Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe
Resource
win10v2004-20220812-en
General
-
Target
72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe
-
Size
212KB
-
MD5
075f7995c386dbf1d71ad15967b5c8e2
-
SHA1
fde5ee1c186a68a5a1f929a569ebe241cfe95798
-
SHA256
72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a
-
SHA512
1a1f84d854939811ded3e777b0ec74028ed08b4835513df3854dd2a155e88dbb6a30be2cb26ace6ab6e86e152f928d4fd531ce7da1e172ca9771308e6ffe36d2
-
SSDEEP
6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDmb:dHp/urb4A1WdBf0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1584 Program FilesO58C6T.exe -
Deletes itself 1 IoCs
pid Process 664 WScript.Exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Common Files\t.ico 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe File opened for modification \??\c:\Program Files\Common Files\d.ico 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0EC03931-5E07-11ED-B68C-6A6CB2F85B9F} = "0" IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a1fdf513f2d801 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374526968" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf000000000200000000001066000000010000200000002ee25e3b4bc065bcf7a130575be36b52f117fb3cfbb08f70521f2b6a739eced8000000000e800000000200002000000043683e6c6b9810d1e92c885b1674247bbb3e26026eadce80f753f9ac2ab2364f2000000073813e9ce0ecd64300231b2f87c609cc001baaeea3dfd927c418d7c8c29be9b240000000fc31f90d6f2c09ee4487944a9cedb677427938df3130e613be146713ae818bdd4cecfa6a1d51efc4771ea39bb290accccd80ee6a0f0a119fc89292251f404565 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E897991-5E07-11ED-B68C-6A6CB2F85B9F} = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.exe -
Modifies registry class 60 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open\command\ = "IEXPLORE.EXE http://taobao.loliso.com/?1193" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hpf\ = "hpf" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open\command\ = "IEXPLORE.EXE http://www.loliso.com/?1193" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open\command\ = "IEXPLORE.EXE http://www.piaofang.net/?1193" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,130" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.h35 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,41" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hpf 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\ 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hdh 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\DefaultIcon\ = "c:\\Program Files\\Common Files\\d.ico" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open\command\ = "IEXPLORE.EXE http://www.henbucuo.com/?1193" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open\command\ = "IEXPLORE.EXE http://www.d91d.com/?1193" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\ 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htb 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\DefaultIcon 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open\command\ = "IEXPLORE.EXE http://www.t17t.com/?1193" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,139" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\ 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\ 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hyx 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hyx\ = "hyx" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open\command 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\DefaultIcon 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\ 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\DefaultIcon 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\DefaultIcon 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\ 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hli\ = "hli" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\DefaultIcon 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\DefaultIcon\ = "c:\\Program Files\\Common Files\\t.ico" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open\command 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open\command 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.h35\ = "h35" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open\command 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open\command 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hdh\ = "hdh" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htb\ = "htb" 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\DefaultIcon 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hli 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open\command 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1512 IEXPLORE.exe 1020 IEXPLORE.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1208 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe 1584 Program FilesO58C6T.exe 1512 IEXPLORE.exe 1512 IEXPLORE.exe 612 IEXPLORE.EXE 612 IEXPLORE.EXE 1020 IEXPLORE.exe 1020 IEXPLORE.exe 540 IEXPLORE.EXE 540 IEXPLORE.EXE 540 IEXPLORE.EXE 540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1208 wrote to memory of 1584 1208 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe 28 PID 1208 wrote to memory of 1584 1208 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe 28 PID 1208 wrote to memory of 1584 1208 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe 28 PID 1208 wrote to memory of 1584 1208 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe 28 PID 1584 wrote to memory of 1512 1584 Program FilesO58C6T.exe 30 PID 1584 wrote to memory of 1512 1584 Program FilesO58C6T.exe 30 PID 1584 wrote to memory of 1512 1584 Program FilesO58C6T.exe 30 PID 1584 wrote to memory of 1512 1584 Program FilesO58C6T.exe 30 PID 1512 wrote to memory of 612 1512 IEXPLORE.exe 32 PID 1512 wrote to memory of 612 1512 IEXPLORE.exe 32 PID 1512 wrote to memory of 612 1512 IEXPLORE.exe 32 PID 1512 wrote to memory of 612 1512 IEXPLORE.exe 32 PID 1584 wrote to memory of 1020 1584 Program FilesO58C6T.exe 33 PID 1584 wrote to memory of 1020 1584 Program FilesO58C6T.exe 33 PID 1584 wrote to memory of 1020 1584 Program FilesO58C6T.exe 33 PID 1584 wrote to memory of 1020 1584 Program FilesO58C6T.exe 33 PID 1208 wrote to memory of 664 1208 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe 35 PID 1208 wrote to memory of 664 1208 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe 35 PID 1208 wrote to memory of 664 1208 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe 35 PID 1208 wrote to memory of 664 1208 72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe 35 PID 1020 wrote to memory of 540 1020 IEXPLORE.exe 36 PID 1020 wrote to memory of 540 1020 IEXPLORE.exe 36 PID 1020 wrote to memory of 540 1020 IEXPLORE.exe 36 PID 1020 wrote to memory of 540 1020 IEXPLORE.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe"C:\Users\Admin\AppData\Local\Temp\72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe"1⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
\??\c:\Program FilesO58C6T.exe"c:\Program FilesO58C6T.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:612
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1020 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:540
-
-
-
-
C:\Windows\SysWOW64\WScript.ExeWScript.Exe jies.bak.vbs2⤵
- Deletes itself
PID:664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD541acfb37ce0959563b0439647abd21a5
SHA1f5022e711a652883c21354788930eeb765c707b0
SHA2564a7a0593957d876a43d29a95f53e7a65f53b89105840a6f3c262bfb7a4a20200
SHA5127e7423627929d9905c3baf99bcd66f03d8a345aac3b6c6aad63402ff55e35f3c443282991e8403501522c8c835adde9fd7048139aa92bd4b2094e6488d7fabf0
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0E897991-5E07-11ED-B68C-6A6CB2F85B9F}.dat
Filesize5KB
MD592ceca8347fb3b77d981841a00f406f8
SHA18c8fa1fcbd30e7caec6c3e8645b70a7152fa99ad
SHA2560eb5128a1e32be1746e93c963d484637310030cfe48d31f5c6bb296e650bce8f
SHA512d43fc822bbb9db8ee1c8f2d762487e3422e5db4c7345cbf8e0bb95740c35bec76a86583da5ef06ee1154e7bb65343351a1eb2c3f938644ce47f58f88b8e78ec7
-
Filesize
486B
MD569bcd5056dd8c7038d5f728d28ab8347
SHA11d9fe83572c78eac695c91aad875bfc6250c5906
SHA2568c91f52aa91d23e375f3e850a485e3ae77ab5db23fa4815cb8fd759f57193a97
SHA5121836ff11af3b80b01f8d3fb81efe52d846f7d9656a10847e40b3da0ad3cfcb49369572843769d5033e52cbc1db6f9bdfeff480db5191a1f5c12a5f91ab55c4cf
-
Filesize
603B
MD5d6eace6608180ff3f76ac2429ad2ea9f
SHA1f48ad535a221b74da5f69290c67cf75667a0f51d
SHA256d3b462fde2201a5b181bed88492543dec7f2291d0a92f6b68e20ff7a459a7209
SHA512fd224070d72180e64abdf8c18695af3255eb5805a2099511cea4d9a76e91302f582d6940920aaa811a39f61ce1b9ff16291a6525f85e7d738e02eef68dab5346