Analysis
-
max time kernel
95s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 22:21
Static task
static1
Behavioral task
behavioral1
Sample
14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe
Resource
win10v2004-20220901-en
General
-
Target
14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe
-
Size
2.7MB
-
MD5
6c9722cc71776d80f2c50816efdbe85e
-
SHA1
d73636f93548e96fda42ca820461c1352414412b
-
SHA256
14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f
-
SHA512
bdb1579768276fb03cde0a5e33eea7a4c009bc96f59dd656fc0f2c59ca40030b8df92555fbdb6cc03eeaa5e3343699ecedd7419ef8b81151706f112d4cb5d2a8
-
SSDEEP
49152:6ffy4NwrQq6Y0uaXxl9LC2v2UZGglxh5ozMP4NQQOSr5k/I4XTZGfDahGGrgQ:6ffyH69uM9LCC2UfYz24NQdWC/IgT9VX
Malware Config
Signatures
-
Detected phishing page
-
Executes dropped EXE 4 IoCs
Processes:
86on_yes.exehahagame.exeSeFastInstall3_3261.exehahagame.tmppid process 4436 86on_yes.exe 308 hahagame.exe 224 SeFastInstall3_3261.exe 1236 hahagame.tmp -
Processes:
resource yara_rule C:\SeFastInstall3_3261.exe upx C:\SeFastInstall3_3261.exe upx behavioral2/memory/224-143-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral2/memory/224-150-0x0000000000400000-0x00000000004AB000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
SeFastInstall3_3261.exedescription ioc process File opened for modification \??\PhysicalDrive0 SeFastInstall3_3261.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
IEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "119578" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\webpage.qidian.qq.com\ = "52" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "119240" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\wanwang.aliyun.com\ = "119055" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\webpage.qidian.qq.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "119703" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CB23E54B-42C2-11ED-A0EE-567C1489C33F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\aliyun.com\Total = "119223" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "119247" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\west.cn\Total = "192" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\qq.com\Total = "69" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "119667" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.west.cn\ = "264" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "122" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\wanwang.aliyun.com\ = "14" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.west.cn\ = "244" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\webpage.qidian.qq.com\ = "69" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\wanwang.aliyun.com\ = "119123" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "119440" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "119598" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.west.cn\ = "185" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\qq.com\Total = "52" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\wanwang.aliyun.com\ = "60" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\webpage.qidian.qq.com\ = "44" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\wanwang.aliyun.com\ = "119370" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\qq.com\Total = "44" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30987983" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "119667" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\west.cn\Total = "244" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "119340" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\wanwang.aliyun.com\ = "119292" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d790600000000020000000000106600000001000020000000bc643d73564d643781e452197e5c3935b1b12cd021e05248866242169f5a47a2000000000e8000000002000020000000cf2aba8ec6a120f37886643346a80ac985c54c411ffc1f5cba279f6740f0ebb220000000f666cb24584bbb5fc017142baec24975c540ba2fbedfa638778cb689280ed468400000005fff30c5426143f48ea4974e19ac87d11f531155a2b44f3d47e71b8ac5721ed024a8f57f89d017c0a84c2703eaf6c6f1dcfcc2a62e222c002d2bd9ee664495f1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\aliyun.com\Total = "119089" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "119598" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\aliyun.com\Total = "60" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30987983" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\west.cn\Total = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "119272" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\aliyun.com\Total = "119123" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d790600000000020000000000106600000001000020000000b5e4ee0263acd90142b892c262119530a84ba8cf3248eff0145fa3fd633f2c21000000000e800000000200002000000092170ded22aa75c291fa086d0cc402bdf4c2e5f2fbb09d01a0bbf174c14cb36f200000006b5c1ea4d982686cf8945826d0dc6436287001c3f4d4e787611d78674b4abde140000000323425d4722c0f0c2de210f7cc1bcceb94cb98ede2085060553c83909faaeb7578d36f8c21dc12529c662a6ea902684794477f40f8da4c9267dd55539f9f5e74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "119274" IEXPLORE.EXE -
Modifies registry class 1 IoCs
Processes:
IEXPLORE.EXEdescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-929662420-1054238289-2961194603-1000\{94E0DFE3-6368-40D3-A8B9-F2A55CB5C7E0} IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
IEXPLORE.EXEAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 2360 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 2360 IEXPLORE.EXE Token: SeShutdownPrivilege 2360 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 2360 IEXPLORE.EXE Token: 33 4644 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4644 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exeiexplore.exeiexplore.exepid process 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe 3496 iexplore.exe 3808 iexplore.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exepid process 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
SeFastInstall3_3261.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 224 SeFastInstall3_3261.exe 224 SeFastInstall3_3261.exe 3496 iexplore.exe 3496 iexplore.exe 3808 iexplore.exe 3808 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 4380 IEXPLORE.EXE 4380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exehahagame.exeiexplore.exeiexplore.exedescription pid process target process PID 3584 wrote to memory of 4436 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe 86on_yes.exe PID 3584 wrote to memory of 4436 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe 86on_yes.exe PID 3584 wrote to memory of 4436 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe 86on_yes.exe PID 3584 wrote to memory of 308 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe hahagame.exe PID 3584 wrote to memory of 308 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe hahagame.exe PID 3584 wrote to memory of 308 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe hahagame.exe PID 3584 wrote to memory of 224 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe SeFastInstall3_3261.exe PID 3584 wrote to memory of 224 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe SeFastInstall3_3261.exe PID 3584 wrote to memory of 224 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe SeFastInstall3_3261.exe PID 3584 wrote to memory of 3808 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe iexplore.exe PID 3584 wrote to memory of 3808 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe iexplore.exe PID 3584 wrote to memory of 3496 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe iexplore.exe PID 3584 wrote to memory of 3496 3584 14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe iexplore.exe PID 308 wrote to memory of 1236 308 hahagame.exe hahagame.tmp PID 308 wrote to memory of 1236 308 hahagame.exe hahagame.tmp PID 308 wrote to memory of 1236 308 hahagame.exe hahagame.tmp PID 3496 wrote to memory of 2360 3496 iexplore.exe IEXPLORE.EXE PID 3496 wrote to memory of 2360 3496 iexplore.exe IEXPLORE.EXE PID 3496 wrote to memory of 2360 3496 iexplore.exe IEXPLORE.EXE PID 3808 wrote to memory of 4380 3808 iexplore.exe IEXPLORE.EXE PID 3808 wrote to memory of 4380 3808 iexplore.exe IEXPLORE.EXE PID 3808 wrote to memory of 4380 3808 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe"C:\Users\Admin\AppData\Local\Temp\14398d1f4fbd26cd3397efb2f4a9d0c2adc1c07dedb933b76245e8c9b57c264f.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\86on_yes.exeC:\86on_yes.exe2⤵
- Executes dropped EXE
-
C:\hahagame.exeC:\hahagame.exe /sp- /silent /norestart /verysilent2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-KR5UC.tmp\hahagame.tmp"C:\Users\Admin\AppData\Local\Temp\is-KR5UC.tmp\hahagame.tmp" /SL5="$A0050,1630806,72704,C:\hahagame.exe" /sp- /silent /norestart /verysilent3⤵
- Executes dropped EXE
-
C:\SeFastInstall3_3261.exeC:\SeFastInstall3_3261.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.1234.la/an.htm?yuyanzhecn2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3496 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.jipinla.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3808 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3fc 0x24c1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\86on_yes.exeFilesize
135KB
MD50175887432097d34b1d2ec4d3a3ff93f
SHA130686364ffe6ac9b782a73cd1f035d12cba3cd38
SHA2564337462d9556a4340484cb47c48318529102658469859d8a14e076b6e0022ab9
SHA512c8b21a1b5aee416ced041e4d1db9adc42902998bb9f4fe58a1d5417fff7b25d975ea262e44dacd7d24975070c29b88a58056ee2f8b748c693f63062deac88430
-
C:\86on_yes.exeFilesize
135KB
MD50175887432097d34b1d2ec4d3a3ff93f
SHA130686364ffe6ac9b782a73cd1f035d12cba3cd38
SHA2564337462d9556a4340484cb47c48318529102658469859d8a14e076b6e0022ab9
SHA512c8b21a1b5aee416ced041e4d1db9adc42902998bb9f4fe58a1d5417fff7b25d975ea262e44dacd7d24975070c29b88a58056ee2f8b748c693f63062deac88430
-
C:\SeFastInstall3_3261.exeFilesize
227KB
MD54f4507ee01a51c40fcc71d7097327883
SHA1a15eb26e219028908125a63aeb2032d99db83257
SHA25673bc7bdc659b55b762092401306ae9cf76e498e6b39950a49a5eacd288b15989
SHA51293cb8a59d95706da01cbdcd7af4604a2dce958e612bc3c6af6e1a0d060c6581504cad3cd33dd174dd3c1530b1483275aa72dc61e7061452d94ac865389bbece4
-
C:\SeFastInstall3_3261.exeFilesize
227KB
MD54f4507ee01a51c40fcc71d7097327883
SHA1a15eb26e219028908125a63aeb2032d99db83257
SHA25673bc7bdc659b55b762092401306ae9cf76e498e6b39950a49a5eacd288b15989
SHA51293cb8a59d95706da01cbdcd7af4604a2dce958e612bc3c6af6e1a0d060c6581504cad3cd33dd174dd3c1530b1483275aa72dc61e7061452d94ac865389bbece4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96CFilesize
1KB
MD53d5b0265d8f2e53d77a7a1f7b69634c0
SHA17c6bf08fa231c2a8c42da103cfedfc0ef6108253
SHA2565746b67da0e5329acb4a569faa0d907d0018987125d6f6121f40fc0283de8e95
SHA512cb525df09ff64cc8abe90d08c507ddb429404bddb743139678926fa986596b2319d64a7d1a3790881b5aa81473b7b8ec770dfdd244841f7b0181049644128b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96CFilesize
492B
MD5efefb55f81a3662a8241ec8c21795e9e
SHA1250e447d30f5534aa95a82a43abf1d8aa190c6d2
SHA2561b7e15a610e8cf7f674f8cf24bae9ca9ae12e5f6e36fe50c6aca4e0974669ecf
SHA512ee8a7dd8eec2859ce4ca545e3d601152edecb203d1d1b890599804dffce295ea602ec284956cf953da3d88f5eb023bc2907f844c4fd68f2867a6c378a4659c1e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CB23E54B-42C2-11ED-A0EE-567C1489C33F}.datFilesize
5KB
MD5e0e62abf97f89a7fcd0ab37e4fe279ca
SHA1ff51d4ea27e7eb1c4236c950663eb9c2e7f4542e
SHA256390c89a6d11768f4870af719af6525a0b668d0b9da36ab0ecb1d908c4afd2bdd
SHA512514c9684f258bf66f5e37d068411dd1979e70109f00a205c8ad1745f8997418d543de1b18e8f6962406e21a93dba4827159472dea3fcf13a96d52722921fb823
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CB395B42-42C2-11ED-A0EE-567C1489C33F}.datFilesize
5KB
MD501436543e04351d457ca1e945b1ef488
SHA1a6c9ba7c0c7485475ee13ca86d1d241668bb765c
SHA256f1a3105a50e329d78fea543a113e688765a36ad3729563cee4d89277bb479c7a
SHA51290f463d4179c194bf4342e881f33d5614a19016f5ea90dba7e88420743c6f7fda1c8d9639eea7eaec09b7f7466a5738e7e8cad9f3b8552c04b01ab9cc10844b4
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.datFilesize
1KB
MD5e51eb49c60ba5cf52f569cbfbbd155e8
SHA1600d6ae9ad546c66e1bb00899031eb22b35e5ccd
SHA256a48a5b587f2b0f310afd4c80f20d71b418bf3f21fd37305f6e9ae008762115fe
SHA512a628bda938a85b9773ba6fcd16692f1b4fd52017585d1146af67a1918986684833f53d843a30bec673e945e7e58748dfbd721583b3095c3a1d4a6631674b9b2d
-
C:\Users\Admin\AppData\Local\Temp\is-KR5UC.tmp\hahagame.tmpFilesize
682KB
MD5d0699dfc3ff2c8980f167c7ab586dfcc
SHA1c3f4aa0a542c01a0251782e48b313cbb7c5941a7
SHA25652361d23cd961a2918dd0ca57306bb9d1cf9aa65f518d2b4d11147ef1f657175
SHA512ea55708ba81207a55dfaf8e4ab77e837086d83b27c185942ce6b228f0844d4dc3e26cddd39cfda60ebf34a4f449e563f47ad46ba72e45a133e898e2a038fbf69
-
C:\Users\Admin\AppData\Local\Temp\is-KR5UC.tmp\hahagame.tmpFilesize
682KB
MD5d0699dfc3ff2c8980f167c7ab586dfcc
SHA1c3f4aa0a542c01a0251782e48b313cbb7c5941a7
SHA25652361d23cd961a2918dd0ca57306bb9d1cf9aa65f518d2b4d11147ef1f657175
SHA512ea55708ba81207a55dfaf8e4ab77e837086d83b27c185942ce6b228f0844d4dc3e26cddd39cfda60ebf34a4f449e563f47ad46ba72e45a133e898e2a038fbf69
-
C:\hahagame.exeFilesize
1.8MB
MD50b80274947513ef334429c0c666b3c53
SHA1eb8f8ea8b3dc913c361adcfa4f790935083c4bf9
SHA2564e9864adbc4b7c31cb8c1a81bb4a396459ab456640307d820f1f5d9f29e341be
SHA51207ad09b3a021effce8cf696ac3e15be276d26e0b8d983fd64647fbac71a749a158c5b02e8399fa4c008d4a5517c2befbc3e84e02be803f0dd1f169da72fd5213
-
C:\hahagame.exeFilesize
1.8MB
MD50b80274947513ef334429c0c666b3c53
SHA1eb8f8ea8b3dc913c361adcfa4f790935083c4bf9
SHA2564e9864adbc4b7c31cb8c1a81bb4a396459ab456640307d820f1f5d9f29e341be
SHA51207ad09b3a021effce8cf696ac3e15be276d26e0b8d983fd64647fbac71a749a158c5b02e8399fa4c008d4a5517c2befbc3e84e02be803f0dd1f169da72fd5213
-
memory/224-138-0x0000000000000000-mapping.dmp
-
memory/224-143-0x0000000000400000-0x00000000004AB000-memory.dmpFilesize
684KB
-
memory/224-150-0x0000000000400000-0x00000000004AB000-memory.dmpFilesize
684KB
-
memory/308-144-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/308-151-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/308-140-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/308-154-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/308-135-0x0000000000000000-mapping.dmp
-
memory/1236-145-0x0000000000000000-mapping.dmp
-
memory/4436-132-0x0000000000000000-mapping.dmp