Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2022 22:29
Static task
static1
Behavioral task
behavioral1
Sample
235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe
Resource
win10v2004-20220901-en
General
-
Target
235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe
-
Size
160KB
-
MD5
61ec2f1e4cb8f360bf05023710b4b1ff
-
SHA1
0983e56d0e2f57fc6f5dcf94883a0f3ab7b6cb84
-
SHA256
235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9
-
SHA512
878be4abdd3f290e71e4b290f5cc1cc0c18083470107f758fc8e37c9564280de199b775ad4b6bdd9e9487419d2767fae3502d69cbecae09c4ea103eb22fa2776
-
SSDEEP
1536:o0K3a3E5YW/io2C+I4LQ54z2B814KX6hN2DDwRCPERykcb+L:I3aE5/io2C+I4LQ54z2C14KK3W8RCm/
Malware Config
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Executes dropped EXE 1 IoCs
pid Process 808 inl24DB.tmp -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3176 attrib.exe 4404 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\hsdfasd = "\"C:\\Users\\Admin\\AppData\\Roaming\\duckload\\tmp.\\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}\" hh.exe" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe File opened for modification C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{69309D6D-4B77-11ED-A0EE-72E891315508} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\henniu1111.site IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cnkankan.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com\ = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\henniu1111.site\Total = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30990212" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1043825045" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1057263486" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\Total = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.henniu1111.site\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30990212" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\Total = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "189" IEXPLORE.EXE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main reg.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\cnkankan.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1043825045" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main reg.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\henniu1111.site\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.henniu1111.site IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30990212" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.82133.com/?S" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://www.82133.com/?S" reg.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H) reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E} reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\IsShortCut reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command\ = "wscript -e:vbs \"C:\\Users\\Admin\\AppData\\Roaming\\duckload\\3.bat\"" reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3724 235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1256 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1256 iexplore.exe 1256 iexplore.exe 1380 IEXPLORE.EXE 1380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 3724 wrote to memory of 3060 3724 235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe 89 PID 3724 wrote to memory of 3060 3724 235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe 89 PID 3724 wrote to memory of 3060 3724 235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe 89 PID 3060 wrote to memory of 5108 3060 cmd.exe 91 PID 3060 wrote to memory of 5108 3060 cmd.exe 91 PID 3060 wrote to memory of 5108 3060 cmd.exe 91 PID 5108 wrote to memory of 4632 5108 cmd.exe 93 PID 5108 wrote to memory of 4632 5108 cmd.exe 93 PID 5108 wrote to memory of 4632 5108 cmd.exe 93 PID 5108 wrote to memory of 4956 5108 cmd.exe 94 PID 5108 wrote to memory of 4956 5108 cmd.exe 94 PID 5108 wrote to memory of 4956 5108 cmd.exe 94 PID 5108 wrote to memory of 4552 5108 cmd.exe 95 PID 5108 wrote to memory of 4552 5108 cmd.exe 95 PID 5108 wrote to memory of 4552 5108 cmd.exe 95 PID 5108 wrote to memory of 1412 5108 cmd.exe 96 PID 5108 wrote to memory of 1412 5108 cmd.exe 96 PID 5108 wrote to memory of 1412 5108 cmd.exe 96 PID 5108 wrote to memory of 1652 5108 cmd.exe 97 PID 5108 wrote to memory of 1652 5108 cmd.exe 97 PID 5108 wrote to memory of 1652 5108 cmd.exe 97 PID 5108 wrote to memory of 4404 5108 cmd.exe 98 PID 5108 wrote to memory of 4404 5108 cmd.exe 98 PID 5108 wrote to memory of 4404 5108 cmd.exe 98 PID 5108 wrote to memory of 3176 5108 cmd.exe 100 PID 5108 wrote to memory of 3176 5108 cmd.exe 100 PID 5108 wrote to memory of 3176 5108 cmd.exe 100 PID 3724 wrote to memory of 808 3724 235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe 99 PID 3724 wrote to memory of 808 3724 235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe 99 PID 3724 wrote to memory of 808 3724 235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe 99 PID 5108 wrote to memory of 1868 5108 cmd.exe 101 PID 5108 wrote to memory of 1868 5108 cmd.exe 101 PID 5108 wrote to memory of 1868 5108 cmd.exe 101 PID 5108 wrote to memory of 2200 5108 cmd.exe 102 PID 5108 wrote to memory of 2200 5108 cmd.exe 102 PID 5108 wrote to memory of 2200 5108 cmd.exe 102 PID 1868 wrote to memory of 4900 1868 rundll32.exe 103 PID 1868 wrote to memory of 4900 1868 rundll32.exe 103 PID 1868 wrote to memory of 4900 1868 rundll32.exe 103 PID 4900 wrote to memory of 860 4900 runonce.exe 104 PID 4900 wrote to memory of 860 4900 runonce.exe 104 PID 4900 wrote to memory of 860 4900 runonce.exe 104 PID 5108 wrote to memory of 1784 5108 cmd.exe 106 PID 5108 wrote to memory of 1784 5108 cmd.exe 106 PID 5108 wrote to memory of 1784 5108 cmd.exe 106 PID 1784 wrote to memory of 1256 1784 cmd.exe 108 PID 1784 wrote to memory of 1256 1784 cmd.exe 108 PID 1784 wrote to memory of 3772 1784 cmd.exe 109 PID 1784 wrote to memory of 3772 1784 cmd.exe 109 PID 1784 wrote to memory of 3772 1784 cmd.exe 109 PID 1256 wrote to memory of 1380 1256 iexplore.exe 110 PID 1256 wrote to memory of 1380 1256 iexplore.exe 110 PID 1256 wrote to memory of 1380 1256 iexplore.exe 110 PID 3724 wrote to memory of 1192 3724 235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe 112 PID 3724 wrote to memory of 1192 3724 235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe 112 PID 3724 wrote to memory of 1192 3724 235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe 112 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4404 attrib.exe 3176 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe"C:\Users\Admin\AppData\Local\Temp\235f0c77c2dc786c41617995f4324f715a9fedb262cce18cbf5bb2dbcfe849d9.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\start_min_bat.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\duckload\1.bat3⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?S"" /f4⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:4632
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?S"" /f4⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:4956
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?S"" /f4⤵PID:4552
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f4⤵
- Modifies registry class
PID:1412
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\Users\Admin\AppData\Roaming\duckload\3.bat""" /f4⤵
- Modifies registry class
PID:1652
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\duckload\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4404
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\duckload\tmp4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3176
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\duckload\2.inf4⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r5⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o6⤵PID:860
-
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 D:\VolumeDH\inj.dat,MainLoad4⤵PID:2200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\duckload\2.bat4⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\PROGRA~1\INTERN~1\iexplore.exeC:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://www.cnkankan.com/?821335⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1380
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\duckload\1.inf5⤵PID:3772
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inl24DB.tmpC:\Users\Admin\AppData\Local\Temp\inl24DB.tmp2⤵
- Executes dropped EXE
PID:808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\235F0C~1.EXE > nul2⤵PID:1192
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD5cf320b30d34c5dc2dedf088ade964439
SHA1d06cb72c01a83ad5b2149da3ed78a2e389aefa22
SHA2560d02752c7abcd0f153ce1d133a4dc1a9aed16a4675dfa0108533226204a426f2
SHA512c7d01969e99f6870a0aeebe276aafad33196f67d3723aecf29cf313aebefd9f7817a245b590b27b639be4e4046444d03a15d553d15ac3b3aceff89c2fbeb91b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD560c5dda6c87529c1fdbe874fd534913b
SHA1141dd530c67ebdac9998a8f253aede034519ebbb
SHA256c210d69c28a4a6abb399a425ffb66797df7c3fcf3bfc9eab0bf0dc7e19fc84ee
SHA512bfd86d9e0ee15f5b183070573cfd693e83ce1083aa9c061ce9e68ed0f38518352ccd11b5f78a4b9179bccbed6dad89ee2003b414fbc1e20cf835af7c57b232c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5419d7a9e7629f69e1859ae203c7f6c4c
SHA17b0c531394bb62008a37ecd1ad96406ebf3500fa
SHA256795514f1350b7e3aab3b9025797fa137ffbe5570136459c52ae26ddfdce25fe8
SHA5123033a7739e6f29ef8e16b1617b36f56cb4f748f681802b51ababbcad07e7aa0b1309b4818c866b6e9dd451ac0c8cc7ff53a4f355d09973346fc0f3dc30bcab8d
-
Filesize
960B
MD55c85ce81bfb5a28f33edd9cb48743233
SHA15521f943791d643afcd6773155c0e0a52520f3fb
SHA25633e516b86c6d5691ef255e802550b74580327e8ecb9aed6c7ac69dd7afa906c6
SHA512d2757c893acbb4ebcd935a18d419e8e61f15c30dc0fe4fe7ea26e6a35b48daabd9afd7aea7ed2dca2e07f9d9f56e8c8a9023f5efa9cfd8c39b8285c69c617bd7
-
Filesize
57.2MB
MD5606fd23f0e3aef8deeaec20783243b23
SHA172d660f3490cf26ae935e6f8c4ade942d8b84ae3
SHA25614c39b9c917a987ca498ccf0bfb0cd599d00841331c23d0fb0f26cd6cf786949
SHA512b64101427f4a269cc71db9150d6f062c1db98720f1dae2acf0a1786c5ab9fdf27283ba1553e9b80cc6257f52998cacd4cb76853b9d8476e689526fc8283613f5
-
Filesize
57.2MB
MD5606fd23f0e3aef8deeaec20783243b23
SHA172d660f3490cf26ae935e6f8c4ade942d8b84ae3
SHA25614c39b9c917a987ca498ccf0bfb0cd599d00841331c23d0fb0f26cd6cf786949
SHA512b64101427f4a269cc71db9150d6f062c1db98720f1dae2acf0a1786c5ab9fdf27283ba1553e9b80cc6257f52998cacd4cb76853b9d8476e689526fc8283613f5
-
Filesize
55B
MD5e191fedc0782635d37e36a8461827974
SHA1523793f1e74d3ae481f5f42783244162efff4bfb
SHA2569ee7d9d0f401b4fd51744d311c071bec10a20bc941385c5502c4eec958ae216f
SHA51270094446f0ff5dac95902f6caabbe82046569f3fd37bf696648ed8213e1330c18b4d1cdfbc59a639aa52fb7c90192b9d3cd0e455660b1b5702d6c3bcdeed7c62
-
Filesize
3KB
MD5493c22f6b15f9766ae7c23794fc77da0
SHA143723ba660dbc1486f717441b58298d33b9f2048
SHA256478b8c2f0dc23db49d62f987ca5e01afde54d7abff647894ad2e38f9d7fde182
SHA512662644aeef7666b23b90b6ce08ea8271a7cb7379bad6920434d045fdcbbcd48b4bbb65620ac4a5c347e376ecf2ff60e115b869c74a28ca7776cf6fc83b01df34
-
Filesize
410B
MD566a1f0147fed7ddd19e9bb7ff93705c5
SHA19d803c81ea2195617379b880b227892ba30b0bf6
SHA2564f45ce85e221352f7fe26e04968c7f7267dc24b55cf2b72b929b4c90e48cb764
SHA512cfe51756ddec75d240249980a4d27870d15983add25058e4d0da4d8a3ea11384d4d228d6cbc95091f91e516e1ab4dfb1e315941dbd95bf717d4b31936311d597
-
Filesize
3KB
MD5bc99bb6d1d1dd9a94046790ef52b118e
SHA1eed678414bb1f34c9048591c954506d66c7b6763
SHA256a55879a6440658bf2f99f3400775bf71239eaad4eb2ba6d56b0fd19e8247104b
SHA512bfbcb8cb4ed16924b4c9680ad1d6c3e34a4cac30fe1b65cadabf2907c6534e95ca9a58c17519ccd2da0a70245eef48c5d31d60e90f6f2db58406f1fac3d20042
-
Filesize
249B
MD5989d5ced1a763799655ef548607bb348
SHA19cce73c2d866f8933b3d68c60517fa3d2f46632d
SHA256625c71f2fd19c0a583a04417992d652e8e6733b32ad599d974c9546a87dda872
SHA512c858c22dbf9eeb07e6c52684b0678bdc40d65d8e58dda43b4aae7c1f88384d73788a792fdc4b5e524676d3e72e0f548b0210a3034dd738eb1085fa510c685f85
-
Filesize
5.8MB
MD5cf320b30d34c5dc2dedf088ade964439
SHA1d06cb72c01a83ad5b2149da3ed78a2e389aefa22
SHA2560d02752c7abcd0f153ce1d133a4dc1a9aed16a4675dfa0108533226204a426f2
SHA512c7d01969e99f6870a0aeebe276aafad33196f67d3723aecf29cf313aebefd9f7817a245b590b27b639be4e4046444d03a15d553d15ac3b3aceff89c2fbeb91b6