Analysis
-
max time kernel
151s -
max time network
57s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:51
Static task
static1
Behavioral task
behavioral1
Sample
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe
Resource
win10v2004-20221111-en
General
-
Target
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe
-
Size
244KB
-
MD5
353631c7e3686b6aba08dcab28849013
-
SHA1
0e0054e1175f1119e44aa71f94ad9b059c207338
-
SHA256
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840
-
SHA512
48f3577e731cf6b984b8602241eba4855a7dd2846a76e527d347a5c55ea49b3927d8ae0eff285b93c1b586696db5a6a9dde0b44652800d7b9f8386af94e1d469
-
SSDEEP
6144:oHAn9UvAqXDdJZRx8zm/4Q7OkkXJLbg4xK4laa:Pn9UvxXDdJZRx8zm/4Q7OksJLbg4x
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
hihav.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hihav.exe -
Executes dropped EXE 1 IoCs
Processes:
hihav.exepid process 784 hihav.exe -
Loads dropped DLL 2 IoCs
Processes:
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exepid process 1788 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe 1788 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe -
Adds Run key to start application 2 TTPs 53 IoCs
Processes:
hihav.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /Y" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /q" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /I" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /D" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /X" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /E" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /P" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /w" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /m" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /u" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /h" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /K" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /N" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /U" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /i" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /R" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /T" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /Q" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /g" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /O" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /o" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /L" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /v" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /V" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /A" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /k" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /r" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /c" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /Z" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /d" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /M" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /x" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /W" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /G" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /S" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /e" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /a" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /B" hihav.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /H" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /j" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /f" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /z" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /l" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /F" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /b" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /C" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /s" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /t" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /p" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /J" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /n" hihav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hihav = "C:\\Users\\Admin\\hihav.exe /y" hihav.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
hihav.exepid process 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe 784 hihav.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exehihav.exepid process 1788 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe 784 hihav.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exehihav.exedescription pid process target process PID 1788 wrote to memory of 784 1788 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe hihav.exe PID 1788 wrote to memory of 784 1788 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe hihav.exe PID 1788 wrote to memory of 784 1788 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe hihav.exe PID 1788 wrote to memory of 784 1788 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe hihav.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 784 wrote to memory of 1788 784 hihav.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe"C:\Users\Admin\AppData\Local\Temp\3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\hihav.exe"C:\Users\Admin\hihav.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5d2eb0a663da56b25513d3de2adbe4850
SHA1ec2a6df23e8c6b8c015ee69db6b3aa0363235817
SHA25645ac478fc074f400d480fcca80d2daf6cd154ab4935be090b824e313f3aa6bcc
SHA51268ff6d643768c3602118273e6d61d27f19abdadba2b703bd0446b881feea03c767ed85a03bbd5b682d9bf167da7f814ac1a766e471359513e470529ec079c7f7
-
Filesize
244KB
MD5d2eb0a663da56b25513d3de2adbe4850
SHA1ec2a6df23e8c6b8c015ee69db6b3aa0363235817
SHA25645ac478fc074f400d480fcca80d2daf6cd154ab4935be090b824e313f3aa6bcc
SHA51268ff6d643768c3602118273e6d61d27f19abdadba2b703bd0446b881feea03c767ed85a03bbd5b682d9bf167da7f814ac1a766e471359513e470529ec079c7f7
-
Filesize
244KB
MD5d2eb0a663da56b25513d3de2adbe4850
SHA1ec2a6df23e8c6b8c015ee69db6b3aa0363235817
SHA25645ac478fc074f400d480fcca80d2daf6cd154ab4935be090b824e313f3aa6bcc
SHA51268ff6d643768c3602118273e6d61d27f19abdadba2b703bd0446b881feea03c767ed85a03bbd5b682d9bf167da7f814ac1a766e471359513e470529ec079c7f7
-
Filesize
244KB
MD5d2eb0a663da56b25513d3de2adbe4850
SHA1ec2a6df23e8c6b8c015ee69db6b3aa0363235817
SHA25645ac478fc074f400d480fcca80d2daf6cd154ab4935be090b824e313f3aa6bcc
SHA51268ff6d643768c3602118273e6d61d27f19abdadba2b703bd0446b881feea03c767ed85a03bbd5b682d9bf167da7f814ac1a766e471359513e470529ec079c7f7