Overview
overview
10Static
static
8MirServer/...er.exe
windows7-x64
1MirServer/...er.exe
windows10-2004-x64
1MirServer/...pk.dll
windows7-x64
8MirServer/...pk.dll
windows10-2004-x64
8MirServer/...er.exe
windows7-x64
1MirServer/...er.exe
windows10-2004-x64
1MirServer/...er.exe
windows7-x64
1MirServer/...er.exe
windows10-2004-x64
1MirServer/...pk.dll
windows7-x64
8MirServer/...pk.dll
windows10-2004-x64
8MirServer/...te.exe
windows7-x64
1MirServer/...te.exe
windows10-2004-x64
1MirServer/...pk.dll
windows7-x64
8MirServer/...pk.dll
windows10-2004-x64
8MirServer/...rv.exe
windows7-x64
1MirServer/...rv.exe
windows10-2004-x64
1MirServer/...pk.dll
windows7-x64
8MirServer/...pk.dll
windows10-2004-x64
8MirServer/...TL.dll
windows7-x64
1MirServer/...TL.dll
windows10-2004-x64
1MirServer/...al.dll
windows7-x64
1MirServer/...al.dll
windows10-2004-x64
1MirServer/...er.exe
windows7-x64
6MirServer/...er.exe
windows10-2004-x64
5MirServer/...xe.lnk
windows7-x64
3MirServer/...xe.lnk
windows10-2004-x64
3MirServer/...pk.dll
windows7-x64
MirServer/...pk.dll
windows10-2004-x64
1MirServer/...��.htm
windows7-x64
10MirServer/...��.htm
windows10-2004-x64
10MirServer/...te.exe
windows7-x64
1MirServer/...te.exe
windows10-2004-x64
3Analysis
-
max time kernel
229s -
max time network
245s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 23:56
Behavioral task
behavioral1
Sample
MirServer/DBServer/DBServer.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
MirServer/DBServer/DBServer.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
MirServer/DBServer/lpk.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
MirServer/DBServer/lpk.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
MirServer/GameCenter.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
MirServer/GameCenter.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
MirServer/LogServer/LogDataServer.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
MirServer/LogServer/LogDataServer.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
MirServer/LogServer/lpk.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
MirServer/LogServer/lpk.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
MirServer/LoginGate/LoginGate.exe
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
MirServer/LoginGate/LoginGate.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
MirServer/LoginGate/lpk.dll
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
MirServer/LoginGate/lpk.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
MirServer/LoginSrv/LoginSrv.exe
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
MirServer/LoginSrv/LoginSrv.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
MirServer/LoginSrv/lpk.dll
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
MirServer/LoginSrv/lpk.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
MirServer/Mir200/Envir/QuestDiary/16sky.com/ţţ/MSCOMCTL.dll
Resource
win7-20220901-en
Behavioral task
behavioral20
Sample
MirServer/Mir200/Envir/QuestDiary/16sky.com/ţţ/MSCOMCTL.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
MirServer/Mir200/IPLocal.dll
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
MirServer/Mir200/IPLocal.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
MirServer/Mir200/M2Server.exe
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
MirServer/Mir200/M2Server.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
MirServer/Mir200/M2Server.exe.lnk
Resource
win7-20220901-en
Behavioral task
behavioral26
Sample
MirServer/Mir200/M2Server.exe.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
MirServer/Mir200/lpk.dll
Resource
win7-20221111-en
Behavioral task
behavioral28
Sample
MirServer/Mir200/lpk.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
MirServer/Readme-˵.htm
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
MirServer/Readme-˵.htm
Resource
win10v2004-20220901-en
Behavioral task
behavioral31
Sample
MirServer/RunGate/RunGate.exe
Resource
win7-20220901-en
Behavioral task
behavioral32
Sample
MirServer/RunGate/RunGate.exe
Resource
win10v2004-20221111-en
General
-
Target
MirServer/DBServer/lpk.dll
-
Size
42KB
-
MD5
4d691ae646b320e04bc2f5db3c245eb4
-
SHA1
e55533b8f117ed5cf0248f633c0e7f69d5226df6
-
SHA256
ddf7073e755dd661565e8eb7b892372dc48a55fde09b1f07cda6e47ce7f8d650
-
SHA512
39f83db56c34c7a7f6d8dab0d2b073447276cb94dfd52c678fbd7a858c33de490fb1249d8d8c55114494fd1f01d07ca43defa210cc6926159c3a51e0f6992699
-
SSDEEP
768:ZojY9PqwzZNfYoMQxcttCIl1GRPKjECdVojY9P9:smlXPgtZTxECdAmF
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
hrl5764.tmpvcjlye.exepid process 1988 hrl5764.tmp 2036 vcjlye.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exevcjlye.exepid process 1396 rundll32.exe 1396 rundll32.exe 2036 vcjlye.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vcjlye.exedescription ioc process File opened (read-only) \??\T: vcjlye.exe File opened (read-only) \??\V: vcjlye.exe File opened (read-only) \??\X: vcjlye.exe File opened (read-only) \??\H: vcjlye.exe File opened (read-only) \??\J: vcjlye.exe File opened (read-only) \??\Q: vcjlye.exe File opened (read-only) \??\M: vcjlye.exe File opened (read-only) \??\N: vcjlye.exe File opened (read-only) \??\P: vcjlye.exe File opened (read-only) \??\R: vcjlye.exe File opened (read-only) \??\Y: vcjlye.exe File opened (read-only) \??\F: vcjlye.exe File opened (read-only) \??\G: vcjlye.exe File opened (read-only) \??\L: vcjlye.exe File opened (read-only) \??\Z: vcjlye.exe File opened (read-only) \??\I: vcjlye.exe File opened (read-only) \??\O: vcjlye.exe File opened (read-only) \??\W: vcjlye.exe File opened (read-only) \??\U: vcjlye.exe File opened (read-only) \??\E: vcjlye.exe File opened (read-only) \??\K: vcjlye.exe File opened (read-only) \??\S: vcjlye.exe -
Drops file in System32 directory 4 IoCs
Processes:
hrl5764.tmpvcjlye.exedescription ioc process File created C:\Windows\SysWOW64\vcjlye.exe hrl5764.tmp File opened for modification C:\Windows\SysWOW64\vcjlye.exe hrl5764.tmp File created C:\Windows\SysWOW64\hra33.dll vcjlye.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat vcjlye.exe -
Modifies data under HKEY_USERS 55 IoCs
Processes:
vcjlye.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 460000000d000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vcjlye.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDecisionTime = a0c71d309101d901 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000007000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vcjlye.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix vcjlye.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" vcjlye.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000006000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDecisionTime = 80187e269101d901 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 460000000a000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vcjlye.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionTime = 604e442c9101d901 vcjlye.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadNetworkName = "Network 3" vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionTime = 409fa4229101d901 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionTime = 20d56a289101d901 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDecisionTime = 604e442c9101d901 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDecisionTime = 000b312e9101d901 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vcjlye.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\d6-dd-0f-5e-73-0c vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDecisionTime = 409fa4229101d901 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionTime = e05b91249101d901 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionTime = 80187e269101d901 vcjlye.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000009000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDecisionTime = 20d56a289101d901 vcjlye.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecision = "0" vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionTime = 000b312e9101d901 vcjlye.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" vcjlye.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95} vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDecisionTime = e05b91249101d901 vcjlye.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDetectedUrl vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionTime = a0e2b7209101d901 vcjlye.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000008000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionTime = c091572a9101d901 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionTime = 406ca4199101d901 vcjlye.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDecisionReason = "1" vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDecisionTime = 406ca4199101d901 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000005000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 460000000c000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vcjlye.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDecisionTime = a0e2b7209101d901 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionTime = a0c71d309101d901 vcjlye.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c vcjlye.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDecision = "0" vcjlye.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDecisionTime = 0026cb1e9101d901 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-dd-0f-5e-73-0c\WpadDecisionTime = c091572a9101d901 vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 460000000b000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vcjlye.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings vcjlye.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionReason = "1" vcjlye.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionTime = 0026cb1e9101d901 vcjlye.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
hrl5764.tmpdescription pid process Token: SeIncBasePriorityPrivilege 1988 hrl5764.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rundll32.exerundll32.exehrl5764.tmpdescription pid process target process PID 1100 wrote to memory of 1396 1100 rundll32.exe rundll32.exe PID 1100 wrote to memory of 1396 1100 rundll32.exe rundll32.exe PID 1100 wrote to memory of 1396 1100 rundll32.exe rundll32.exe PID 1100 wrote to memory of 1396 1100 rundll32.exe rundll32.exe PID 1100 wrote to memory of 1396 1100 rundll32.exe rundll32.exe PID 1100 wrote to memory of 1396 1100 rundll32.exe rundll32.exe PID 1100 wrote to memory of 1396 1100 rundll32.exe rundll32.exe PID 1396 wrote to memory of 1988 1396 rundll32.exe hrl5764.tmp PID 1396 wrote to memory of 1988 1396 rundll32.exe hrl5764.tmp PID 1396 wrote to memory of 1988 1396 rundll32.exe hrl5764.tmp PID 1396 wrote to memory of 1988 1396 rundll32.exe hrl5764.tmp PID 1988 wrote to memory of 1900 1988 hrl5764.tmp cmd.exe PID 1988 wrote to memory of 1900 1988 hrl5764.tmp cmd.exe PID 1988 wrote to memory of 1900 1988 hrl5764.tmp cmd.exe PID 1988 wrote to memory of 1900 1988 hrl5764.tmp cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\MirServer\DBServer\lpk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\MirServer\DBServer\lpk.dll,#12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\hrl5764.tmpC:\Users\Admin\AppData\Local\Temp\hrl5764.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\hrl5764.tmp > nul4⤵PID:1900
-
-
-
-
C:\Windows\SysWOW64\vcjlye.exeC:\Windows\SysWOW64\vcjlye.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD52d53ee91ed80e8a5a0134a7b7bc8097c
SHA1a8df996004f0bae739b8d1a15a8fcc1d868d34e2
SHA25688127c1ca940b5e087cb124f942761bffdefe2c73e4574570f1f914224083cf2
SHA512ca70ee3311bd3b20f15776390fd3c5f0e438bba65669caf56e95cc94ed6ae17d4d7a9866908bfa5aa1732cd5fd56d269c4836b1754fdf718e3d6d8ea5a9e4e14
-
Filesize
34KB
MD52d53ee91ed80e8a5a0134a7b7bc8097c
SHA1a8df996004f0bae739b8d1a15a8fcc1d868d34e2
SHA25688127c1ca940b5e087cb124f942761bffdefe2c73e4574570f1f914224083cf2
SHA512ca70ee3311bd3b20f15776390fd3c5f0e438bba65669caf56e95cc94ed6ae17d4d7a9866908bfa5aa1732cd5fd56d269c4836b1754fdf718e3d6d8ea5a9e4e14
-
Filesize
34KB
MD52d53ee91ed80e8a5a0134a7b7bc8097c
SHA1a8df996004f0bae739b8d1a15a8fcc1d868d34e2
SHA25688127c1ca940b5e087cb124f942761bffdefe2c73e4574570f1f914224083cf2
SHA512ca70ee3311bd3b20f15776390fd3c5f0e438bba65669caf56e95cc94ed6ae17d4d7a9866908bfa5aa1732cd5fd56d269c4836b1754fdf718e3d6d8ea5a9e4e14
-
Filesize
34KB
MD52d53ee91ed80e8a5a0134a7b7bc8097c
SHA1a8df996004f0bae739b8d1a15a8fcc1d868d34e2
SHA25688127c1ca940b5e087cb124f942761bffdefe2c73e4574570f1f914224083cf2
SHA512ca70ee3311bd3b20f15776390fd3c5f0e438bba65669caf56e95cc94ed6ae17d4d7a9866908bfa5aa1732cd5fd56d269c4836b1754fdf718e3d6d8ea5a9e4e14
-
Filesize
34KB
MD52d53ee91ed80e8a5a0134a7b7bc8097c
SHA1a8df996004f0bae739b8d1a15a8fcc1d868d34e2
SHA25688127c1ca940b5e087cb124f942761bffdefe2c73e4574570f1f914224083cf2
SHA512ca70ee3311bd3b20f15776390fd3c5f0e438bba65669caf56e95cc94ed6ae17d4d7a9866908bfa5aa1732cd5fd56d269c4836b1754fdf718e3d6d8ea5a9e4e14
-
Filesize
34KB
MD52d53ee91ed80e8a5a0134a7b7bc8097c
SHA1a8df996004f0bae739b8d1a15a8fcc1d868d34e2
SHA25688127c1ca940b5e087cb124f942761bffdefe2c73e4574570f1f914224083cf2
SHA512ca70ee3311bd3b20f15776390fd3c5f0e438bba65669caf56e95cc94ed6ae17d4d7a9866908bfa5aa1732cd5fd56d269c4836b1754fdf718e3d6d8ea5a9e4e14
-
Filesize
42KB
MD54d691ae646b320e04bc2f5db3c245eb4
SHA1e55533b8f117ed5cf0248f633c0e7f69d5226df6
SHA256ddf7073e755dd661565e8eb7b892372dc48a55fde09b1f07cda6e47ce7f8d650
SHA51239f83db56c34c7a7f6d8dab0d2b073447276cb94dfd52c678fbd7a858c33de490fb1249d8d8c55114494fd1f01d07ca43defa210cc6926159c3a51e0f6992699