Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe
Resource
win10v2004-20220901-en
General
-
Target
555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe
-
Size
212KB
-
MD5
531a69a299076bfda258044aef05dd9d
-
SHA1
51c7f8554abc3f7d0380060fad13192b9bebcae2
-
SHA256
555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be
-
SHA512
c05c0992c3db7f945ef8b656e855b8b11ed02668ed75bd270600b209e467f5035672d5da05c21d855f303e827f3db2e7c29e03ea48d963990ab73725b031b653
-
SSDEEP
6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDmO:dHp/urb4A1WdBfF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 864 Program Files8XD4Y0.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Common Files\t.ico 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe File opened for modification \??\c:\Program Files\Common Files\d.ico 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705150cc97ffd801 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998423" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998423" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d790600000000020000000000106600000001000020000000d3ccdccf48f747967f7e211f5a1199a834e49497b49ac83fed02f04b2349965d000000000e8000000002000020000000e507194450d8aaca029f39f6d5ddcc21a87558371adf83e6855d085b5f8a9d1420000000f5fe4aac7b957b928a1371b6276bb32922a7c0212dde388fcc1d82329933724b40000000f57788a94e36ca1fec9ba993967288be8497be272cf3c3f2864d8b65665856e5e24267930d1594b37ae8db36daf5a6a556d79f5dd2f93118978edfec5a1b595a IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30998423" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3392668627" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3401420342" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F5B1DBDB-6B8A-11ED-A0EE-62142853BA25} = "0" IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3392668627" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0af3fcc97ffd801 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d79060000000002000000000010660000000100002000000023eaed1ec8ea14211b8f59be3c476641846a0196607a5ff70e22252a957f5e53000000000e8000000002000020000000464f5b479b5d1df462262c4df7d6ae5e66f3f79ad788d9b1d0ea01c0331a3f34200000005f005bacb5959031e0100bcf2bd4f4439a60efd7f3fcefa3f154f0a95fa0a9f740000000138cf5f048022cbd07bd50cddcb5b515e2bd24ef48969f6b40be414a38287f1620314b21c0f05809ee94d7e9f68e0daa34d489b96bedbe1c49086e25c56978d3 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376012984" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE -
Modifies registry class 60 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\DefaultIcon 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\DefaultIcon 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open\command 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\DefaultIcon\ = "c:\\Program Files\\Common Files\\d.ico" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,139" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\DefaultIcon 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\ 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htb\ = "htb" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hdh\ = "hdh" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hli\ = "hli" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hdh 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open\command 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\DefaultIcon 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hyx\ = "hyx" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\ 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hyx 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\ 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\DefaultIcon 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hpf 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hpf\ = "hpf" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open\command 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,41" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.h35 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open\command 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open\command 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htb 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\DefaultIcon 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\DefaultIcon\ = "c:\\Program Files\\Common Files\\t.ico" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open\command 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.h35\ = "h35" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open\command\ = "IEXPLORE.EXE http://www.d91d.com/?1193" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open\command\ = "IEXPLORE.EXE http://taobao.loliso.com/?1193" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,130" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open\command\ = "IEXPLORE.EXE http://www.loliso.com/?1193" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\ 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open\command\ = "IEXPLORE.EXE http://www.henbucuo.com/?1193" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open\command\ = "IEXPLORE.EXE http://www.piaofang.net/?1193" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\ 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hli 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\ 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open\command\ = "IEXPLORE.EXE http://www.t17t.com/?1193" 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1384 IEXPLORE.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1384 IEXPLORE.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4848 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe 864 Program Files8XD4Y0.exe 1384 IEXPLORE.exe 1384 IEXPLORE.exe 3996 IEXPLORE.EXE 3996 IEXPLORE.EXE 3996 IEXPLORE.EXE 3996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4848 wrote to memory of 864 4848 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe 83 PID 4848 wrote to memory of 864 4848 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe 83 PID 4848 wrote to memory of 864 4848 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe 83 PID 864 wrote to memory of 1384 864 Program Files8XD4Y0.exe 85 PID 864 wrote to memory of 1384 864 Program Files8XD4Y0.exe 85 PID 1384 wrote to memory of 3996 1384 IEXPLORE.exe 86 PID 1384 wrote to memory of 3996 1384 IEXPLORE.exe 86 PID 1384 wrote to memory of 3996 1384 IEXPLORE.exe 86 PID 864 wrote to memory of 2428 864 Program Files8XD4Y0.exe 87 PID 864 wrote to memory of 2428 864 Program Files8XD4Y0.exe 87 PID 4848 wrote to memory of 216 4848 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe 88 PID 4848 wrote to memory of 216 4848 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe 88 PID 4848 wrote to memory of 216 4848 555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe"C:\Users\Admin\AppData\Local\Temp\555dc14f5aeba87cf79fc6d76fbc70362e69b33fdb3507460c1704249e9d49be.exe"1⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4848 -
\??\c:\Program Files8XD4Y0.exe"c:\Program Files8XD4Y0.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1384 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3996
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html3⤵
- Modifies Internet Explorer settings
PID:2428
-
-
-
C:\Windows\SysWOW64\WScript.ExeWScript.Exe jies.bak.vbs2⤵PID:216
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD59e30ceb922415032d8e16f18b5c87906
SHA186cfd7aeab83b77ce298e8075d63e3e40fc0d2ac
SHA25661ed9e682cd0c297a90d84d7d388e38a4024bebab7380ce022f70f0ca3258402
SHA5125e1d7fa803fe4a18a8092a0d2f7ee694cd37c962fbc4581c6a78b2b7dbe41699e9207ca56deaff13a5a52c2a5889b416a5542cf1056980937d1a0261367bcb11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5e32d02ce684c01ef3af05fae9066160e
SHA129c7a6e8ed553ac2765634265d1db041d6d422ec
SHA256b00322d178a6cfc206458c26b26d6c80596073bb3283dcc3fc4e33a4b5f29d71
SHA512e4e3175fb131095e4681ecb76d14dc74d059c0beafb6340965516c6d3d0538deb314b36a3f09df03b491edac84d5c0580e764fed1d8bca9abd4e65cb56167148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5e4ddab0f49cec194842050e4b08b7aab
SHA11dbacfd519cc0ecea18b22d952b1bda8e6b1851f
SHA2564ba001519763a1a4349536627faa77e30fbdc3499052ecc86fec9ba5cc7c5c62
SHA512f52fcc52ce7f5acc61bd6accc1412892bb713fc1acee9bcae7d8f311f23951ab90c7764aae74690ce9a63068dc74722d3d4cbbf90ac0e9acc0b54d603a7bb76d
-
Filesize
486B
MD58ee8f206342c02003396077b09e65ce0
SHA12b26107975e1b74546b5eb7935fb3009940d7253
SHA256aefe4611df2fce7ab05da1d50c133e33fa172a729dc02dce122512f9930d70a7
SHA512b05dc3dbd5a72f5f1a7a36631270b1ac5349ab00c18ea623f34bd5dc2ff4b1be0cdcc75d5a13eeef76a80efc9a7776d46869f6d55fb3637f048bc586a881d250
-
Filesize
36KB
MD59e30ceb922415032d8e16f18b5c87906
SHA186cfd7aeab83b77ce298e8075d63e3e40fc0d2ac
SHA25661ed9e682cd0c297a90d84d7d388e38a4024bebab7380ce022f70f0ca3258402
SHA5125e1d7fa803fe4a18a8092a0d2f7ee694cd37c962fbc4581c6a78b2b7dbe41699e9207ca56deaff13a5a52c2a5889b416a5542cf1056980937d1a0261367bcb11