Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 13:27
Static task
static1
Behavioral task
behavioral1
Sample
593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe
Resource
win10v2004-20220812-en
General
-
Target
593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe
-
Size
480KB
-
MD5
6f50e2b491285314dffbdf495c20b1e0
-
SHA1
12f3bc625b8cde134da267ddbaa70df9ad49848b
-
SHA256
593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41
-
SHA512
ddd629e0c8136b3de43ed7a000caa268e3f65c6e6fe01eb3987cf848ea1841136fec129e49762ea2b6a48ffa87ee44a24d34c639fb8e4f75b47838cd4093edb0
-
SSDEEP
12288:R1DYr96WUZOMwO5eTV38FRCXUq89H8I/mVOQiXpuUUM:RdY5TMwseTvXUq89cYmQz5uUUM
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000014544-74.dat family_gh0strat behavioral1/files/0x0007000000014544-75.dat family_gh0strat -
joker
Joker is an Android malware that targets billing and SMS fraud.
-
resource yara_rule behavioral1/files/0x0007000000013359-56.dat aspack_v212_v242 behavioral1/files/0x0007000000013359-55.dat aspack_v212_v242 behavioral1/files/0x0007000000013359-58.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 1864 ʵÃ÷ÈÏÖ¤.exe -
Loads dropped DLL 7 IoCs
pid Process 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 1864 ʵÃ÷ÈÏÖ¤.exe 1864 ʵÃ÷ÈÏÖ¤.exe 1864 ʵÃ÷ÈÏÖ¤.exe 2380 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wipokrnwnk svchost.exe File created C:\Windows\SysWOW64\xguodmyocp svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.lbxywl.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8009b24997d6d801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E3BE101-428A-11ED-B59B-4A4A572A2DE9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\mgy5.tv IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E325B81-428A-11ED-B59B-4A4A572A2DE9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E302131-428A-11ED-B59B-4A4A572A2DE9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E2FFA21-428A-11ED-B59B-4A4A572A2DE9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "189" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command ʵÃûË¢¿¨È«Äܸ¨Öú.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID ʵÃûË¢¿¨È«Äܸ¨Öú.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} ʵÃûË¢¿¨È«Äܸ¨Öú.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell ʵÃûË¢¿¨È«Äܸ¨Öú.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage ʵÃûË¢¿¨È«Äܸ¨Öú.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2380 svchost.exe 2380 svchost.exe 2380 svchost.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeBackupPrivilege 1864 ʵÃ÷ÈÏÖ¤.exe Token: SeRestorePrivilege 1864 ʵÃ÷ÈÏÖ¤.exe Token: SeBackupPrivilege 1864 ʵÃ÷ÈÏÖ¤.exe Token: SeRestorePrivilege 1864 ʵÃ÷ÈÏÖ¤.exe Token: SeBackupPrivilege 2380 svchost.exe Token: SeRestorePrivilege 2380 svchost.exe Token: SeBackupPrivilege 2380 svchost.exe Token: SeBackupPrivilege 2380 svchost.exe Token: SeSecurityPrivilege 2380 svchost.exe Token: SeSecurityPrivilege 2380 svchost.exe Token: SeBackupPrivilege 2380 svchost.exe Token: SeBackupPrivilege 2380 svchost.exe Token: SeSecurityPrivilege 2380 svchost.exe Token: SeBackupPrivilege 2380 svchost.exe Token: SeBackupPrivilege 2380 svchost.exe Token: SeSecurityPrivilege 2380 svchost.exe Token: SeBackupPrivilege 2380 svchost.exe Token: SeRestorePrivilege 2380 svchost.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1084 iexplore.exe 964 iexplore.exe 1496 iexplore.exe 1580 iexplore.exe 2012 iexplore.exe 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 964 iexplore.exe 964 iexplore.exe 1496 iexplore.exe 1496 iexplore.exe 2012 iexplore.exe 2012 iexplore.exe 1728 iexplore.exe 1728 iexplore.exe 1084 iexplore.exe 1084 iexplore.exe 1580 iexplore.exe 1580 iexplore.exe 852 IEXPLORE.EXE 852 IEXPLORE.EXE 696 IEXPLORE.EXE 696 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 452 IEXPLORE.EXE 452 IEXPLORE.EXE 1308 IEXPLORE.EXE 1308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 1692 wrote to memory of 920 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 27 PID 1692 wrote to memory of 920 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 27 PID 1692 wrote to memory of 920 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 27 PID 1692 wrote to memory of 920 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 27 PID 1692 wrote to memory of 1864 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 28 PID 1692 wrote to memory of 1864 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 28 PID 1692 wrote to memory of 1864 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 28 PID 1692 wrote to memory of 1864 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 28 PID 1692 wrote to memory of 1864 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 28 PID 1692 wrote to memory of 1864 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 28 PID 1692 wrote to memory of 1864 1692 593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe 28 PID 920 wrote to memory of 1728 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 30 PID 920 wrote to memory of 1728 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 30 PID 920 wrote to memory of 1728 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 30 PID 920 wrote to memory of 1728 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 30 PID 920 wrote to memory of 1580 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 31 PID 920 wrote to memory of 1580 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 31 PID 920 wrote to memory of 1580 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 31 PID 920 wrote to memory of 1580 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 31 PID 920 wrote to memory of 1496 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 32 PID 920 wrote to memory of 1496 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 32 PID 920 wrote to memory of 1496 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 32 PID 920 wrote to memory of 1496 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 32 PID 920 wrote to memory of 1084 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 33 PID 920 wrote to memory of 1084 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 33 PID 920 wrote to memory of 1084 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 33 PID 920 wrote to memory of 1084 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 33 PID 920 wrote to memory of 964 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 34 PID 920 wrote to memory of 964 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 34 PID 920 wrote to memory of 964 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 34 PID 920 wrote to memory of 964 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 34 PID 920 wrote to memory of 2012 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 35 PID 920 wrote to memory of 2012 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 35 PID 920 wrote to memory of 2012 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 35 PID 920 wrote to memory of 2012 920 ʵÃûË¢¿¨È«Äܸ¨Öú.exe 35 PID 964 wrote to memory of 1656 964 iexplore.exe 37 PID 964 wrote to memory of 1656 964 iexplore.exe 37 PID 964 wrote to memory of 1656 964 iexplore.exe 37 PID 964 wrote to memory of 1656 964 iexplore.exe 37 PID 1496 wrote to memory of 1976 1496 iexplore.exe 42 PID 1496 wrote to memory of 1976 1496 iexplore.exe 42 PID 1496 wrote to memory of 1976 1496 iexplore.exe 42 PID 1496 wrote to memory of 1976 1496 iexplore.exe 42 PID 2012 wrote to memory of 852 2012 iexplore.exe 41 PID 2012 wrote to memory of 852 2012 iexplore.exe 41 PID 2012 wrote to memory of 852 2012 iexplore.exe 41 PID 2012 wrote to memory of 852 2012 iexplore.exe 41 PID 1728 wrote to memory of 1308 1728 iexplore.exe 40 PID 1728 wrote to memory of 1308 1728 iexplore.exe 40 PID 1728 wrote to memory of 1308 1728 iexplore.exe 40 PID 1728 wrote to memory of 1308 1728 iexplore.exe 40 PID 1084 wrote to memory of 452 1084 iexplore.exe 39 PID 1084 wrote to memory of 452 1084 iexplore.exe 39 PID 1084 wrote to memory of 452 1084 iexplore.exe 39 PID 1084 wrote to memory of 452 1084 iexplore.exe 39 PID 1580 wrote to memory of 696 1580 iexplore.exe 38 PID 1580 wrote to memory of 696 1580 iexplore.exe 38 PID 1580 wrote to memory of 696 1580 iexplore.exe 38 PID 1580 wrote to memory of 696 1580 iexplore.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe"C:\Users\Admin\AppData\Local\Temp\593d9a97ac754168b88f27352eaaae8985c2a84d4031207d12d450b223d2fe41.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\ʵÃûË¢¿¨È«Äܸ¨Öú.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\ʵÃûË¢¿¨È«Äܸ¨Öú.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.lbxywl.com3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1308
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" Http://wb.lbxywl.com/Ad/1.asp3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:696
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" Http://wb.lbxywl.com/Ad/2.asp3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1496 CREDAT:275457 /prefetch:24⤵
- Suspicious use of SetWindowsHookEx
PID:1976
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" Http://wb.lbxywl.com/Ad/3.asp3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:24⤵
- Suspicious use of SetWindowsHookEx
PID:452
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" Http://wb.lbxywl.com/Ad/4.asp3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:964 CREDAT:275457 /prefetch:24⤵
- Suspicious use of SetWindowsHookEx
PID:1656
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" Http://wb.lbxywl.com/Ad/5.asp3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:852
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ʵÃ÷ÈÏÖ¤.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ʵÃ÷ÈÏÖ¤.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "netsvcs"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5d15aaa7c9be910a9898260767e2490e1
SHA12090c53f8d9fc3fbdbafd3a1e4dc25520eb74388
SHA256f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e
SHA5127e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc3c8d81116e3ca62e96d7f0419428d
SHA1f8edff1885432efcaa1c19d419c3279957011912
SHA2567040b63a400f74ec0bc7585db34b98a0d0302adf084bc24ef571236ce476792a
SHA5129c3a75ed8889d0e7c82e2f62405c6f997b0b86dccf177f136763ba591c64ea62439e75d02cd5ff1a14b35a62d0803ee0b0f27ca6d9c2766dac65e399484715e4
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5E302131-428A-11ED-B59B-4A4A572A2DE9}.dat
Filesize4KB
MD5ff5f9b284e30286a4629154954a4a3ba
SHA10bff3a69f7338d216327174fc3c304f180f41268
SHA256ba98ff4296d28c3c28da8e88b69524154440d691eea9fe8fe8e900f4462f87df
SHA512f9808223d134e836cfdd6d9f172c1052ca3fa730a82d36040f9c7eff45da6dccc4e6b6665effa3e7ff58d7f200ace26f8a5e6222404c2951f22d28728d44c747
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5E325B81-428A-11ED-B59B-4A4A572A2DE9}.dat
Filesize5KB
MD58e7ac58aa07cc83db4bb8757a9d73923
SHA166ad5fc7df6144be50930d4ed777351eaec8edef
SHA25607353ceabb84faa1015a6436194bcefea9c1db5a1fd95218faa27dbfb1145971
SHA512b5100b38fb5eecb6720d6e3d5c0cce04624cd71a9917875c0ecb68996444b3ef45ca5b371196bcb39a7705bcc8e33ba59649361d2f0bc16ba3ead31de38f5812
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5E34BCE1-428A-11ED-B59B-4A4A572A2DE9}.dat
Filesize4KB
MD571b282ef1b4c356f2d01ff49763acf44
SHA1b48d4471e0b7d61fd806c5e49fc745ae7639c328
SHA2561fa9ff20128d38838699fc90c30bf5a3abf74ca31e8e777840f535d9a7d04650
SHA5120e1a51a04cd8652b1ff3786b51504aad08e9f820b6c12b0adb943d6d60ef2c1da2ed2db70c0d827810dd6adfa1ddfaff4872505ae13c2dfaaf338b3b3f1cd30d
-
Filesize
5KB
MD5f58d580856231d757d7f05b506d72ff1
SHA1101d33fa1852d49f970a7be8d9fe018cd507de8b
SHA256cb8d9fc91bba6a597a18ee14c7ec2869d93e62b8b1bebe639c2e9adeab56826e
SHA51291408f90ffc033faa4b9d7fab3257b1bcbdd473b693caddefc45dee1bccc29458ee291a265a6113c3406ccb87e0201c6e9201bf45a5eca292d0b2fdc3c1d8afd
-
Filesize
603B
MD529241e994b5cd5c9161e78748bbe433a
SHA15d273c6a8ea2e034a9e6bd09619ce47da1bc9e31
SHA256bda409db8e60c5fc81cf3f841c4764ea9137ee28709d10e2b535c92ad8ebf7c1
SHA512c65c238a298ef6ff10915571f4322528c8fa08375e98efebc8773dcfc2ef28f3379a07623777bc695a10c04d6d58e88597f68f593a7cb231082c63c99c4011f8
-
Filesize
192KB
MD587c4f6ec9a137bea1f00052b438417e3
SHA13cd79dc0b335feb011902805c69f75b0a73f6455
SHA2568bb2557b2a86bbf7b19a7ca20349e60726471151df575f4460d8608153632f19
SHA5121e5831bd17f03d7bc01e7863784f5ebfb13de7fc09eb63dc23957fc8e296159ff80f7ea936e4fc85ff4f1cfbd117f60803dec769fc3ce83a6e5191fbbfd75b47
-
Filesize
192KB
MD587c4f6ec9a137bea1f00052b438417e3
SHA13cd79dc0b335feb011902805c69f75b0a73f6455
SHA2568bb2557b2a86bbf7b19a7ca20349e60726471151df575f4460d8608153632f19
SHA5121e5831bd17f03d7bc01e7863784f5ebfb13de7fc09eb63dc23957fc8e296159ff80f7ea936e4fc85ff4f1cfbd117f60803dec769fc3ce83a6e5191fbbfd75b47
-
Filesize
287KB
MD5f8c6fa7133ee1e2bd1941e5d12e0a48f
SHA1797417d1e31f02b0ea0557b92300b3bd92a8be99
SHA2560862fb9a6e5292ab10ae4a08817da2e80da960840adb2ea4cd6feb5a2198207e
SHA512d84d50ba8c1e7acec14c419dd0669b259dac3e151558041be38936feab98b469401a3dc18cc0ad8d3833851157a9ddd16eb271f4ca5508ef34dacdc5b898ab04
-
Filesize
860KB
MD52e90b69e832159f40e020e745de20159
SHA1dabc02d22bdf420cfa35ba6b87c4e5cb5c8565d6
SHA256052b995402783fe765c27f9ef38816b7355a42623a3bc678a6486096ead3adc5
SHA512dca3cc544ed53f434da9c088deef773f48f9e3fafc96db976e6139862ec3f2b950112b9e9beb0fdb3935d4384e5bb02a6110f570453fac0d7dbbec13ecac98ee
-
Filesize
860KB
MD52e90b69e832159f40e020e745de20159
SHA1dabc02d22bdf420cfa35ba6b87c4e5cb5c8565d6
SHA256052b995402783fe765c27f9ef38816b7355a42623a3bc678a6486096ead3adc5
SHA512dca3cc544ed53f434da9c088deef773f48f9e3fafc96db976e6139862ec3f2b950112b9e9beb0fdb3935d4384e5bb02a6110f570453fac0d7dbbec13ecac98ee
-
Filesize
192KB
MD587c4f6ec9a137bea1f00052b438417e3
SHA13cd79dc0b335feb011902805c69f75b0a73f6455
SHA2568bb2557b2a86bbf7b19a7ca20349e60726471151df575f4460d8608153632f19
SHA5121e5831bd17f03d7bc01e7863784f5ebfb13de7fc09eb63dc23957fc8e296159ff80f7ea936e4fc85ff4f1cfbd117f60803dec769fc3ce83a6e5191fbbfd75b47
-
Filesize
192KB
MD587c4f6ec9a137bea1f00052b438417e3
SHA13cd79dc0b335feb011902805c69f75b0a73f6455
SHA2568bb2557b2a86bbf7b19a7ca20349e60726471151df575f4460d8608153632f19
SHA5121e5831bd17f03d7bc01e7863784f5ebfb13de7fc09eb63dc23957fc8e296159ff80f7ea936e4fc85ff4f1cfbd117f60803dec769fc3ce83a6e5191fbbfd75b47
-
Filesize
192KB
MD587c4f6ec9a137bea1f00052b438417e3
SHA13cd79dc0b335feb011902805c69f75b0a73f6455
SHA2568bb2557b2a86bbf7b19a7ca20349e60726471151df575f4460d8608153632f19
SHA5121e5831bd17f03d7bc01e7863784f5ebfb13de7fc09eb63dc23957fc8e296159ff80f7ea936e4fc85ff4f1cfbd117f60803dec769fc3ce83a6e5191fbbfd75b47
-
Filesize
192KB
MD587c4f6ec9a137bea1f00052b438417e3
SHA13cd79dc0b335feb011902805c69f75b0a73f6455
SHA2568bb2557b2a86bbf7b19a7ca20349e60726471151df575f4460d8608153632f19
SHA5121e5831bd17f03d7bc01e7863784f5ebfb13de7fc09eb63dc23957fc8e296159ff80f7ea936e4fc85ff4f1cfbd117f60803dec769fc3ce83a6e5191fbbfd75b47
-
Filesize
287KB
MD5f8c6fa7133ee1e2bd1941e5d12e0a48f
SHA1797417d1e31f02b0ea0557b92300b3bd92a8be99
SHA2560862fb9a6e5292ab10ae4a08817da2e80da960840adb2ea4cd6feb5a2198207e
SHA512d84d50ba8c1e7acec14c419dd0669b259dac3e151558041be38936feab98b469401a3dc18cc0ad8d3833851157a9ddd16eb271f4ca5508ef34dacdc5b898ab04
-
Filesize
287KB
MD5f8c6fa7133ee1e2bd1941e5d12e0a48f
SHA1797417d1e31f02b0ea0557b92300b3bd92a8be99
SHA2560862fb9a6e5292ab10ae4a08817da2e80da960840adb2ea4cd6feb5a2198207e
SHA512d84d50ba8c1e7acec14c419dd0669b259dac3e151558041be38936feab98b469401a3dc18cc0ad8d3833851157a9ddd16eb271f4ca5508ef34dacdc5b898ab04