Analysis
-
max time kernel
149s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe
Resource
win10v2004-20240802-en
General
-
Target
ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe
-
Size
1.5MB
-
MD5
2cd99159c94188afe5cf0a4cf126fb88
-
SHA1
a0cb44f510a907ab0c5a6e305d444613017240d2
-
SHA256
ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad
-
SHA512
a2cc82ef39a15c309a40da9ff2cdeecd3e81aaadf45e46cc33c42d92b573ea274e9d9feca2136dd2e16c61d714bc0e9956b6a0a6f7181bc076f2932a43f152d3
-
SSDEEP
49152:oJnfQW0e9+tqf/2vwHTwQWTG6sY7BFZOxu6FNkKFNku:oCWZrHhWTG6VzHkk0ku
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyQAuto.exe ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe -
Executes dropped EXE 1 IoCs
pid Process 1332 ctfnom_.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfnom_.exe = "ctfnom_.exe" ctfnom_.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ctfnom_.exe = "ctfnom_.exe" ctfnom_.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ctfnom_.exe ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe File opened for modification C:\Windows\SysWOW64\MyQAuto.exe ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe File created C:\Windows\SysWOW64\Del.bat ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe File created C:\Windows\SysWOW64\Del.vbs ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe File opened for modification C:\Windows\SysWOW64\favicon.ico ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe File opened for modification C:\Windows\SysWOW64\favicon.reg ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfnom_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{00000823-0823-0823-0823-000000000823}\Default Visible = "Yes" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{00000823-0823-0823-0823-000000000823}\Exec = "http://www.qq823.com" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{00000823-0823-0823-0823-000000000823}\HotIcon = "favicon.ico" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{00000823-0823-0823-0823-000000000823}\Icon = "favicon.ico" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{00000823-0823-0823-0823-000000000823}\MenuStatusBar = "QQ823网址导航" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{00000823-0823-0823-0823-000000000823} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{00000823-0823-0823-0823-000000000823}\ButtonText = "QQ823网址导航" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{00000823-0823-0823-0823-000000000823}\CLSID = "{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{00000823-0823-0823-0823-000000000823}\MenuText = "QQ823网址导航" regedit.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main ctfnom_.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main ctfnom_.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.qq823.com" ctfnom_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://www.qq823.com" ctfnom_.exe -
Modifies registry class 25 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\QQ823 regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\InProcServer32\ThreadingModel = "Apartment" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\Shell\Open regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\QQ823 regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\QQ823\ = "访问QQ823网址导航" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\QQ823\ = "访问QQ823网址导航" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\Shell regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\QQ823\command regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\QQ823\command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE http://www.qq823.com" regedit.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\Shell\Open\Command regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\ = "QQ823网址导航" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\InfoTip = "欢迎您访问QQ823网址导航" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\DefaultIcon\InProcServer32 regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\Shell\Open\Command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE http://www.qq823.com" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\QQ823\command regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\DefaultIcon\ = "favicon.ico" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\InProcServer32 regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\ShellFolder regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\{305ca226-d286-468e-b848-2b2e8e697b74} 2 = "0" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\DefaultIcon regedit.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\ShellFolder\Attributes = 00000000 regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\QQ823\command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE http://www.qq823.com" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{16C8E222-28A3-4136-85B3-71CCDB643F5F}\InProcServer32\ = "shdocvw.dll" regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 960 regedit.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3616 ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe 1332 ctfnom_.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3616 wrote to memory of 2264 3616 ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe 85 PID 3616 wrote to memory of 2264 3616 ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe 85 PID 3616 wrote to memory of 2264 3616 ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe 85 PID 3616 wrote to memory of 1332 3616 ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe 86 PID 3616 wrote to memory of 1332 3616 ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe 86 PID 3616 wrote to memory of 1332 3616 ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe 86 PID 2264 wrote to memory of 2024 2264 WScript.exe 87 PID 2264 wrote to memory of 2024 2264 WScript.exe 87 PID 2264 wrote to memory of 2024 2264 WScript.exe 87 PID 2024 wrote to memory of 960 2024 cmd.exe 90 PID 2024 wrote to memory of 960 2024 cmd.exe 90 PID 2024 wrote to memory of 960 2024 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe"C:\Users\Admin\AppData\Local\Temp\ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\Del.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\Del.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Windows\system32\favicon.reg4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Runs .reg file with regedit
PID:960
-
-
-
-
C:\Windows\SysWOW64\ctfnom_.exeC:\Windows\system32\ctfnom_.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD5b58a5f659c85978342cf6130f1fdfa17
SHA19f7812a274d8debb2801cb8616c1fd4c5891b3dc
SHA2567f451eb5acf109c0b0a61a7e0c9e66c2562c8baa4d2ad5efaee9fd2a7434d8cd
SHA512382d494ba0f7cc7ee05e74f7165a33aefb93236bb4f5f06aac292b134100d927caca70138fb86c650d99f291844e52e13dbc99de967f636b6b763ea83652e3b7
-
Filesize
93B
MD58cf96bc792eca45cff7728ad63086a3d
SHA121517b7e4c2aa1aaf7aa5a2b378c81f49c2d2b27
SHA25644afb3f2711eaa8be0a622e88d9ac73854433d8101e9e02341330e6407c4b493
SHA51225bc1c86d5c48bb31498520a4dbd10d9b129fa137f0781915d3bda051d5ea7c209ca137f42c4a26b71563235214dd1af35f1434dbd8d8ebf7dbe8a0002f6580d
-
Filesize
10KB
MD52e735e75aa993f6915a90a3891fd3718
SHA173ec3e4ba7dae5e26011d206e4bec5235a3175c3
SHA256f8d29e1e0df238650ff4ea650d0f151a17be09256bc66f72ffdddb3c23e1b7d5
SHA51258c9d0efd8ffc1d7e3b3001e7bbc781e762bb3ddc2682997f8b9e8522473498cd104ad54385e697c1b6f5096fa657e4c3071a988cb853015943043208e69810a
-
Filesize
5KB
MD584a824b138dc2382d367ddbf818c8ae5
SHA186f14284d9eecfeba769664d7cb26806c8fd37f5
SHA2567053ebfe5a3c5d16cd9b6be7cc7bb10636cb611760c4394300b762a8f7bddf6e
SHA512ff78f1d3763bff2af7e30ae78c317e0a122761307f0aa662f81cca68e3de8b687027f58b5ed4f33ee050be07a1d1c231edd0cf99938cf50913902a5a51f35ed2