Analysis
-
max time kernel
140s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:04
Static task
static1
Behavioral task
behavioral1
Sample
676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe
Resource
win7-20220812-en
General
-
Target
676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe
-
Size
5.1MB
-
MD5
43f6b4589ea28e1df8d0c40d9cfb0ada
-
SHA1
63cc4eacf596d31efa5567a7e86aaf4ef99691e6
-
SHA256
676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea
-
SHA512
ca68d40dcc6f0ea82878524f29d9cdac5ef33be3634b686e2ea9c2e4d84d7645dc4d5f6c4d6f72b4393d181bbd0e2978a2d983a82b376f191956a8dee82082c1
-
SSDEEP
98304:SyG6edCQHyTPBAl9R/rUdCGUsYml5Nk+YFowkyR5zccEURz9GJpeT:SQJA48GUsL5mdkqciw
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\SkinH_EL.dll acprotect -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\SkinH_EL.dll upx behavioral2/memory/4612-137-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe -
Loads dropped DLL 1 IoCs
Processes:
676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exepid process 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe -
Processes:
676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe -
Drops file in System32 directory 1 IoCs
Processes:
676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exedescription ioc process File created C:\WINDOWS\SysWOW64\FuckTotp.sys 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exepid process 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXE676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.yoyo-dao.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.yoyo-dao.com\ = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\gedu.org\NumberOfSubdomains = "1" 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\yoyo-dao.com\Total = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.yoyo-dao.com\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "252" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3085260108" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998389" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\yoyo-dao.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\yoyo-dao.com\Total = "189" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\IESettingSync 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008ed2bf0d558c9742a922922aecc6020500000000020000000000106600000001000020000000294bb75929ea346eb6a1f4b99467d8acdc3613cccf13bbfb7da33d0c085818c6000000000e8000000002000020000000dd31ab58fd35554ac064484fdc49fdf1ab1480bd1a84bb775d9488e00b8ab5c82000000051e221b6056fca3dd553049e6ad735d3a8223f3244d09eefc1630f0989b0166c40000000b85a83958cf4757d52bfca870781c0da33995bac49cf9138731f179fce1e7d72cc22e42d2e9649ec53a149374333e1957ceebc185659b86f40646205c9af88c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008ed2bf0d558c9742a922922aecc6020500000000020000000000106600000001000020000000a159aac59924b1b9cbaf8e6f2b6306108a19fb18487febea2c0d4d121c111d79000000000e80000000020000200000003c43fc5347fad1c21b3dbc9ad2fb9c3fbcbfd8f2abf70221a07481aebe78c1ef20000000bd505e4080362b843d5e9b98f0f68b61f2854f6107da0327a75030547fda027d400000006f4745d3692635d1b435f44fed54407885c6a45e32cdad08fbbaf76fcf4e4428fbd594145bfb491c92e38d89b2f2f584f26a1f2985807d620224950b9acf8230 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "189" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998389" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375998355" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E2D9D1F2-6B68-11ED-AECB-F6A3911CAFFB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\yoyo-dao.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\gedu.org 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3085260108" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3065e8e175ffd801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008ed2bf0d558c9742a922922aecc602050000000002000000000010660000000100002000000012897cb9b556a676cd4fed819d50b15045927711d8440226f13022d8bba5f7fe000000000e800000000200002000000077ca4454c552eb9bc05e4ce688a079520c5f714f33ae3c7324a52a323db729a5200000006c8cabefe4fcd4bedcd491e09865d6126283a9b51a317a72f19f594100abd29f400000008bb141eeb97a4062f48900e76ccfcdb6fcfb7703f14ecd2a9d19b78badc29d057a5e6794023e54481d1dc3c57b4aa9f7c7dba038aeb768da438cd078c4a2093e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\hltv7.tv\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008ed2bf0d558c9742a922922aecc60205000000000200000000001066000000010000200000006bd31c0f046cd1a0d24cd85bb48a3c6e1dc19d1f42b820a9220e191496becf3c000000000e800000000200002000000059fc92afde6558fefc8ece526fdfe242e44be9840958965c8ed5d14abcfbe68520000000d6154ba1ff321041a075e13573d961573c6ad72a4ac4d8f1b4b5414c69736c394000000017f1af051fae3c4e2f0e5690f405e94fbf4640d132b88c1e98e2ae1e05bfa7b4e9e276924b47406302fe9f2af34c64ac7c99e3cefa53a960c6a9fdce29ceb73d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3085260108" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30998389" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 3536 iexplore.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 648 648 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exedescription pid process Token: 33 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe Token: SeIncBasePriorityPrivilege 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe Token: 33 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe Token: SeIncBasePriorityPrivilege 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exeiexplore.exepid process 3536 iexplore.exe 1816 iexplore.exe 1816 iexplore.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
Processes:
676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe 1816 iexplore.exe 1816 iexplore.exe 3536 iexplore.exe 3536 iexplore.exe 4040 IEXPLORE.EXE 4040 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1816 iexplore.exe 1816 iexplore.exe 432 IEXPLORE.EXE 432 IEXPLORE.EXE 432 IEXPLORE.EXE 432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exeiexplore.exeiexplore.exedescription pid process target process PID 4612 wrote to memory of 1816 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe iexplore.exe PID 4612 wrote to memory of 1816 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe iexplore.exe PID 4612 wrote to memory of 3536 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe iexplore.exe PID 4612 wrote to memory of 3536 4612 676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe iexplore.exe PID 1816 wrote to memory of 1960 1816 iexplore.exe IEXPLORE.EXE PID 1816 wrote to memory of 1960 1816 iexplore.exe IEXPLORE.EXE PID 1816 wrote to memory of 1960 1816 iexplore.exe IEXPLORE.EXE PID 3536 wrote to memory of 4040 3536 iexplore.exe IEXPLORE.EXE PID 3536 wrote to memory of 4040 3536 iexplore.exe IEXPLORE.EXE PID 3536 wrote to memory of 4040 3536 iexplore.exe IEXPLORE.EXE PID 1816 wrote to memory of 432 1816 iexplore.exe IEXPLORE.EXE PID 1816 wrote to memory of 432 1816 iexplore.exe IEXPLORE.EXE PID 1816 wrote to memory of 432 1816 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe"C:\Users\Admin\AppData\Local\Temp\676eea69fd46487f6826e3d1e7bae1deb4e9686ccfc94d6e9ca9420309fdafea.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://longju.tap.cn/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:17416 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.yoyo-dao.com/thread.php?fid=412⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3536 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
1KB
MD5f9ba08256d1b61cface598053cde2d0d
SHA1e44c26433ff18e857d45a660ea939e1f69940412
SHA256d97026f9ca69ad6de1283dda1abbcda6b26448614bca91b217dbd8ed32c256da
SHA512da2834837bcf0611ff6cad027ed798921e2270a18803536e2b11fbe6e8f38a05dd21d34a720f10b511d495d9a305a1bff61bb531bf5040ae4d269b07b4152cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80BFilesize
1KB
MD5ed35bf5739b25193dbab85a40e512dbf
SHA11e4895420f2dc13198c40899636674a217061333
SHA2565ef9dcf41f403ed49d121c26185fa1c79e9c3867949ba09faeaa59bc665e75ed
SHA51272a1c49963b301d4865983296073e8edf0c2a0b0f0835cb7cc493a97135aa32bdb876abf6c21e312f2e850b23ef889e338a1881c615fe3b452497817b1340b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD5e32d02ce684c01ef3af05fae9066160e
SHA129c7a6e8ed553ac2765634265d1db041d6d422ec
SHA256b00322d178a6cfc206458c26b26d6c80596073bb3283dcc3fc4e33a4b5f29d71
SHA512e4e3175fb131095e4681ecb76d14dc74d059c0beafb6340965516c6d3d0538deb314b36a3f09df03b491edac84d5c0580e764fed1d8bca9abd4e65cb56167148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD5e32d02ce684c01ef3af05fae9066160e
SHA129c7a6e8ed553ac2765634265d1db041d6d422ec
SHA256b00322d178a6cfc206458c26b26d6c80596073bb3283dcc3fc4e33a4b5f29d71
SHA512e4e3175fb131095e4681ecb76d14dc74d059c0beafb6340965516c6d3d0538deb314b36a3f09df03b491edac84d5c0580e764fed1d8bca9abd4e65cb56167148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96CFilesize
1KB
MD5ceb5d57e053cf1d989a5a2730e0f79ef
SHA1f6324c07ae56d9b92e43ffe0081918cf1848b733
SHA2568e2e6bf1be8904d016a112c9cf04a7ace866e9c287e6866e0cb29aefcff2c776
SHA5127daabdc9fa40ecf84f329516b8542de0f9bb97ed14d89c00fa7a66354432d5588dbf826192cd0fbd473af7a17d9624f1c4d10f73e9aa7c2e9b9c21278cb3e479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
1KB
MD57519716cb2f4a994c19d92bbaa82d932
SHA1aa547900509d6031fc1cc86fde4c85db0594d112
SHA256352384f1b99f9e003b0d60f8021c33787eb39b53286219d34e2acdc2ac7e33be
SHA51272e18db9a1b2fa4c624eb702c675878c011ac8e286c00239357a1e7e494db1fac4027958c5de28aae81248c8812f6910aaf31ecfe949df99ccc69c91a1661ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_23FFFDCAABB8E63694AD1202ED02BF57Filesize
471B
MD5b0ae81e2069b3caa9682caf6444be159
SHA11e7d2c23bf74586a5366388efaee31b8b1a151f6
SHA2565c9e7949981ac724b63d24ab1401497046feba6397f92f83b551b1d8ce767072
SHA51201e58f28eb18da9e59ab7a2e179e569c512b82785e8204139ef3334fe3c9147d345f7ff63d040998164b4784306daaa578d85ebf8c02de9a01bf795a32e2003f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
508B
MD53c68ba3ad2e76127777e069eaf15db6b
SHA17825d9188d93c4956bb15b389672e9772558b45b
SHA25648e370f03cff76258583a726520abfd3df917906d5aae03fb3a5be6f30b3c123
SHA5123a3e2ca0de3036956eab7df56376daaef4fc8b07e489280dc35e1af03bde7a45d6f4deb0a31e4b7f54b1808c5be50bb8c2d07643af36d181593acc9f2410e84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80BFilesize
532B
MD579d81a5c910ac6c1c39826439fa8a6a8
SHA108936a8fa811ca4d24e1ed21f553da51541bff6e
SHA2569529eb53f9de45862edc0920bcbd733a6d6fe67c882f2133528e2d22f042622f
SHA51275f17b2678769cb6a99610cd65f985acf8a034aa5da7e20adba3c57d9120f28e49561eb2fc557607fbfec4a01e50a56b940bc78be90ce63eca4db228f47f753b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD567e57af7f8afa88df77c29a93dbe28f7
SHA1a5d6dc9823d7f3b3d982ea73c8d6b6d7688c2e6e
SHA256b8c58b7fd8732ba12fdbf5c450f719d1f7b80fb07e1a17ecda419ac95c60530a
SHA51236ca853306500f2c9037b1a049d5b6fa82e3fc363e49903692191252b66c7553f66e05b4a246d7bcf10d9493350cbb62280186b49de47ef3971072d5f6b14ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD567e57af7f8afa88df77c29a93dbe28f7
SHA1a5d6dc9823d7f3b3d982ea73c8d6b6d7688c2e6e
SHA256b8c58b7fd8732ba12fdbf5c450f719d1f7b80fb07e1a17ecda419ac95c60530a
SHA51236ca853306500f2c9037b1a049d5b6fa82e3fc363e49903692191252b66c7553f66e05b4a246d7bcf10d9493350cbb62280186b49de47ef3971072d5f6b14ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD567e57af7f8afa88df77c29a93dbe28f7
SHA1a5d6dc9823d7f3b3d982ea73c8d6b6d7688c2e6e
SHA256b8c58b7fd8732ba12fdbf5c450f719d1f7b80fb07e1a17ecda419ac95c60530a
SHA51236ca853306500f2c9037b1a049d5b6fa82e3fc363e49903692191252b66c7553f66e05b4a246d7bcf10d9493350cbb62280186b49de47ef3971072d5f6b14ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96CFilesize
492B
MD523ce20f1d1aeaece3d795424f3dfd26d
SHA142f153cb93bdc19cafcaec3c21f1151dc7b249be
SHA256d90b61e8d90db63e407ffe9b94e9c7990f0fe5db07e514296ab7c26fa8d75035
SHA512d552744d1b8c9a3a6a3d301cc28d9d2ac895beb0dd9aca73a8cb0871210d8ddf8e0073b935dbac118d77d21271764f77a5a3f747098ea50d8467df116d0f453a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
506B
MD529b51a02afb2100c640ec28edcd13a23
SHA14741e78d2d60868c6697a0dadce4b3878e317234
SHA2561577932949eb7ce0a990abfca94e3cebb5eca8eee71dd5d8aa73b90169e1a8b7
SHA5122a602ea096e9ad583bf3816d4180ad0249f634e13bc4416bd2f41bcc9326088b0539d36d3153c364f892a0799c22e61d61f5dc7eaa848131a6b8066ef471ce87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_23FFFDCAABB8E63694AD1202ED02BF57Filesize
400B
MD5fe024cf04532ab6840f320d383402937
SHA12769d9b71feace21b0a161f2d0ac1cd2fd911592
SHA2567f78f023df6f22b5bf0ccebf549deafd323cd9e834ef786c8640c111d3e9c241
SHA512b7cf9a8b8389dd06e4c790936bcc47bef20eece82470cfcad81bc5c9844d5059f02f554e97e63a95d8ebeeb4fb283ae6ac40e5ccbfef506686dc67d027e93233
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E2D9AAE2-6B68-11ED-AECB-F6A3911CAFFB}.datFilesize
3KB
MD5bcc519ef236e218214fb72a78cf2dd5a
SHA1a4ecf5b99934c48c6b66a9a95b211b86f7551092
SHA256374547ba12e7b939c9c5cb905251446b6779b39e35e86a25fccdab7a8712d24e
SHA51287d2b87c16fafbdaa628b310a78a042d3b0718d2eb43e9f6bebae53bda1bde370fd1dc7ad3d6695475eb2997f9c4a54ae9c61d8ffcd167b3c85057ee3bfa39ff
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E2D9D1F2-6B68-11ED-AECB-F6A3911CAFFB}.datFilesize
3KB
MD5a72686af0c174777ac93e8dbe56a62c9
SHA18488eab0eb52eb3d55c6300c2570d4a4789585bd
SHA256e2c81eb7d9f16b1caac06b1751266c485a3cc0196c96a0aa6d6047fb887d362b
SHA512d2d61cc8259ab361e0ab079322f1c79c6be9367736079a4beef3bf8248e8a268807e7b635b6d5d797918f07480726c25eee9d7c8b984420ebbc742f6fa34865e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z2evvp3\imagestore.datFilesize
1KB
MD5ae8262619c1ac043d7d1fa15d40f51bb
SHA1213bbdbb79ad3f15b2b2bfedadc94b82dbaa96b7
SHA2564e8ff63a362e66d4f2010851a4cfc1b3f6d5938ad495614734e691be2a56a459
SHA512e58626537c3b483509f8a01c465fed7052e7439944afc266e6c56e45a7c02193befe6f5d06818cf7c571ea31fe5d565861a471157bfe63ec08745eb210250485
-
C:\Users\Admin\AppData\Local\Temp\SkinH_EL.dllFilesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d
-
memory/4612-132-0x0000000000400000-0x0000000000F8C000-memory.dmpFilesize
11.5MB
-
memory/4612-137-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/4612-135-0x0000000000400000-0x0000000000F8C000-memory.dmpFilesize
11.5MB
-
memory/4612-133-0x0000000000400000-0x0000000000F8C000-memory.dmpFilesize
11.5MB