Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe
Resource
win10v2004-20221111-en
General
-
Target
434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe
-
Size
212KB
-
MD5
52d8c58d4c6e9581d4459b40b99c488c
-
SHA1
e83a1724be4af196018ec1658f9cb85a1178a7ad
-
SHA256
434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51
-
SHA512
a58d6c135028d627d4f0edffcb422dffe9fba8000f601d6ce23c1e6810452bec1f4fc07fb5cee1b35f6db8dfc00681580d2ee3a8018e7e369f60e6a17af1a77c
-
SSDEEP
6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDm+:dHp/urb4A1WdBfl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 568 Program Files6691SV.exe -
Deletes itself 1 IoCs
pid Process 1716 WScript.Exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Common Files\t.ico 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe File opened for modification \??\c:\Program Files\Common Files\d.ico 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ce5de4a1ffd801 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af00000000020000000000106600000001000020000000abd380d6998f0f3b2e9ec64895db84ab9f7e7bb2496a71da02c303e2198bc6df000000000e800000000200002000000069f2240005d20337dbbb155e54ca434e40033f2fdad1cbba063bd68528fca27420000000dc1addd207fb115210857ec537fc88d04a91fa8bee37bc044bfd40f2641f80d140000000520785e632ecdf83f349d1ee899196f94f17cbf7964b6ed0117042f7334bd6a270d126fd7f0c2454f7d6d2532a16c55c21327fa50bc881a1cc47a38dbc301825 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FECA8350-6B94-11ED-874D-7AEFAD47A2D2} = "0" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FECA5C40-6B94-11ED-874D-7AEFAD47A2D2} = "0" IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376017317" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.exe -
Modifies registry class 60 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\DefaultIcon\ = "c:\\Program Files\\Common Files\\d.ico" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\DefaultIcon 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htb 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open\command 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,139" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open\command\ = "IEXPLORE.EXE http://taobao.loliso.com/?1193" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.h35 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open\command\ = "IEXPLORE.EXE http://www.loliso.com/?1193" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hdh 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,41" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open\command 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hpf\ = "hpf" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hyx\ = "hyx" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\DefaultIcon\ = "c:\\Program Files\\Common Files\\t.ico" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\ 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\ 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htb\ = "htb" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open\command 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open\command 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hpf 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\DefaultIcon 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hli 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\DefaultIcon 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open\command 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hli\ = "hli" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\ 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open\command\ = "IEXPLORE.EXE http://www.d91d.com/?1193" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,130" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open\command\ = "IEXPLORE.EXE http://www.t17t.com/?1193" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.h35\ = "h35" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open\command\ = "IEXPLORE.EXE http://www.henbucuo.com/?1193" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open\command\ = "IEXPLORE.EXE http://www.piaofang.net/?1193" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\ 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\ 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\DefaultIcon 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open\command 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\DefaultIcon 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hyx 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\ 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\DefaultIcon 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hdh\ = "hdh" 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 664 IEXPLORE.exe 2032 IEXPLORE.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1332 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe 568 Program Files6691SV.exe 2032 IEXPLORE.exe 2032 IEXPLORE.exe 664 IEXPLORE.exe 664 IEXPLORE.exe 904 IEXPLORE.EXE 904 IEXPLORE.EXE 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1332 wrote to memory of 568 1332 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe 28 PID 1332 wrote to memory of 568 1332 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe 28 PID 1332 wrote to memory of 568 1332 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe 28 PID 1332 wrote to memory of 568 1332 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe 28 PID 568 wrote to memory of 664 568 Program Files6691SV.exe 30 PID 568 wrote to memory of 664 568 Program Files6691SV.exe 30 PID 568 wrote to memory of 664 568 Program Files6691SV.exe 30 PID 568 wrote to memory of 664 568 Program Files6691SV.exe 30 PID 568 wrote to memory of 2032 568 Program Files6691SV.exe 35 PID 568 wrote to memory of 2032 568 Program Files6691SV.exe 35 PID 568 wrote to memory of 2032 568 Program Files6691SV.exe 35 PID 568 wrote to memory of 2032 568 Program Files6691SV.exe 35 PID 1332 wrote to memory of 1716 1332 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe 33 PID 1332 wrote to memory of 1716 1332 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe 33 PID 1332 wrote to memory of 1716 1332 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe 33 PID 1332 wrote to memory of 1716 1332 434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe 33 PID 2032 wrote to memory of 904 2032 IEXPLORE.exe 36 PID 2032 wrote to memory of 904 2032 IEXPLORE.exe 36 PID 2032 wrote to memory of 904 2032 IEXPLORE.exe 36 PID 2032 wrote to memory of 904 2032 IEXPLORE.exe 36 PID 664 wrote to memory of 1364 664 IEXPLORE.exe 37 PID 664 wrote to memory of 1364 664 IEXPLORE.exe 37 PID 664 wrote to memory of 1364 664 IEXPLORE.exe 37 PID 664 wrote to memory of 1364 664 IEXPLORE.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe"C:\Users\Admin\AppData\Local\Temp\434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe"1⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
\??\c:\Program Files6691SV.exe"c:\Program Files6691SV.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:664 CREDAT:275459 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1364
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:904
-
-
-
-
C:\Windows\SysWOW64\WScript.ExeWScript.Exe jies.bak.vbs2⤵
- Deletes itself
PID:1716
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD51c909dbec9fc7b3d5d616b83b8fdbc4e
SHA13145769f6824201ac8e096a13cfe22a38c3c9523
SHA256aab7ab1dacafb16199456a400520eaa3520abd67a84610087bca1ecf8dafc8c3
SHA5122d3122abfef2d00a420f1a063cd0b6712f84b6112250d3e8eb9a87c02ec807e40f9112cf7ea11e0bac5f9ed6886d8f42ae69df0691d4b3935cf0f6bacec9645d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FECA5C40-6B94-11ED-874D-7AEFAD47A2D2}.dat
Filesize5KB
MD5ca02f112db0c9acec7b8a1d36acdd027
SHA1adf0dc403ebf7d69132318776c7dd7164959aa93
SHA2568658f2df26c8810de89b4e72210fb9aca2fd49f1b0fba172c9f08e94bbe51a32
SHA51207270f183b16061a7512bae5334c83666e3333d02dc0cd17148a3c5e78f9b6d394fb5eb2210b65fed669054493fae338dd6cbe39c5037f129e21112b4711d82e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FECA8350-6B94-11ED-874D-7AEFAD47A2D2}.dat
Filesize3KB
MD55b1948bdb9b6613f4a013424669d1071
SHA178c0875cf6c0f22b6ffeac05ceff57732131caea
SHA2568aa3352807d9af34991c0d1d1d78af12f1b465e11d3c75ddf570092ca6a06b58
SHA512ee9b6aadce3429e6c61a2c60bab63522162e847ad799e0ea116390474ce0e97a9fb9e982d9757a95d4f54e8b8bc55ff501a1c1feee3a88fc59c2185314441bef
-
Filesize
486B
MD59cc04eb9c773aac48de2cb3a8813c51b
SHA148910a6cbdae6a8e0d97887e123e92ce276e04d2
SHA2565e4956b6c3a17ea2fee006e43f48d8f99441e31e42b3333930ac087ca4256434
SHA512dcdbb164616993280e37028a58b782e0342cc55120fc92a3a509c3534989102779bd1628c81d0c6f8d5ef980835f544faf53de805411042fe67c4ae001d96bff
-
Filesize
601B
MD542e78a37d87ec88b164d3b216f3bdeca
SHA184e3dbd0c500c9b71f938671caf72a5ec0b1222b
SHA256ed83f31c0d1d4cfb14ba12a2853c65c18c8171566f43070add538c579453bbf9
SHA5128b8c3564c1753b0bb8549c93fe926f45e539b8a0b4baea0df40a2fb31e294688dcae20d38d77f46b7b72e6441a25e30e22cc7f749f46883239e21a0fe34126eb