Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe
Resource
win10v2004-20220901-en
General
-
Target
29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe
-
Size
310KB
-
MD5
793327e861ff1bc78d510117eaa27670
-
SHA1
5528ca6d10b08c1f0b65b653e6b67aa024e71ece
-
SHA256
29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1
-
SHA512
7466d94b003a99d9e8b1731cd9b61ebabe68475509d5d13d457763c70de02fc2ee027edf431a8fb3a97544ed189379ff50f53cdac25a12b76e7079934cbcec37
-
SSDEEP
6144:QFxJ85QlW5suGZ4HIy72pXHfDRH0G3B5jAPjsBpb0rAy+YJ1:W62W5suOMIX/DVXB587sBpb0rNz
Malware Config
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\safe.ico 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\progra~1\ico\$dpx$.tmp\bffe3c76bd8bbf4faa82a61c70a86028.tmp expand.exe File opened for modification C:\progra~1\ico\Taobao.ico expand.exe File opened for modification C:\progra~1\ico\Video.ico expand.exe File opened for modification C:\progra~1\ico\$dpx$.tmp expand.exe File opened for modification C:\progra~1\ico\Beauty.ico expand.exe File opened for modification C:\progra~1\ico\Film.ico expand.exe File created C:\progra~1\ico\$dpx$.tmp\9be770451246aa4bb838459da492c0fe.tmp expand.exe File created C:\progra~1\ico\$dpx$.tmp\9cf6644d4d50844580d4246e2edd9610.tmp expand.exe File opened for modification C:\progra~1\ico\$dpx$.tmp\job.xml expand.exe File created C:\progra~1\ico\$dpx$.tmp\ce109d47b829234db5f325a5afd03a11.tmp expand.exe File opened for modification C:\progra~1\ico\Chat.ico expand.exe File created C:\progra~1\ico\$dpx$.tmp\f692ca241d50e047a8d8ecf8b009eb59.tmp expand.exe File opened for modification C:\progra~1\ico\meiv.ico expand.exe File created C:\progra~1\ico\$dpx$.tmp\c07c2bbbd98419468fe135a793cb92e4.tmp expand.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.779dh.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\mitao01.bar\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b2fff61dccd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09933821-3811-11ED-8F62-626C2AE6DC56} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ename.com\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "189" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\618889.shop.ename.com\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\779dh.com\Total = "63" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09935F31-3811-11ED-8F62-626C2AE6DC56} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\779dh.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\779dh.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a3000000000200000000001066000000010000200000001f61cf9919bbbcc2a9ae9c61a7682e636894f01703029a7a75427d9af4acd8cd000000000e8000000002000020000000d6e32aca420cece2663b102d7131717ca4d815351d5b0af678e4022479407fbe20000000b8e16b9a2a09d955f5a8facbe37cd179fc277fa51dffa40dc10dc26de98dbd8f40000000bf98cba8b58958ddbd2163d57d7104ebb746abe6a5ba5ca462ac5d1aeaea6fad299b95825f7155db196f0953ce7fea51a1f034964fcd3d2814b7044cd6da077f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{091E94C1-3811-11ED-8F62-626C2AE6DC56} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ename.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 680 iexplore.exe 1460 iexplore.exe 1812 iexplore.exe 1484 iexplore.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 1460 iexplore.exe 1460 iexplore.exe 1484 iexplore.exe 1484 iexplore.exe 680 iexplore.exe 680 iexplore.exe 1812 iexplore.exe 1812 iexplore.exe 1012 IEXPLORE.EXE 1728 IEXPLORE.EXE 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 1012 IEXPLORE.EXE 1728 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1012 IEXPLORE.EXE 1012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 576 wrote to memory of 1076 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 29 PID 576 wrote to memory of 1076 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 29 PID 576 wrote to memory of 1076 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 29 PID 576 wrote to memory of 1076 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 29 PID 576 wrote to memory of 1600 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 28 PID 576 wrote to memory of 1600 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 28 PID 576 wrote to memory of 1600 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 28 PID 576 wrote to memory of 1600 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 28 PID 1076 wrote to memory of 2028 1076 cmd.exe 31 PID 1076 wrote to memory of 2028 1076 cmd.exe 31 PID 1076 wrote to memory of 2028 1076 cmd.exe 31 PID 1076 wrote to memory of 2028 1076 cmd.exe 31 PID 824 wrote to memory of 1460 824 explorer.exe 34 PID 824 wrote to memory of 1460 824 explorer.exe 34 PID 824 wrote to memory of 1460 824 explorer.exe 34 PID 576 wrote to memory of 680 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 36 PID 576 wrote to memory of 680 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 36 PID 576 wrote to memory of 680 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 36 PID 576 wrote to memory of 680 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 36 PID 576 wrote to memory of 1484 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 37 PID 576 wrote to memory of 1484 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 37 PID 576 wrote to memory of 1484 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 37 PID 576 wrote to memory of 1484 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 37 PID 576 wrote to memory of 1812 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 38 PID 576 wrote to memory of 1812 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 38 PID 576 wrote to memory of 1812 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 38 PID 576 wrote to memory of 1812 576 29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe 38 PID 1484 wrote to memory of 1724 1484 iexplore.exe 40 PID 1484 wrote to memory of 1724 1484 iexplore.exe 40 PID 1484 wrote to memory of 1724 1484 iexplore.exe 40 PID 1484 wrote to memory of 1724 1484 iexplore.exe 40 PID 680 wrote to memory of 1012 680 iexplore.exe 39 PID 680 wrote to memory of 1012 680 iexplore.exe 39 PID 680 wrote to memory of 1012 680 iexplore.exe 39 PID 680 wrote to memory of 1012 680 iexplore.exe 39 PID 1460 wrote to memory of 1980 1460 iexplore.exe 41 PID 1460 wrote to memory of 1980 1460 iexplore.exe 41 PID 1460 wrote to memory of 1980 1460 iexplore.exe 41 PID 1460 wrote to memory of 1980 1460 iexplore.exe 41 PID 1812 wrote to memory of 1728 1812 iexplore.exe 42 PID 1812 wrote to memory of 1728 1812 iexplore.exe 42 PID 1812 wrote to memory of 1728 1812 iexplore.exe 42 PID 1812 wrote to memory of 1728 1812 iexplore.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe"C:\Users\Admin\AppData\Local\Temp\29a20515e8e82ebfaa714e22cb4f77bb09db3c78bee3e3f5d4243cd735df85c1.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.v258.net/list/list16.html?mmm2⤵PID:1600
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\PuII9.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\ico.cab" -F:*.* "C:\progra~1\ico"3⤵
- Drops file in Program Files directory
- Drops file in Windows directory
PID:2028
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.q22.cc/?ukt2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:680 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1012
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.v921.com/?uk2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1484 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.779dh.com/?kj2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.v258.net/list/list16.html?mmm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD51c626eac6241b02b0082a76f150a3a8a
SHA1b7c0c6ae1d3d5a2beaf4c4f3744cac6285f04858
SHA256412116af67c3a894bee8821158ee91447ca6cfe0d5b43d0524e6c5af5defaf69
SHA5128550f0ec9a9c5f152a3b5eb49a91084d3201589373b8d381233926f1ac34bd0c276fa1e3c9da75bd8297f417d9f566f4bf6b882107c7255522f745e6d446802a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize1KB
MD52c32100249bd03a08745cfeda61bfad5
SHA16108968db9e17f3cf7f38e60f9bd33c56d9613cb
SHA2565c6f494b47b37859489a17b673d3553818ab41d37680559881c4219b933c83ac
SHA5120f9b7bd18711f274fdc008168c9a65f948f21662ce279f92c28e3c06a0b8f7ac3b902165289cb71fb72adaa1db2630646fd48809d260b559e881e296cad4ed7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize1KB
MD52c32100249bd03a08745cfeda61bfad5
SHA16108968db9e17f3cf7f38e60f9bd33c56d9613cb
SHA2565c6f494b47b37859489a17b673d3553818ab41d37680559881c4219b933c83ac
SHA5120f9b7bd18711f274fdc008168c9a65f948f21662ce279f92c28e3c06a0b8f7ac3b902165289cb71fb72adaa1db2630646fd48809d260b559e881e296cad4ed7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize1KB
MD52c32100249bd03a08745cfeda61bfad5
SHA16108968db9e17f3cf7f38e60f9bd33c56d9613cb
SHA2565c6f494b47b37859489a17b673d3553818ab41d37680559881c4219b933c83ac
SHA5120f9b7bd18711f274fdc008168c9a65f948f21662ce279f92c28e3c06a0b8f7ac3b902165289cb71fb72adaa1db2630646fd48809d260b559e881e296cad4ed7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B
Filesize1KB
MD59f31ceafcd5552efe8af77bf6e9b099d
SHA1960b91f21645c7f5146f5e7d9196b8ddcbb793f3
SHA25664227d3b38d9c85117739959ed4e6bad094c030b95692ef07f5fa76c4d86f1ce
SHA512dd419cf02dacb922cede42a3a39def6795d2aebba2b98938bc283f79a085d3638d94caf889ee2c5a94b636eabc766270d0f17cae6a2aa82575c11180340409e5
-
Filesize
60KB
MD56c6a24456559f305308cb1fb6c5486b3
SHA13273ac27d78572f16c3316732b9756ebc22cb6ed
SHA256efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973
SHA512587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96C
Filesize1KB
MD58fced4006c9ee62ff400d17f33f534ad
SHA1bf9d8ff26b17bb8b4c279447a3da45735984e3fc
SHA2564731a0645123f98995d9fdc1f6322c917f568a8157cf0ce24df0bd6b1fc99c77
SHA512ce93866b981a8550b4d93d98cfcf68a041ef263ee7e6a0a9a4c44ac42f6741490c9dd0ee2d8cbc73ac7480d0a2cde6d3c50172846541eff8a1f3f5829c9d1a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3
Filesize1KB
MD50c96bda380389824ac9b46b3c8b48191
SHA1e461cb148a4ec14ede8cbc3516d17030f4854bd2
SHA2562cbcf93ac8d19498d3cd3ca0a4937bd5a05f50e61e0891e738107cd2b3412f33
SHA512416490966afa8b1878c5a22d1d0924b48df65292b256f94f15effe2a79ff8cbd50333713c631b70323b95740f5019e2564602b151dbc3c5b3427ad06ebe014e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD548e98893438d04fa64bb49bbdafbf960
SHA1e28578281fc80cb97275a94aa0e9da0db8285b87
SHA2562ad261d743636a48688f1d3a1a9def925c6a7642db3dea12b8c23e5aac46719d
SHA5129eb1160e51ce79e0a7055a053ac5f25d2ff8d7277f8af146c188a1bd24deddd12df219aeb410f072b26ccaa114b88d7680d474c86736a0ab3187ec7ee08c73b0
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5374d6db725ce027f1e5ab811449ce5f9
SHA1dc64be1a4e5211bc4067d5dedcc5881314e7d4d2
SHA2567a631e754f71096d5759a6236be309c84fd8431b2827d06c80b5083ce25f7811
SHA51218054f32b3bec6282af8e92b15fa7039a93a0157cbc6e092f0a155f328faecf715e8215d3f4f49202d8e84527d8392cde8cdae8dc4847182ff60259a6773a759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5fab14731eee427494d698dd051354f88
SHA1a68a880e89c7f67ba5d6e444ea21906dfe7407d9
SHA256c4d0e0f31e5a3cbc41022fcf1281e0b5fccc4194123b8dabf1908782caf57d60
SHA512fd5ce56ebf846ff5cf8157d0b51637833928c43aea2d8587b1626b72e2d13cb889aec30d1102265ad62f420be82ff4294c8d26eb67bf9e0f18cd7e366942b3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize508B
MD557fca80ec5f047e2d33f48f2f10052d8
SHA147e6a7ef47624a633a517ec0f7aa30b58440c636
SHA25658150f47be2b4b1a9ee4bccea89a1ea9ffe93286cd33fcdb77b641ad0243b048
SHA51291dc447b0335dd51af36498d37f6475bdccd5d80255e7e07fd3bddb4c600b8fe1b5b5c9417e7904aeda8354448480c702310b3b58ba61941be7db3bd4152a12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize508B
MD5f93cd0feb05c6850c97e19d641153fc3
SHA152e1fb2fb719ccf5714437fce5f04f89cb65cba9
SHA25615a66b2dcd2adb8eeba29986a6fa65f791f3f17091f1f2f84540cef8be47067d
SHA5127e9e9ca1df71859608a0d2a0d8805f09ae33093fc44ba308fe99dba7db7c2fa98fa7742146f2c61a888ae6dce5c6f73da3e2a4499bfb5868bf4d81b6e6370c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize508B
MD51f2ef5500aa2dcdb01423a259bd417a9
SHA12b73f0cab4a1430fedec64256c4703198fa1f801
SHA256bf8d0b8e11a3d5dce8ccfc162234cc59e3f109f34d55bb52e0702e47f36cee8d
SHA5128356fc1ac8b8ef24239a59a16cc1e188baba4f81ea3f287cc9eb5b7ba368e2de7ae5a0d0226d4ea500330edc44b97630d941f295d051f5fab99a9d3d50333aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B
Filesize532B
MD5286d9e7be678e2611264467b6eb4ead8
SHA1e1417a64a6772148ec6365becf7597c26cc441d0
SHA2567a6d5091186f022cbe2c2916c08d1deb95ca864a3bf9975832aa5d40d111bf12
SHA5124a16c8ab1fb8d44c511c656dcc2cc2effff84fa836a40d2712853cf0db7b255e74b957d7ee4d0ba576f1f5313effef36e499842cbe938cee77dc3a6e8a180d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5870469740b9f1eb0c2d4b73ccc431e95
SHA12b2765b5c450bd5f10453faf08e9e1e1d8510ec5
SHA256fcb10b06d1a4754bd0b8d943ecee866380443514411d9832a51f8e66c3b42248
SHA51257bb51b2e143aa660644571c7884ebde2417a5d791dfee21168c220426cedd2df9fc29b825f1c2d411229d240173aaed348b38a2c594a67865f9b1b1a1e42ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5459fabd9b32795a5661543a9f9ef1925
SHA187536bec4ef8aaf62138039972b102ee8fde810b
SHA256f4a0b9cb537989a733b392b7c4de62c976a93ed7323458e98560745e43c81b2f
SHA5125eaadfb7817bd625b63756aeebdd48ad3bfe2096b77095db910d390e2cba517d0961851955d9930a757078dc95cc0c126e0187199567fe86ea6571673d93b450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5320a114c6f0b9cab661c73c0203c6d
SHA114561bf2b721c1a4fb388f085f4713465c771a5e
SHA256f346cd864d409777bb96f5c313dda00f54024be4d4bf6c99b809e2ffa20fa43b
SHA512195c15b459d72c6964bc364ecc1bd89e275b15ba9ceca1d559ec9cfcd502013b94aef022cb2826016bf62698c778df8515925bb3aef29900e244e5c8a6aca865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b095306248d19fa51a8a659c16f64ab
SHA10d68e888e94bd2d7b7dc8ca1505cd23f2ae41744
SHA2565d87936abcf7b47ce2b4cbe8e478030d8d7dd6e64bd819629ab73b973e03b07b
SHA512e59afcb91cbc06b69c28c64d19fd4f8e0e21c1624dd6b3791f1c7010c2c1f563fcf4a5acab6880c776611d2ab7400d72734514090d538fe20ffa8854dcffffb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a6065316ddaa0375995eb1a5f689489
SHA1e6087bca4282d22665ccc464ecbe8fc79ba150d1
SHA256d4b9c3df9a9dc20a463114f9125f617191239bc207d298d4b3e4594f80e1bef3
SHA5126f5cff5be7a983aa6af1b0b22084969d104bda5939b1f52b39459f29f2a7edad93b6d9fe351d7c44a13c203b3f8082f34413465665cd274db251045edc1651c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96C
Filesize492B
MD5562fd6ce7151cbd7456680a957325622
SHA1ada83571856be1ac3b0c25b09bf28a10877d51e0
SHA2560bcf44f988369b61519b6ec0071aa5dfe52d31d6135de37c1e1618e826ccf0b3
SHA51271978a165ae8ab895c20139d8a9c81c0b199dd7714a820c341b0ecb33df60d6e595379097abb79cf5da6878cc8d2a10a0bb4ace9832b06a4bbea4c540a7ba8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3
Filesize506B
MD55b52e93293b207904a8c107aa70dc740
SHA1d4087e760d66ec23208484f43558d8d9ab8a61ee
SHA2561ea45b748e99381167a810e779437447df37a764124a8cc86f6255c70f786222
SHA5120f7dc35dce3dc22a695b41fd4f4af5a01e14d7ee69bec0a17d6fa7660e2c306208f133950e178a6ec3e0b7e42107dbd044305cfc8b05a0169f8b150da0327842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5011df94610de3e0b46edf3fd91fc2096
SHA148541acad203cb4e2db44d4340e2fa050ba2807e
SHA256e2abab13910669d19c788471a8b49bd7d9dab8f7fcd820a50ea5cf64d2c2c936
SHA512f623d5ad6a33a098d146c278166e3a89c8271d2aefdd941785945bf7c037c8cbf20e905f67d582b72aa1e4f74077bc810ef894119aa64e391f29a011b9152ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55e7ad8c53bc2953978f2724d813e5403
SHA104b9e9fe5f5b662e3c0479945c4d2d7cb7fb4fa8
SHA256a9e635f8dc9dbc156bd99a307de84caeee4e9b072b00bd3ec5533052003f4a21
SHA512728e6458a9233ccda0090dc3f398e46483796decc72faff02ef0567738829a5ca35fdff5fd0d1700c1817a1b5acc9d69c24fe0eb81315ec2fa5ebb5c5a028f8f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0997FAE1-3811-11ED-8F62-626C2AE6DC56}.dat
Filesize3KB
MD522c8fc0e78b68dca7d1b9ddac5012c70
SHA1674c3799915031f5adbf29d8ea1bf2d7edc1ff03
SHA256f90b063460df1ad5c96696d5a6d6ff9a49432d7309315e0e5c35f8439a42752a
SHA51221c4d4620e0c5de72d8a52f52281545d4f7d622bbb44ec617fbfbda51bf822f9e5568b82492115f8bc4b542d6f79f05243a64b318a83075382e89b3948c1b9df
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0997FAE1-3811-11ED-8F62-626C2AE6DC56}.dat
Filesize5KB
MD5c9a5da69417d82f097504a2786fc567d
SHA10d313942ca400b1a579a9ff1c522319919313981
SHA2567f0db802c83331d733f7077231dd54afc10752e961d84d5f82ebadf06236177e
SHA512a8cba75f2f550ad9e52879905b864c642cfce9d3aff70db0c657fbcf5e2a551c789a69637f858a0e711bad5239a8d4b7c61846a982dd7c762efb8756f839327a
-
Filesize
98B
MD5ada787702460241a372c495dc53dbdcf
SHA1da7d65ec9541fe9ed13b3531f38202f83b0ac96d
SHA2560d0f600f95192d2d602dbda346c4e08745295f331f5a0349deae21705367b850
SHA512c86091735b855691c89c7946145591dec6a6a6a36a2438d392587a9cc1f2d85c1ebe44fcff1cc9d94271a24ebbc2ca38639577a6f5c592e9e10517da26572708
-
Filesize
94B
MD561443655d3f3001bfb27decc82aee322
SHA14b734a7f4721691165ec4979cb78f9b4c73dc57b
SHA256925406fcd468fa8f3e915368681d9c89e46aa0fff45ce618a8c2f647d320a410
SHA51276fdaf24da8b96f32e9fd132716eec7cd2e639191668ad67e3a9f4a3c22b3c7e02f28f4d7296eb1ba23c0f92a66104b89f8aae3e752a9c0bd10eeb35a7f1838a
-
Filesize
608B
MD59f28017beea302014d4c9754676580ce
SHA1646ee503a48d6f6423ea78aebe41f418c5cc2f1a
SHA256dae903049092e070345bd690b54d6244e6995d09fcaf8aabdfbae712839a44f1
SHA512c9309bc321663951aa1db7f3bf295282c67bf3173dfef435cc5b59365822db43cc5c9df475cfec3ee3a1e551da374bbaf1a27d7c0336326d90f3dd8df4dff584
-
Filesize
20KB
MD51319e9998cedc513c68fa6d590b6ad63
SHA1ae95b333e88a13886994f320f5dfb4856168a710
SHA2569a5b18efe243fbe9b9b0be3674a24080e9210436986988f3f85a4007905083bb
SHA512d4052a899c6c310296e2f5fdf6c2031c22d2644be620cb34ddcc6b59789d82a6462daaeb34466c568be48ee975c4a5ab43143eab0792312a6cd0d49f9fbd8d3f