Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 22:24

General

  • Target

    QQ空间全能助手/无法运行请点我.bat

  • Size

    111B

  • MD5

    9f3e181c3e4e9321fc729813b8b8d390

  • SHA1

    0de1a4b0fd73bac0d352b10193faa36aead47ea5

  • SHA256

    102aab53907784ff8f0aad7fe63522afd5e44053ee8bf008750f6f9de368c594

  • SHA512

    f246fb33497b828ae1637d5057d3e9a9c1f45dd9bde2fdc0a02ab61084935219fc4ac074251866f72547e5f02f753c8398888beef05260988b66feea282ffed2

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 5 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\QQ空间全能助手\无法运行请点我.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\system32\regsvr32.exe
      regsvr32 COMCTL32.OCX
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\regsvr32.exe
        COMCTL32.OCX
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3036
    • C:\Windows\system32\regsvr32.exe
      regsvr32 MSWINSCK.OCX
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\SysWOW64\regsvr32.exe
        MSWINSCK.OCX
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2216
    • C:\Windows\system32\regsvr32.exe
      regsvr32 MSINET.OCX
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Windows\SysWOW64\regsvr32.exe
        MSINET.OCX
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2696
    • C:\Windows\system32\regsvr32.exe
      regsvr32 MSCOMCTL.OCX
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\regsvr32.exe
        MSCOMCTL.OCX
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:2776
    • C:\Windows\system32\regsvr32.exe
      regsvr32 COMDLG32.OCX
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\SysWOW64\regsvr32.exe
        COMDLG32.OCX
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1152

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads