Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 17:57

General

  • Target

    cf3.3自动挂机外挂/登录前请打开.bat

  • Size

    525B

  • MD5

    79bee7ea1092a0449dbef0521e7b085c

  • SHA1

    41245a0554c030b2c8c1235f332e97eb92acba91

  • SHA256

    267ccbb17b2a65fcfca0e1fe7f0dc3ebc44d9bbb891d34def79f98ef65cbf07e

  • SHA512

    a73674bf12fe6c0967bcf23fc4ed219814c490d4e9a59288f62488bb87e197d973d33cfa6436eb5594608b2aa93022a0dd8ab00bf3b384629b93625caf8c6396

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cf3.3自动挂机外挂\登录前请打开.bat"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Windows\system32\reg.exe
      reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d "http://www.saohu.cn" /f
      2⤵
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      PID:2944
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.saohu.cn
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verB5D3.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RGI21ZAG\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\Favorites\╔º║ⁿ├Γ╖╤═Γ╣╥═°.url

    Filesize

    114B

    MD5

    1722b085b35838b0a3c251f3eb1098bb

    SHA1

    40a7d4ae9a7295d672280ff356b2b99f46a54794

    SHA256

    20ec720cbd8293072ef50ec28da72b1d853ca0cec1f89661fb4272c71012ae68

    SHA512

    b7883eaacf27457a1c0b910b2d3650ce7419a98d471b0b593300d44b3a43ea068b1fe159e373953981796b0fb6a65d640cabc65b023222ed02ee86420e2d1e67