Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 16:03
Static task
static1
Behavioral task
behavioral1
Sample
c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe
Resource
win10v2004-20220901-en
General
-
Target
c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe
-
Size
54KB
-
MD5
a0cd2483f8fdb53ab6fce6339c0d79f2
-
SHA1
ccf543c5767effd4b63e9bd9ace773c5c9055d2f
-
SHA256
c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c
-
SHA512
4fddb97aacfd0f475b295d801fe1444f17ca999dbb86131b3e7cbfce784b1d266ffa8ac14aec17979bfb6c0664022fb21543a043f6aef08113a256cf18d6b9af
-
SSDEEP
1536:dmL/ODWaaQHViEPDjMAN+3ALhi1tUUUuJkLegdV:wbaaKt3MAKQcMUUuJ0dV
Malware Config
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Executes dropped EXE 1 IoCs
pid Process 4628 inl11DF.tmp -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4536 attrib.exe 2616 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation inl11DF.tmp -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\hsdfasd = "\"C:\\Users\\Admin\\AppData\\Roaming\\redload\\tmp.\\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}\" hh.exe" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe File opened for modification C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main reg.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.henniu5555.site\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991335" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2583877887" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com\ = "126" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\henniu5555.site IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\henniu5555.site\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\cnkankan.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\Total = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "189" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2607159684" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C5169273-4FDA-11ED-A0EE-F63A18EFECFD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\henniu5555.site\Total = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991335" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991335" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main reg.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\Total = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\henniu5555.site IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.henniu5555.site IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2583877887" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://www.71628.com/?S" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.71628.com/?S" reg.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H) reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command\ = "wscript -e:vbs \"C:\\Users\\Admin\\AppData\\Roaming\\redload\\3.bat\"" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E} reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\IsShortCut reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node reg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4760 c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe Token: SeIncBasePriorityPrivilege 4628 inl11DF.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4856 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4856 iexplore.exe 4856 iexplore.exe 3108 IEXPLORE.EXE 3108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 4760 wrote to memory of 3752 4760 c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe 91 PID 4760 wrote to memory of 3752 4760 c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe 91 PID 4760 wrote to memory of 3752 4760 c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe 91 PID 3752 wrote to memory of 5088 3752 cmd.exe 93 PID 3752 wrote to memory of 5088 3752 cmd.exe 93 PID 3752 wrote to memory of 5088 3752 cmd.exe 93 PID 5088 wrote to memory of 4856 5088 cmd.exe 95 PID 5088 wrote to memory of 4856 5088 cmd.exe 95 PID 5088 wrote to memory of 4232 5088 cmd.exe 96 PID 5088 wrote to memory of 4232 5088 cmd.exe 96 PID 5088 wrote to memory of 4232 5088 cmd.exe 96 PID 5088 wrote to memory of 1516 5088 cmd.exe 97 PID 5088 wrote to memory of 1516 5088 cmd.exe 97 PID 5088 wrote to memory of 1516 5088 cmd.exe 97 PID 4760 wrote to memory of 4628 4760 c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe 99 PID 4760 wrote to memory of 4628 4760 c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe 99 PID 4760 wrote to memory of 4628 4760 c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe 99 PID 4760 wrote to memory of 1668 4760 c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe 100 PID 4760 wrote to memory of 1668 4760 c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe 100 PID 4760 wrote to memory of 1668 4760 c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe 100 PID 1516 wrote to memory of 1712 1516 cmd.exe 102 PID 1516 wrote to memory of 1712 1516 cmd.exe 102 PID 1516 wrote to memory of 1712 1516 cmd.exe 102 PID 4856 wrote to memory of 3108 4856 iexplore.exe 103 PID 4856 wrote to memory of 3108 4856 iexplore.exe 103 PID 4856 wrote to memory of 3108 4856 iexplore.exe 103 PID 1516 wrote to memory of 1288 1516 cmd.exe 104 PID 1516 wrote to memory of 1288 1516 cmd.exe 104 PID 1516 wrote to memory of 1288 1516 cmd.exe 104 PID 1516 wrote to memory of 3748 1516 cmd.exe 105 PID 1516 wrote to memory of 3748 1516 cmd.exe 105 PID 1516 wrote to memory of 3748 1516 cmd.exe 105 PID 1516 wrote to memory of 2876 1516 cmd.exe 106 PID 1516 wrote to memory of 2876 1516 cmd.exe 106 PID 1516 wrote to memory of 2876 1516 cmd.exe 106 PID 1516 wrote to memory of 3644 1516 cmd.exe 107 PID 1516 wrote to memory of 3644 1516 cmd.exe 107 PID 1516 wrote to memory of 3644 1516 cmd.exe 107 PID 1516 wrote to memory of 4536 1516 cmd.exe 108 PID 1516 wrote to memory of 4536 1516 cmd.exe 108 PID 1516 wrote to memory of 4536 1516 cmd.exe 108 PID 1516 wrote to memory of 2616 1516 cmd.exe 109 PID 1516 wrote to memory of 2616 1516 cmd.exe 109 PID 1516 wrote to memory of 2616 1516 cmd.exe 109 PID 1516 wrote to memory of 3976 1516 cmd.exe 110 PID 1516 wrote to memory of 3976 1516 cmd.exe 110 PID 1516 wrote to memory of 3976 1516 cmd.exe 110 PID 1516 wrote to memory of 4196 1516 cmd.exe 111 PID 1516 wrote to memory of 4196 1516 cmd.exe 111 PID 1516 wrote to memory of 4196 1516 cmd.exe 111 PID 3976 wrote to memory of 5096 3976 rundll32.exe 112 PID 3976 wrote to memory of 5096 3976 rundll32.exe 112 PID 3976 wrote to memory of 5096 3976 rundll32.exe 112 PID 5096 wrote to memory of 3556 5096 runonce.exe 113 PID 5096 wrote to memory of 3556 5096 runonce.exe 113 PID 5096 wrote to memory of 3556 5096 runonce.exe 113 PID 4628 wrote to memory of 692 4628 inl11DF.tmp 116 PID 4628 wrote to memory of 692 4628 inl11DF.tmp 116 PID 4628 wrote to memory of 692 4628 inl11DF.tmp 116 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4536 attrib.exe 2616 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe"C:\Users\Admin\AppData\Local\Temp\c0f9c674554abee4fcbd695eefe9aa3a8677c5dd477c73904415be3ad6b2c48c.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s_g_l_209.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\redload\1.bat3⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\PROGRA~1\INTERN~1\iexplore.exeC:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://www.cnkankan.com/?716284⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4856 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3108
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\redload\1.inf4⤵PID:4232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\redload\2.bat4⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.71628.com/?S"" /f5⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:1712
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.71628.com/?S"" /f5⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:1288
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\tmp" /v "key" /d ""http://www.71628.com/?S"" /f5⤵PID:3748
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f5⤵
- Modifies registry class
PID:2876
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\Users\Admin\AppData\Roaming\redload\3.bat""" /f5⤵
- Modifies registry class
PID:3644
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\redload\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4536
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\redload\tmp5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2616
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\redload\2.inf5⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r6⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o7⤵PID:3556
-
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 D:\VolumeDH\inj.dat,MainLoad5⤵PID:4196
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inl11DF.tmpC:\Users\Admin\AppData\Local\Temp\inl11DF.tmp2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl11DF.tmp > nul3⤵PID:692
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\C0F9C6~1.EXE > nul2⤵PID:1668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5d3ff0edeee7d1ea5754d8a290ae01189
SHA1253ee24a4776d30bac0aedd7ea213adea6acb6f9
SHA256e2e542a3681c428c021d38e608dffa43da666f6f3c53f623c21dc184639b222b
SHA512ab14449059ae31856026e8d8cb0ec0b4158da0fd19f2a73940a159574a9084ce6a09ac05fb80ef3ab11cd9b1395dce021872215baced48f9e8a0bf7311000db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5869d0233b09cb59e69caf869d854a538
SHA1d41aad169aadcbc3d60c37ea2719f93d954e4cbf
SHA256ccf99e103555875a0990cb10073d0988a3314e71da112835a6d8c83f773be7f7
SHA5125d110527cc46543031eb9c10b2fe303cb63d963bc4afa28efaabfcd4df6f0e0e7eba270982b69dc45300daf38313b0b870461c6d7165986206024a0de8ac591f
-
Filesize
790B
MD5b18422bf438bbb7798280375a7bc0976
SHA1c1b77b35e3a38ff2ad119f25e548beb5ff68c2e2
SHA256ee8709e751067193dccdfe218108bdae6a30919d7b6c860bc848c7cc4b242fa4
SHA51223cb9c74905f514a2bf4ef91afc53ceb08230b3ce68e3eab17bb36c674260d143a7e7105958ff4ed5c2a416bddffb3c7e28dcf8060cbf323c7e4cab71f613176
-
Filesize
57.2MB
MD5b4a0221915c3c4b4c762acce6a3582c5
SHA13673514fa039491d5908bfa2392e70378b8e2f18
SHA256d52e838643f8a4c92e91d97def5ca829c746e962b40493563ef80258f43394e0
SHA5124c83e1f8d879c8c8865d08da6df9e9d743a0c59e1b1dae0a0d177e276986ae458c154656a6e559fb46d5cfe66392ba8e732b4485c7ad029ccc9b0190d3434700
-
Filesize
57.2MB
MD5b4a0221915c3c4b4c762acce6a3582c5
SHA13673514fa039491d5908bfa2392e70378b8e2f18
SHA256d52e838643f8a4c92e91d97def5ca829c746e962b40493563ef80258f43394e0
SHA5124c83e1f8d879c8c8865d08da6df9e9d743a0c59e1b1dae0a0d177e276986ae458c154656a6e559fb46d5cfe66392ba8e732b4485c7ad029ccc9b0190d3434700
-
Filesize
54B
MD5504490369970f1c0eb580afbcdf91618
SHA1b52f65cd538e6c998b2c7e3167f9c8e8fa6c7971
SHA256a13a0579286521f0d7cb55fc7d28c6d33f14c0573e9e69f7584fa4008a8e7d43
SHA5125495ce79abf0fc4ffbfaf9aefa484145f4e0d3e8457be0e2e4dfb1284fb5413016f2d9867e2386db5c4f7b51863bfffeae8ea6bd879053fdf6a928ab2a0857ad
-
Filesize
3KB
MD5b13d4a59d37d8c293276a4c428ad5659
SHA1710bfa65cfd533b78c564e15e0bbe954e9265ecf
SHA2563aea9dee221648916706758561e23796b2325e4019b28a3070fe2fd8d1d4ed28
SHA5128cb3aec7463cf7d14f333bb9257f03c7f7491f4da4fea3311e505f99b9f6797f0aa3f689355a6625d9f104b8511f7e75218b4c2fdd7f9ac96927d7aa4a6ed0ba
-
Filesize
410B
MD566a1f0147fed7ddd19e9bb7ff93705c5
SHA19d803c81ea2195617379b880b227892ba30b0bf6
SHA2564f45ce85e221352f7fe26e04968c7f7267dc24b55cf2b72b929b4c90e48cb764
SHA512cfe51756ddec75d240249980a4d27870d15983add25058e4d0da4d8a3ea11384d4d228d6cbc95091f91e516e1ab4dfb1e315941dbd95bf717d4b31936311d597
-
Filesize
3KB
MD5185a49cc37f1724dc196f67c42a76340
SHA127fde7b9ba462fc36ba5705832ae44b454d718cf
SHA2563fe8fbf78cb9855c0cc663dda80354318fb2c7ef1dc4d378c98bb1383015140d
SHA51297ee31a378404bae99616a057ddbed8450f56bfd5d0508b4cc3b864e73aa5d8d1f15b21c82ed3570494603ac90bb7cee1b8cbdae9d935bb1ddb71264004e4c22
-
Filesize
248B
MD52197ffb407fb3b2250045c084f73b70a
SHA13d0efbacba73ac5e8d77f0d25d63fc424511bcf6
SHA256a1a42f5a41ce65135b1ad525eabc04cce89ee07d2f51d06e5e1dea6047081591
SHA512b35a99e144da3f02de71158f58a6b937435d1bce941126a554783c667654b880527b11ba8a5c0fcf093ce28863ea4f5e60f73f8f973a727f177d584d2e9c80fe
-
Filesize
5.8MB
MD557ea1b9d488a993521d122e9fb5544bc
SHA102e3df90988581e1c8239490e6bd4f6e74a27d9c
SHA2568f5595321be14a29f257054e45c996a0447137aa9edc32264b30268054be02fb
SHA512c07e889f1d0fbcde5846ea3f648a83318f86099a83059c010d61f015c10dc4207492af19a4e483c19c3d661424b10d49db817a73627bea101fe43d62b5a76ee3