Analysis
-
max time kernel
184s -
max time network
287s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 16:32
Static task
static1
Behavioral task
behavioral1
Sample
科威软件园.url
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
科威软件园.url
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
˸4.1.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
˸4.1.exe
Resource
win10v2004-20220812-en
General
-
Target
˸4.1.exe
-
Size
5.1MB
-
MD5
d4a0825e77027a47b28ac118f0975d52
-
SHA1
fac4d04808945eda9ef71114ae715606d71bd911
-
SHA256
87cb34ebb531cfdf2abbd61c1e10184fd17e8d92a9cebd38c3684359747ecd51
-
SHA512
60f6f849c790865274d0d54aba241e1b7a4e2b066a2ccd894b507edc9b211921a6eead88557fb4151daa7a8a15967ad526cce9320471377a18b85329ccc6eeec
-
SSDEEP
98304:eCv+JlCP+zYxsWUGi95aWJEz/eYqdwkLcHHOT5kJLR6HOkJvVqmFIAG2B0zx:AJloxHUG3lzGjAOdkdou8NvB0zx
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\SkinH_EL.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
ÄæÕ½±¯É˸¨Öú.exepid process 664 ÄæÕ½±¯É˸¨Öú.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\SkinH_EL.dll upx behavioral3/memory/664-62-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Processes:
resource yara_rule behavioral3/memory/944-68-0x0000000016080000-0x0000000016152000-memory.dmp vmprotect \Windows\SysWOW64\SuperEC_Hook.dll vmprotect C:\Windows\SysWOW64\SuperEC_Hook.dll vmprotect -
Loads dropped DLL 4 IoCs
Processes:
˸4.1.exeÄæÕ½±¯É˸¨Öú.exeregsvr32.exepid process 1516 ˸4.1.exe 1516 ˸4.1.exe 664 ÄæÕ½±¯É˸¨Öú.exe 944 regsvr32.exe -
Drops file in System32 directory 1 IoCs
Processes:
ÄæÕ½±¯É˸¨Öú.exedescription ioc process File created C:\Windows\SysWOW64\SuperEC_Hook.dll ÄæÕ½±¯É˸¨Öú.exe -
Processes:
iexplore.exeIEXPLORE.EXEÄæÕ½±¯É˸¨Öú.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "82" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "179" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B834D2F1-6E2E-11ED-A5FF-56A236AC5043} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "287" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1453" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "44" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "195" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "231" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "82" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "299" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "1453" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "252" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "152" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "179" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "195" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "152" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "231" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "252" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "299" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main ÄæÕ½±¯É˸¨Öú.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "269" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "269" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "44" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "179" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "287" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "1453" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "299" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "231" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376303269" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "152" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "195" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "82" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "252" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "44" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "100" IEXPLORE.EXE -
Processes:
ÄæÕ½±¯É˸¨Öú.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ÄæÕ½±¯É˸¨Öú.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 ÄæÕ½±¯É˸¨Öú.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
iexplore.exepid process 332 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
ÄæÕ½±¯É˸¨Öú.exedescription pid process Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe Token: 33 664 ÄæÕ½±¯É˸¨Öú.exe Token: SeIncBasePriorityPrivilege 664 ÄæÕ½±¯É˸¨Öú.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 332 iexplore.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
˸4.1.exeÄæÕ½±¯É˸¨Öú.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1516 ˸4.1.exe 1516 ˸4.1.exe 664 ÄæÕ½±¯É˸¨Öú.exe 664 ÄæÕ½±¯É˸¨Öú.exe 332 iexplore.exe 332 iexplore.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 664 ÄæÕ½±¯É˸¨Öú.exe 664 ÄæÕ½±¯É˸¨Öú.exe 664 ÄæÕ½±¯É˸¨Öú.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
˸4.1.exeiexplore.exeÄæÕ½±¯É˸¨Öú.exedescription pid process target process PID 1516 wrote to memory of 664 1516 ˸4.1.exe ÄæÕ½±¯É˸¨Öú.exe PID 1516 wrote to memory of 664 1516 ˸4.1.exe ÄæÕ½±¯É˸¨Öú.exe PID 1516 wrote to memory of 664 1516 ˸4.1.exe ÄæÕ½±¯É˸¨Öú.exe PID 1516 wrote to memory of 664 1516 ˸4.1.exe ÄæÕ½±¯É˸¨Öú.exe PID 1516 wrote to memory of 332 1516 ˸4.1.exe iexplore.exe PID 1516 wrote to memory of 332 1516 ˸4.1.exe iexplore.exe PID 1516 wrote to memory of 332 1516 ˸4.1.exe iexplore.exe PID 1516 wrote to memory of 332 1516 ˸4.1.exe iexplore.exe PID 332 wrote to memory of 1512 332 iexplore.exe IEXPLORE.EXE PID 332 wrote to memory of 1512 332 iexplore.exe IEXPLORE.EXE PID 332 wrote to memory of 1512 332 iexplore.exe IEXPLORE.EXE PID 332 wrote to memory of 1512 332 iexplore.exe IEXPLORE.EXE PID 332 wrote to memory of 1168 332 iexplore.exe IEXPLORE.EXE PID 332 wrote to memory of 1168 332 iexplore.exe IEXPLORE.EXE PID 332 wrote to memory of 1168 332 iexplore.exe IEXPLORE.EXE PID 332 wrote to memory of 1168 332 iexplore.exe IEXPLORE.EXE PID 664 wrote to memory of 944 664 ÄæÕ½±¯É˸¨Öú.exe regsvr32.exe PID 664 wrote to memory of 944 664 ÄæÕ½±¯É˸¨Öú.exe regsvr32.exe PID 664 wrote to memory of 944 664 ÄæÕ½±¯É˸¨Öú.exe regsvr32.exe PID 664 wrote to memory of 944 664 ÄæÕ½±¯É˸¨Öú.exe regsvr32.exe PID 664 wrote to memory of 944 664 ÄæÕ½±¯É˸¨Öú.exe regsvr32.exe PID 664 wrote to memory of 944 664 ÄæÕ½±¯É˸¨Öú.exe regsvr32.exe PID 664 wrote to memory of 944 664 ÄæÕ½±¯É˸¨Öú.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\˸4.1.exe"C:\Users\Admin\AppData\Local\Temp\˸4.1.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\ÄæÕ½±¯É˸¨Öú.exeC:\Users\Admin\AppData\Local\Temp\ÄæÕ½±¯É˸¨Öú.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows\system32\SuperEC_Hook.dll3⤵
- Loads dropped DLL
PID:944
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.2345.com/?kcassidy2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:332 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1512
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:332 CREDAT:537607 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1168
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize1KB
MD5a532ae425f5626c06d1073a4f6e2ce39
SHA186e22bca8bd73a714195d89f9f4578a63ddd9481
SHA2564cd7bbf1de03131dcde2657c113b61b769a2bc35b731bcdabdeb2be16ba058bd
SHA512dd025de9b156ac4f311918224ece28afc9421a3e62c9dfa09f42515259e58c3864b1273819a5991822077ca66f96fd6ba9b71e920c7c004066e71e5bb49f4ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B
Filesize1KB
MD5c9a45ebed91b8363bfab525049dcc050
SHA1a2b3329474d191255c54ae1567063a041bec39e3
SHA2564eb453f585b4e58b6e52b8a4946f72160b9133dadc827fdc3ad6cd66e4e2c51c
SHA51236afe96205186fdc80dced09c62037502087c41e350bdc3086fcf602723bbf9b0f01769aa968c5ec29fe52ca6bb5390032c394dee4ecf4806afa79cc1a6d0e3b
-
Filesize
599B
MD585fe7f1600c64c62d26f3d4c6b7c04da
SHA148cf79d6ce076923b1e0518e91bf81cc0153dea3
SHA256a4c3ad6c71bcfb47526ef964430c3c32a3e570d0cf6a6c6e493b46c4c8047561
SHA51273c51e6043fdb2a60892900de29efa6356771dbc146f294e72835369e4257c0890393facdbbbf6f4f84de63fa6af4d8f65e78b97cfd7d3550596f111aa8f9375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3
Filesize1KB
MD5598786b44f058fe0f85411b64ce208bb
SHA184be7645337e8f1d45cfe0809086629fe1c868a2
SHA2567a929ddcf3ae1833d455678be2347df5facbf7871177b24b849970d4a8627d9d
SHA512b5c0eeb8b6694c9be6826ad27f5bf1c713f0111872b63d406edea59e7a0d4e4acbb23483aeba4b158120428e7e05ffa64398b96f7e814bd4d47a0132199919dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_BE25D0FE540174A4A87E2295C663329D
Filesize1KB
MD5daccf10489a2a60b33f50f1d61edb489
SHA108ce5fc440771cd8567d66e61ce52dd601f4e7d4
SHA256f18d3c447d439559c5446d1549484b0523b9dded2938951aab337e012e009845
SHA512cc6af00512894816f60b2046766dc4c45c1e96ec5a2a7d55bc77f9fec20bd6bb9a0788ba05dd17a6f363b8c19f3df04c126cc1d872d3d2a9a75f45c0fc26c902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize508B
MD53f14c26ee54d82a270470925f7fba6b9
SHA1cb433174d557d26d368b6784b76d28c982b75d95
SHA2569b24594223d2a620d4d95ba5800f675211ab4c63fc6531ee865290b922d555d2
SHA512a18cad33a7796183fe9139566071f7a8f13972737065c0f2f16d0faedd2471b4e27af2399dcdfbbd1903132199a26e87bef55954bc3983515113779d2b968a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B
Filesize532B
MD56670d03fb555ca546b529807c3a4f23e
SHA1d76418c00b2a6d6d079ae2a63c8d6ce77aa56ce0
SHA256305d0fc8494911fb36d4fc411a80ea3fc0f28587fac7243c7a1b014743b35e29
SHA5126ffcfad3bc49c3cc3dd74aa7664a4655278279077424ec93d4724e27e38953c7e7fac29dc10ab7b80e9cc9741724ad8e048405e9a41c8065d83e197fc370e4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\574A9FE7B8348B82BDCAB078149F62FA
Filesize500B
MD5004d12bd5d9019d1b54b66ca65aa8372
SHA146cc63b38676fd6260c7493429c08a468daa649e
SHA25652e58bac328cb10a133483c858eab5349318640bcb4b2bb1cbcdf8c2ee73cf49
SHA5124f8c0752e8d46b4c27cfc680b7977f860277836f667255faa31cf9d2597d6e8747e5aa7de67d359350d6ce244140f925dde0fef2c7abf89ae6494b03deeff6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a3603d530ae2dcc343c7d6db7d29771
SHA1b0116adf3e38d8ad4c66e077e928c1d17eab8518
SHA256e7c5a799260f33a58295ad1c2433cd17845191a554670ca05aba8ff84e51e7ca
SHA512c723e5f4a52509d2024d31b6cbc1f05d697e199abcf2f1db45bcfaf1c8646b307937a62698eba0f75874ca76e4ef087a3de93122496b445de96ad11ebdb37833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3
Filesize506B
MD5a90d41e401f417b28365869b981e0183
SHA196eb4322ce0a1c176165e903c6bfabf190f53679
SHA2567c39dc22994fb4e7d41e4d8f1801b3e4701fbac9c6d29dfcb9e8297592416c0b
SHA512b0b681d409a22040ad399a60ef9fda02834515df1935a573eec3f545c15a8360c32927701dd715491c723ec734b17c1cc18587bcc7e7ccaa5f8943657ed218ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_BE25D0FE540174A4A87E2295C663329D
Filesize482B
MD5fa6a7d65233a7acba50e35ead5eacba5
SHA18791690c73252ad798da66f062f22a7e1e415ee7
SHA2564c7759dea1fa749285e716f638ae7c5873a6a9aa27f549a5044add5c875f40e1
SHA51291130f05d4247152e0328ad938334673274809e09e862b647c61f9e12cfe4516097d586fdd92c3e01ea5e1bb7e2962543210e2c7b6f5c62ce0838051908a2886
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\46XILC9P\style[1].css
Filesize48KB
MD5d545f97c1c1874a36c8b896b51b59fab
SHA1ece2c079aa13b4b93e605e347df01bbcc7dddf3a
SHA2566279934eb7232a166de5c0d8578a11e23ac7ce25f17a63b15b13a51ae3671eed
SHA5120e8fbe0ed2cbcc743aac6d495faf4506e6bddd38858ae87ba171abdde212504514451bec35001bb116597cb8ea6acd299a6a53c2afaee3e8f24e4bcf79e9390c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IV8L6YIU\jquery.min[1].js
Filesize714B
MD5c48bfb5700cbbbbe34992d48ca8d1e7f
SHA1cb08102c86d3af19faff3361f27aeb9bd55d488c
SHA256868fceec383fb95f67749fba7ef94ce6baad4080bf113bbd11a99684d459bfcd
SHA512ffeef5b27109c20ba8ac3d013e0a9be1b6fc7f2d04e239cbf89c3d785a95e36b749dd7adab63ba59c806d7f996f5af628210511503a68e77e971c654da0ada76
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PFZC0YBM\72YMPOT5.htm
Filesize60KB
MD562e8d3318f903011a1b7a722fdb90110
SHA1b3e6dcbf7cc079e55ecfb6b90543ffb9e0bf9233
SHA2565289d866f69614330bd6e7b0c2fc1da65b50e76e0d8ed36465322864be6c02f9
SHA512a0d2996e875145e5e4966a871da41a6a3851f50afb9afd55134d60d66b7b2e05853194f855dd142d3c79e709aba4d307f4f11fd32488d0054b78ad2b51938dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YT1AL9CX\wookmark.min[1].js
Filesize8KB
MD5c3025313ef46f9deaf15d8dd84afdb6f
SHA1438edb9ebffbaa3af8b01f98c6a5a0d5186f9069
SHA2568542c8bb4b72288ca52ca77154798417b07ef0703e9d7e4ae0508d49a2a580ba
SHA5120fa908aae206ad2eb69e26136b606f9a569e3424dd22f8328442dc320a3ed6f15d962b248f2f663787fc1963c0e5edf1cabdee532f2aee1b1427b34fe5528105
-
Filesize
4.5MB
MD535820cb78e5516ee20625389a67b7a5c
SHA19bbe8d20b8352c392f8d47da1b61e5894c4db585
SHA256ff3719f6abade4c0604d944e90ddbb6fdd8b84c1476a7917218d76233520dd9f
SHA5120e1f4687833ef9f8355e28210565baabc01af55d6cb4e47185215c1e739d6f64d7bebbe9c9ab11fb5be1f61021ccdf1d390b6c92c3049f7e4f3f8241c70cb043
-
Filesize
4.5MB
MD535820cb78e5516ee20625389a67b7a5c
SHA19bbe8d20b8352c392f8d47da1b61e5894c4db585
SHA256ff3719f6abade4c0604d944e90ddbb6fdd8b84c1476a7917218d76233520dd9f
SHA5120e1f4687833ef9f8355e28210565baabc01af55d6cb4e47185215c1e739d6f64d7bebbe9c9ab11fb5be1f61021ccdf1d390b6c92c3049f7e4f3f8241c70cb043
-
Filesize
596B
MD5012e9848e4ec9f84aad4d44f3cda2577
SHA18c2f94264c0bdf6643e5399a698b622718b92363
SHA256af15d62ad76fb410288b1147c8996f1a1375d7690840b3b2629670d21eac96fc
SHA512d597df341403281f304c97025bfdac95808a36129d2f6fd27dfd7b4009b7f85843ee45fbbf029515394ac985986d7b767a0f3b4a135904c86cbf96a72eefae0d
-
Filesize
110B
MD58953bac793a78a00a82504eb7a23c53d
SHA1370bb7ae3c074807ed5890767e265b1c747cb270
SHA2563ec9d0ddc42997ce3663bec9ec6f933edabf89733e0339a35c3eb325934785a7
SHA512913204e817ddc78686e76f0b5efe96043e8c4c15854da23a5a26201b575557d47196fb5a423ad605b21e6dc1631cf721ef6469fd5e8d374127d16ea5dd80bb23
-
Filesize
678B
MD5558cf4797a98c393eda33e7150a69d65
SHA18690000613ed8fa69d41994f51be2b95711d8feb
SHA256bd9515b1f5a6f7478a60d48e24ba4a196c68452395b558e2d317beead4b7dbac
SHA512b8238a94c6ff56b0d3faa4463339f47dc8f5102535e089cc49e6eca10b714025e8ae97a2e4f95811563ad7a5441b6a159e4e3c920d7d2fb8cb705a6d5a479aa5
-
Filesize
368KB
MD56446f02463634295797ff698eb7eb92e
SHA164a20417acf7c9bd67efc601236c85fa640426a8
SHA25653022e175ff09af40a8569a641a261ed08dabc7331afbdde97f2f3d6f9321b33
SHA512eeeb4152b92f9c4cad35d596f6fdec8d4e26b93c1a71627007ce5e490c46bd7773cc65309645ace429467b335fea5fe33cb5aac4cf507367cd9ad72a1b9efbfe
-
Filesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d
-
Filesize
4.5MB
MD535820cb78e5516ee20625389a67b7a5c
SHA19bbe8d20b8352c392f8d47da1b61e5894c4db585
SHA256ff3719f6abade4c0604d944e90ddbb6fdd8b84c1476a7917218d76233520dd9f
SHA5120e1f4687833ef9f8355e28210565baabc01af55d6cb4e47185215c1e739d6f64d7bebbe9c9ab11fb5be1f61021ccdf1d390b6c92c3049f7e4f3f8241c70cb043
-
Filesize
4.5MB
MD535820cb78e5516ee20625389a67b7a5c
SHA19bbe8d20b8352c392f8d47da1b61e5894c4db585
SHA256ff3719f6abade4c0604d944e90ddbb6fdd8b84c1476a7917218d76233520dd9f
SHA5120e1f4687833ef9f8355e28210565baabc01af55d6cb4e47185215c1e739d6f64d7bebbe9c9ab11fb5be1f61021ccdf1d390b6c92c3049f7e4f3f8241c70cb043
-
Filesize
368KB
MD56446f02463634295797ff698eb7eb92e
SHA164a20417acf7c9bd67efc601236c85fa640426a8
SHA25653022e175ff09af40a8569a641a261ed08dabc7331afbdde97f2f3d6f9321b33
SHA512eeeb4152b92f9c4cad35d596f6fdec8d4e26b93c1a71627007ce5e490c46bd7773cc65309645ace429467b335fea5fe33cb5aac4cf507367cd9ad72a1b9efbfe