Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe
Resource
win7-20220901-en
General
-
Target
549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe
-
Size
428KB
-
MD5
62767859b9b880c0efe7546d9bc5d120
-
SHA1
89d2744283d2037738d012593b50212d8b02989c
-
SHA256
549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8
-
SHA512
81fdc2cf41a9113235b2653647efb95402f8553b8f99e0a44d605adaf477cf8579279e6bc8b8e130e976bb5ef5da096e75eecbf2dd63c22994e5b8897583d1e2
-
SSDEEP
6144:Hnp8zTOujFmHrlrAQkbbG0LE0o0N0z3a8ECggYKBjiI:JwQkCgDMji
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\drivers\etc\hosts 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe File opened for modification \??\c:\windows\system32\drivers\etc\hosts 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\BROWSER HELPER OBJECTS\{B4F3A835-0E21-4959-BA22-42B3008E02FF} 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\BROWSER HELPER OBJECTS\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\BROWSER HELPER OBJECTS\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\BROWSER HELPER OBJECTS 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\mshosts.dll 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe File opened for modification \??\c:\windows\SysWOW64\Yhczku.dll.log 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe File created \??\c:\windows\SysWOW64\Msiework.lnk 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\View Source Editor\Editor Name 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\View Source Editor\Editor Name\ = "c:\\windows\\system32\\rundll32.exe" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Check_Associations = "no" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\View Source Editor 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\View Source Editor 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "no" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\View Source Editor\Editor Name\ = "c:\\windows\\system32\\rundll32.exe" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Internet Explorer\View Source Editor\Editor Name 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\View Source Editor\Editor Name 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Internet Explorer\Main 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Modifies registry class 31 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.lnkt 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046} 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnktfile\shell\open 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnktfile\shell\open\command\ = "\"c:\\windows\\system32\\RunQQIeJl.exe\" \"%1\"" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnktfile\shell\open\command 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnktfile\shell 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\lnktfile\shell 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lnkt\ = "lnkfile" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\LocalServer32 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\file\shell\open\command 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\file 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\file\shell\open 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnktfile 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\lnktfile\shell\open\command 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\lnktfile\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.lnkt 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\lnktfile\shell\open 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\file\shell\ = "open" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\lnktfile 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnktfile\DefaultIcon 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnktfile\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.lnkt\ = "lnkfile" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\lnktfile\shell\open\command\ = "\"c:\\windows\\system32\\RunQQIeJl.exe\" \"%1\"" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\lnktfile\DefaultIcon 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\file\shell 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\file\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\" \"%1\"" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Token: SeIncBasePriorityPrivilege 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Token: 33 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Token: SeIncBasePriorityPrivilege 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1104 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 26 PID 2016 wrote to memory of 1104 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 26 PID 2016 wrote to memory of 1104 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 26 PID 2016 wrote to memory of 1104 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 26 PID 2016 wrote to memory of 2012 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 28 PID 2016 wrote to memory of 2012 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 28 PID 2016 wrote to memory of 2012 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 28 PID 2016 wrote to memory of 2012 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 28 PID 2016 wrote to memory of 368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 30 PID 2016 wrote to memory of 368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 30 PID 2016 wrote to memory of 368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 30 PID 2016 wrote to memory of 368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 30 PID 2016 wrote to memory of 848 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 34 PID 2016 wrote to memory of 848 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 34 PID 2016 wrote to memory of 848 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 34 PID 2016 wrote to memory of 848 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 34 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 PID 2016 wrote to memory of 1368 2016 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 11 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 848 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe"C:\Users\Admin\AppData\Local\Temp\549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe"2⤵
- Drops file in Drivers directory
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.execmd /c del c:\rzxsy*.dll /f /s /q3⤵PID:1104
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c del /f /s /q "%USERPROFILE%\COOKIES\*.TXT"3⤵PID:2012
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c del /f /s /q "%USERPROFILE%\Local Settings\Temporary Internet Files\*.*"3⤵PID:368
-
-
C:\Windows\SysWOW64\attrib.exeattrib.exe c:\windows\system32\drivers\etc\hosts -s -h -r3⤵
- Views/modifies file attributes
PID:848
-
-