Analysis
-
max time kernel
173s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 20:58
Static task
static1
Behavioral task
behavioral1
Sample
9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe
Resource
win10v2004-20220812-en
General
-
Target
9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe
-
Size
212KB
-
MD5
2c967c7cabed448738972194a7a9aa2f
-
SHA1
2bff6b92ee776dd95ed31a74ebd0444bd808751f
-
SHA256
9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd
-
SHA512
646c00cbe10936bf6163f9ced4f833cfdb2a7f53ac39804b1566a461078961c7765b53bbe27d0a7245089ddc57e174e0ff4d13e6d1290d3beaeaff5c2e91d5b0
-
SSDEEP
6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDma:dHp/urb4A1WdBfd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Program FilesHHO8J4.exepid process 3060 Program FilesHHO8J4.exe -
Drops file in Program Files directory 2 IoCs
Processes:
9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exedescription ioc process File opened for modification \??\c:\Program Files\Common Files\t.ico 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe File opened for modification \??\c:\Program Files\Common Files\d.ico 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
IEXPLORE.exeIEXPLORE.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000075d7524b5a055b4ebecaae98c2d5488400000000020000000000106600000001000020000000f5f226db55688bf914e2edf86fde8bf01d10ff12da05a5c4bd28a4fe5cc2d83f000000000e8000000002000020000000d243b5e1778ab8ea5dcb52f3a3ffd1a19b0e4b093a790fe6c7cfc91aa8ce548c2000000031d97ade4a84e8260e560e921fba247832b930320dc7446465a8fc531a71fb1f400000003a1e3ba9d7d7226a8b3c3aa56601f554c6e78fd542d19456e126d180a0caf154bd69a16db80613fd01036137f36d1d08291f25c474cf6821dac18b2f88edc438 IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B77E161F-6B94-11ED-B696-DA88DC7FA106} = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998433" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0efdb90a1ffd801 IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206d1091a1ffd801 IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30998433" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000075d7524b5a055b4ebecaae98c2d54884000000000200000000001066000000010000200000000095e0b487623d243f12131c4d3d321ab8ce8b436e98564710008f239a9fbcfa000000000e80000000020000200000008382297c5f93f22f8218f64814263da0bb290eef09da3c8e2b85bfaa3bd5cd1020000000b7b201669d2566b480e1175939604b7156ec4f02d55f83bae10eab0524cb63f1400000005616a993e00ef11a6da15416d12546b4814dcb426bbf773a32dd20c0ef6ccf759f5176b9a42b1efd32c4a6d20d9c2b8bc3a41d7b6fdd9c58b95f094385523ce1 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2560338252" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375414082" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2560338252" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.exe -
Modifies registry class 60 IoCs
Processes:
9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hyx\ = "hyx" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.h35 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\ 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\DefaultIcon 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,130" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\ 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open\command\ = "IEXPLORE.EXE http://www.d91d.com/?1193" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\ 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open\command 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open\command\ = "IEXPLORE.EXE http://www.henbucuo.com/?1193" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\DefaultIcon 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open\command 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,41" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hpf 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open\command\ = "IEXPLORE.EXE http://taobao.loliso.com/?1193" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\DefaultIcon\ = "c:\\Program Files\\Common Files\\d.ico" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\DefaultIcon 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open\command 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,139" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open\command 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hli\ = "hli" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.h35\ = "h35" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\DefaultIcon 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hyx 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htb 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\ 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open\command\ = "IEXPLORE.EXE http://www.loliso.com/?1193" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\ 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open\command\ = "IEXPLORE.EXE http://www.piaofang.net/?1193" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open\command 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\DefaultIcon\ = "c:\\Program Files\\Common Files\\t.ico" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\DefaultIcon 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hdh\ = "hdh" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hpf\ = "hpf" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\ 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\DefaultIcon 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open\command 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hli 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hdh 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htb\ = "htb" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open\command\ = "IEXPLORE.EXE http://www.t17t.com/?1193" 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.exepid process 5076 IEXPLORE.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.exepid process 5076 IEXPLORE.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exeProgram FilesHHO8J4.exeIEXPLORE.exeIEXPLORE.EXEpid process 2708 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe 3060 Program FilesHHO8J4.exe 5076 IEXPLORE.exe 5076 IEXPLORE.exe 5068 IEXPLORE.EXE 5068 IEXPLORE.EXE 5068 IEXPLORE.EXE 5068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exeProgram FilesHHO8J4.exeIEXPLORE.exedescription pid process target process PID 2708 wrote to memory of 3060 2708 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Program FilesHHO8J4.exe PID 2708 wrote to memory of 3060 2708 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Program FilesHHO8J4.exe PID 2708 wrote to memory of 3060 2708 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe Program FilesHHO8J4.exe PID 3060 wrote to memory of 5076 3060 Program FilesHHO8J4.exe IEXPLORE.exe PID 3060 wrote to memory of 5076 3060 Program FilesHHO8J4.exe IEXPLORE.exe PID 5076 wrote to memory of 5068 5076 IEXPLORE.exe IEXPLORE.EXE PID 5076 wrote to memory of 5068 5076 IEXPLORE.exe IEXPLORE.EXE PID 5076 wrote to memory of 5068 5076 IEXPLORE.exe IEXPLORE.EXE PID 3060 wrote to memory of 2056 3060 Program FilesHHO8J4.exe IEXPLORE.exe PID 3060 wrote to memory of 2056 3060 Program FilesHHO8J4.exe IEXPLORE.exe PID 2708 wrote to memory of 1756 2708 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe WScript.Exe PID 2708 wrote to memory of 1756 2708 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe WScript.Exe PID 2708 wrote to memory of 1756 2708 9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe WScript.Exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe"C:\Users\Admin\AppData\Local\Temp\9267c1202a2d920604d2c3c3b008834638ab4e1119fecb8247827bf958573ddd.exe"1⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\Program FilesHHO8J4.exe"c:\Program FilesHHO8J4.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5076 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5068
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html3⤵
- Modifies Internet Explorer settings
PID:2056
-
-
-
C:\Windows\SysWOW64\WScript.ExeWScript.Exe jies.bak.vbs2⤵PID:1756
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5bd5fa6b524fbcffb89319e2943418115
SHA1db3c6adb26f3452bee3c0e81b095f26c62310b46
SHA256e004c16743d0be1427a6c85b814c4b883f2b0bb1ad346ad14e7a31595aa5256f
SHA512ba68f7ff41d576914432a149a1dea8b37a960593f23c4a5b8ddf791a7a4967cf78631aef4b06b80e2808db61e36c15dba5f6db31806451669538bcb5b05aaa12
-
Filesize
486B
MD50dfd74dba9aac7f976d1675cf761dbdb
SHA16cf013c2ec46df8d62a6c71f068887bc60c935fb
SHA2560e0ec4bf2329089cd3b664237c748ecee4c2229bc4c13f7d2d3f5c1b3b1ba6f6
SHA5127f68d26585e97de335ef4173e99a7c6d71407041c1402f0bcaee1ff858798fab4f5c2cf6844cf69cdb42fd4c23e675e07101399ea2e1349739b7985fcaf303d3
-
Filesize
36KB
MD5bd5fa6b524fbcffb89319e2943418115
SHA1db3c6adb26f3452bee3c0e81b095f26c62310b46
SHA256e004c16743d0be1427a6c85b814c4b883f2b0bb1ad346ad14e7a31595aa5256f
SHA512ba68f7ff41d576914432a149a1dea8b37a960593f23c4a5b8ddf791a7a4967cf78631aef4b06b80e2808db61e36c15dba5f6db31806451669538bcb5b05aaa12