052047ad1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\DefaultIcon\ = "C:\\Program Files\\Common Files\\System\\taobao.ico" b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\shell\open\command b4f49388d7f11a3cc0ce626052047ad1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\cdafile2 = "70359" b4f49388d7f11a3cc0ce626052047ad1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "C:\\Program Files\\internet explorer\\IEXPLORE.EXE,0" b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\DefaultIcon b4f49388d7f11a3cc0ce626052047ad1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\10 = "0" b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\.htm b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile b4f49388d7f11a3cc0ce626052047ad1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\10 = "1" b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\.html b4f49388d7f11a3cc0ce626052047ad1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\iexplore.exe\" \"%1\"" b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\shell\open b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\.html b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile b4f49388d7f11a3cc0ce626052047ad1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\.html\ = "htmlfile" b4f49388d7f11a3cc0ce626052047ad1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\.htm\ = "htmfile" b4f49388d7f11a3cc0ce626052047ad1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\DefaultIcon\ = "C:\\Program Files\\Common Files\\System\\taobao.ico" b4f49388d7f11a3cc0ce626052047ad1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\iexplore.exe\" \"%1\"" b4f49388d7f11a3cc0ce626052047ad1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\1 = "20240305" b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\shell\open\command b4f49388d7f11a3cc0ce626052047ad1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "C:\\Program Files\\internet explorer\\IEXPLORE.EXE,0" b4f49388d7f11a3cc0ce626052047ad1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\.html\ = "htmlfile" b4f49388d7f11a3cc0ce626052047ad1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\.htm\ = "htmfile" b4f49388d7f11a3cc0ce626052047ad1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmfile\shell b4f49388d7f11a3cc0ce626052047ad1.exe -
Runs .reg file with regedit 2 IoCs
pid Process 856 regedit.exe 4876 regedit.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4876 5032 b4f49388d7f11a3cc0ce626052047ad1.exe 87 PID 5032 wrote to memory of 4876 5032 b4f49388d7f11a3cc0ce626052047ad1.exe 87 PID 5032 wrote to memory of 4876 5032 b4f49388d7f11a3cc0ce626052047ad1.exe 87 PID 5032 wrote to memory of 2352 5032 b4f49388d7f11a3cc0ce626052047ad1.exe 90 PID 5032 wrote to memory of 2352 5032 b4f49388d7f11a3cc0ce626052047ad1.exe 90 PID 5032 wrote to memory of 2352 5032 b4f49388d7f11a3cc0ce626052047ad1.exe 90 PID 2352 wrote to memory of 856 2352 b4f49388d7f11a3cc0ce626052047ad1.exe 91 PID 2352 wrote to memory of 856 2352 b4f49388d7f11a3cc0ce626052047ad1.exe 91 PID 2352 wrote to memory of 856 2352 b4f49388d7f11a3cc0ce626052047ad1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4f49388d7f11a3cc0ce626052047ad1.exe"C:\Users\Admin\AppData\Local\Temp\b4f49388d7f11a3cc0ce626052047ad1.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe /S C:\Windows\system32\msscp.reg2⤵
- Runs .reg file with regedit
PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\b4f49388d7f11a3cc0ce626052047ad1.exeC:\Users\Admin\AppData\Local\Temp\b4f49388d7f11a3cc0ce626052047ad1.exe2⤵
- Modifies visibility of file extensions in Explorer
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe /S C:\Windows\system32\msscp.reg3⤵
- Runs .reg file with regedit
PID:856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5468fada123f5548ac87e57bae81f6782
SHA1edb8f012c25906e6afd8bf335b495e16c440243d
SHA256091c882bb307d57f2c7c42309e7ba8740130fef8c3ed772b0bc5e5505e37034d
SHA512635ec26c88c2394dd4f2a81b9aea8f429a91adfeb37ae34e51b03f3cf8e503c123c3685938f40cea07d6146e0c7113aadbe62fa528f1f6d8b995e617fd68a4aa
-
Filesize
228B
MD52d06a424ad1c7611ea9caad93892ea26
SHA1a901e15c2ecea498f1ca8ffc5d5c32bd3f0169d8
SHA2568c19027357bcb3170b6844aec44cd4c143c7b795d5df52ff89426615010f715c
SHA5123199dffce9d7625d9e01d7a06c912d3629e5f3d98d3935763df6b323807d46f24a40876d78d5ae7f7ac83c90e498e7c4810d88993904dbca1036e8c06833ccdf