Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 03:16
Static task
static1
Behavioral task
behavioral1
Sample
76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe
Resource
win10v2004-20220901-en
General
-
Target
76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe
-
Size
1.8MB
-
MD5
0dffd34640eb0bf4a199ee3ed018ae52
-
SHA1
fd381c88c26c51e6a5a313a9b83b9d185e6f86f9
-
SHA256
76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d
-
SHA512
4eaa7678c80fcc3779ed07e4f27f0a42630c98e1727850fabd547be395a5d2ae2e40350a3db445934f79e059eff660f160d9f649521edb5cc5f0d72e896d002a
-
SSDEEP
24576:3B/E0QwpHP5IX2Zfxh5sVuRmG4WLKPBHmOnrRbPqnpMd5itymGqEFNIjsgW:R/d9pvxMuR4WwH5rhOpeUtRELIog
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe -
Executes dropped EXE 4 IoCs
pid Process 2392 DNF3 2012-09-05 22.41.exe 2956 svchost.exe 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe 1396 Guarder.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation dnf小岚0907A全屏秒杀全屏爆炸.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Wine 76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe -
Loads dropped DLL 2 IoCs
pid Process 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\R: svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 dnf小岚0907A全屏秒杀全屏爆炸.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ÄÚ´æ´úÂë.txt dnf小岚0907A全屏秒杀全屏爆炸.exe File opened for modification C:\Windows\SysWOW64\DNFСá°.dll dnf小岚0907A全屏秒杀全屏爆炸.exe File created C:\Windows\SysWOW64\Сá°×¢Èë.ime dnf小岚0907A全屏秒杀全屏爆炸.exe File created C:\Windows\SysWOW64\DNFСá°.dll dnf小岚0907A全屏秒杀全屏爆炸.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4980 76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Shared\svchost.exe DNF3 2012-09-05 22.41.exe File created C:\Program Files (x86)\Common Files\Shared\svchost.exe DNF3 2012-09-05 22.41.exe File opened for modification C:\Program Files (x86)\Common Files\Shared\RCXE1E9.tmp DNF3 2012-09-05 22.41.exe File opened for modification C:\Program Files (x86)\Common Files\Shared\Guarder.exe svchost.exe File created C:\Program Files (x86)\Common Files\Shared\Guarder.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Shared\Record.dat DNF3 2012-09-05 22.41.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BB6E43F9-72CD-11ED-A0EE-CE8FEF2919E2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BB70A6EE-72CD-11ED-A0EE-CE8FEF2919E2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2414848384" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000282" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000282" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a19591da06d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000282" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b90065491b168149b11a8daad2b40cfa00000000020000000000106600000001000020000000cc638e8e6a44c3b6ddae2fd0c1bcc753d001fa38bb4a9c0c23d769d03770a7e6000000000e8000000002000020000000e911d2b8dcebdac472e05c76e5af7b336600b63a1d22ddf123a4373aa9e6b7cd2000000004c73736d3da0d208c85531d379051d3daaf1c469e22f033a670e02b92d97b75400000003339662a1a646efed552c087b8be24fe442e3f5fff9987a2786f51a0ea66a8024149b2fa15e0fee6ff3a1eada04e25babf2ce849e23f00612d8b0a5218d7f9dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2414535928" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376811321" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000282" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b90065491b168149b11a8daad2b40cfa000000000200000000001066000000010000200000000b0b46b99893eed87c57099e30198b2395939feeb716a48bd15a5e36738fa6f8000000000e8000000002000020000000798dfbe684f9768ce54a8e2b0eeaa7f52c1a733f5a8a5e482429ffcc1777de74200000001cccb4fd84feb72953caaade20ec1f307bd3294e538643c5c494001a5fec3b824000000026756b7c529575efeb9373607cd5d7ce20ded7575706e7854f2fe7ef6c73c87987644d89c0e01ce94c8130a5f7a8603bdaafea3371e9be50475c93507e8f0dbb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000282" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08e8291da06d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2414380851" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2420316483" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2420316483" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2414848384" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000282" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4980 76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe 4980 76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe 2392 DNF3 2012-09-05 22.41.exe 2392 DNF3 2012-09-05 22.41.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: 33 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe Token: SeIncBasePriorityPrivilege 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe Token: 33 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe Token: SeIncBasePriorityPrivilege 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe Token: SeIncBasePriorityPrivilege 1396 Guarder.exe Token: 33 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe Token: SeIncBasePriorityPrivilege 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe Token: 33 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe Token: SeIncBasePriorityPrivilege 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe Token: 33 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe Token: SeIncBasePriorityPrivilege 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe Token: 33 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe Token: SeIncBasePriorityPrivilege 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 212 iexplore.exe 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 2392 DNF3 2012-09-05 22.41.exe 2956 svchost.exe 2956 svchost.exe 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe 1396 Guarder.exe 1396 Guarder.exe 2960 iexplore.exe 2960 iexplore.exe 212 iexplore.exe 212 iexplore.exe 4384 IEXPLORE.EXE 4384 IEXPLORE.EXE 3084 IEXPLORE.EXE 3084 IEXPLORE.EXE 3084 IEXPLORE.EXE 3084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4980 wrote to memory of 2392 4980 76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe 81 PID 4980 wrote to memory of 2392 4980 76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe 81 PID 4980 wrote to memory of 2392 4980 76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe 81 PID 2392 wrote to memory of 2956 2392 DNF3 2012-09-05 22.41.exe 82 PID 2392 wrote to memory of 2956 2392 DNF3 2012-09-05 22.41.exe 82 PID 2392 wrote to memory of 2956 2392 DNF3 2012-09-05 22.41.exe 82 PID 4980 wrote to memory of 1472 4980 76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe 83 PID 4980 wrote to memory of 1472 4980 76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe 83 PID 4980 wrote to memory of 1472 4980 76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe 83 PID 2956 wrote to memory of 1396 2956 svchost.exe 84 PID 2956 wrote to memory of 1396 2956 svchost.exe 84 PID 2956 wrote to memory of 1396 2956 svchost.exe 84 PID 1472 wrote to memory of 2960 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe 85 PID 1472 wrote to memory of 2960 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe 85 PID 1472 wrote to memory of 212 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe 86 PID 1472 wrote to memory of 212 1472 dnf小岚0907A全屏秒杀全屏爆炸.exe 86 PID 212 wrote to memory of 4384 212 iexplore.exe 88 PID 212 wrote to memory of 4384 212 iexplore.exe 88 PID 212 wrote to memory of 4384 212 iexplore.exe 88 PID 2960 wrote to memory of 3084 2960 iexplore.exe 87 PID 2960 wrote to memory of 3084 2960 iexplore.exe 87 PID 2960 wrote to memory of 3084 2960 iexplore.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe"C:\Users\Admin\AppData\Local\Temp\76816732db8051f52654c9969f4b6d028b8a8ab327fe79c26653e86d43ace11d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\DNF3 2012-09-05 22.41.exe"C:\Users\Admin\AppData\Local\Temp\DNF3 2012-09-05 22.41.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Common Files\Shared\svchost.exe"C:\Program Files (x86)\Common Files\Shared\svchost.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Common Files\Shared\Guarder.exe2956*C:\Program Files (x86)\Common Files\Shared\svchost.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\dnf小岚0907A全屏秒杀全屏爆炸.exe"C:\Users\Admin\AppData\Local\Temp\dnf小岚0907A全屏秒杀全屏爆炸.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" www.dnfxiaolan.com3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3084
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" www.dnfxiaolan.com3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:212 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD56b7fc45ec32c45984e9842f8a7e8c976
SHA1b99341eb2b8e8dd4a5268e5e61c8b9fa4b289d20
SHA25631c3b60f7a318d275ca8c15bd5a1330d0da1b561d3e109984187c19fc5fc4da9
SHA5125b567667f111eeaf49a77177fa492a7f7394aa92bfcfc5ff4e6042bbef1661ebd9ac726d3cae8fe31dd14b9fe53c3c1ed7037a4826a5b7781e5f3c0d1f6f544e
-
Filesize
4.1MB
MD56b7fc45ec32c45984e9842f8a7e8c976
SHA1b99341eb2b8e8dd4a5268e5e61c8b9fa4b289d20
SHA25631c3b60f7a318d275ca8c15bd5a1330d0da1b561d3e109984187c19fc5fc4da9
SHA5125b567667f111eeaf49a77177fa492a7f7394aa92bfcfc5ff4e6042bbef1661ebd9ac726d3cae8fe31dd14b9fe53c3c1ed7037a4826a5b7781e5f3c0d1f6f544e
-
Filesize
260B
MD533418954cba5cdba78b6c7535faccaca
SHA1b941f030693597aa8c513f8eb79faee3e380e4e9
SHA256ab3716fafd0a19d07901e6a26f4e5ff922dab3f7d830127200a70ffe1df261e3
SHA51293c4aa71f739c6928e7abfc1c1ecb6696bbc16ace8652d9baaead5c75d731ed47bcb42fbfe58d63a6b99ba9be43604eff43e6c3055e47dd810bcd61365025eed
-
Filesize
4.1MB
MD56b7fc45ec32c45984e9842f8a7e8c976
SHA1b99341eb2b8e8dd4a5268e5e61c8b9fa4b289d20
SHA25631c3b60f7a318d275ca8c15bd5a1330d0da1b561d3e109984187c19fc5fc4da9
SHA5125b567667f111eeaf49a77177fa492a7f7394aa92bfcfc5ff4e6042bbef1661ebd9ac726d3cae8fe31dd14b9fe53c3c1ed7037a4826a5b7781e5f3c0d1f6f544e
-
Filesize
4.1MB
MD56b7fc45ec32c45984e9842f8a7e8c976
SHA1b99341eb2b8e8dd4a5268e5e61c8b9fa4b289d20
SHA25631c3b60f7a318d275ca8c15bd5a1330d0da1b561d3e109984187c19fc5fc4da9
SHA5125b567667f111eeaf49a77177fa492a7f7394aa92bfcfc5ff4e6042bbef1661ebd9ac726d3cae8fe31dd14b9fe53c3c1ed7037a4826a5b7781e5f3c0d1f6f544e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD54132c54f59c529167c112e7f519120fa
SHA194cc9036fa031258aa744c7ee88e3c0b6c7a73da
SHA256e9f456cf8bb8cc4a683d1c2f792feeb4c83fff24a86e6bcb260eff8fbff126fb
SHA512e8efb8e81a90ffbe177301fbba4470ded104fc6d12cfa0123938b981d612eb2c4a66bb47b585cd43ed6ed4940e0ad5a1e3a5d9d18f8cb643e741aae694c4baee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD54132c54f59c529167c112e7f519120fa
SHA194cc9036fa031258aa744c7ee88e3c0b6c7a73da
SHA256e9f456cf8bb8cc4a683d1c2f792feeb4c83fff24a86e6bcb260eff8fbff126fb
SHA512e8efb8e81a90ffbe177301fbba4470ded104fc6d12cfa0123938b981d612eb2c4a66bb47b585cd43ed6ed4940e0ad5a1e3a5d9d18f8cb643e741aae694c4baee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD527bd1edd56ca98a0f658971fa9e46321
SHA19bc5de2830960ba8e6ee2726d1192b7068817d57
SHA2565cf5eda054ab1d98b51f5ab5877b90ea039d1123b2685b769317b9182970a761
SHA5129ce36663ad5133e84f64e66cb818163a62eeda6a25a9197a91d72dd0e9c4785240e4a6b03af121b597f33d47b1db0d2026671cf2cdb49e4cdf612205a452e767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5f23745acfa7a8d10073a0fa00664ac0b
SHA12c7c4da86bab839e780236f33b89ee023f7ed0ea
SHA2563b2b468b786dc9eced311ebcf9bdc6bfb21e3d53d1cb4ab4a8824373c82e4316
SHA5128923afde1c51912107b429a16d2e4165baaa4d334f802ac1dc2cc8cd6f00adb428d66ce30ecaf90367b4a5c2d8b40d090241284b5433d9908e27af8aa7db5211
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BB6E43F9-72CD-11ED-A0EE-CE8FEF2919E2}.dat
Filesize3KB
MD5868075149b0b72ef052688f8439c9330
SHA1a885991050b7a476b5862e9bab0bfeff1cd619f9
SHA256e004be014d6a6cfa353e92d0ccd7519fe89611735f0ed16f475451f5e679eb4f
SHA512eeb74ab2c470cdb51cf600599bb56b4fe8f82bfbaefa638849c702ea53574cde808396f0368a2ec2a3e6ad3bd8d3fef180fe03976fa4a8e29963abdcddd762ab
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BB70A6EE-72CD-11ED-A0EE-CE8FEF2919E2}.dat
Filesize5KB
MD5092476e0e95ce31eb5528668710e55b5
SHA199caf2672f404ae90a65145083435627b030192b
SHA256729c62e6a729ffc70eda704be3b6d602c8194f8477dd7ea12695b3f5cd0a5c23
SHA51264245e01df2224f2091ea550673032666c7905e553875ed325a93bc8fbd76dcbac8dcee1714edf6aaf4c3fd16027c994feb3eecdb1eeb8eaf13408bbd8941e5a
-
Filesize
97KB
MD511735bdb2ca8632f72da3e37052f40d2
SHA1abdd3678d3f9ad3751ef82c8912828802e3e565f
SHA2564b11aff6f8821fe3160c071f78db37c33226d163a4503678e2ffa1e96f37c86a
SHA51269f8b4ec629c0951c84bb7f118690c6bbdeaa0b24b2a9bccad6417e1eef983fb159a2872c9f2b020923074ea005cf03c2588a3533daf855b34217f2991c25ea7
-
Filesize
97KB
MD511735bdb2ca8632f72da3e37052f40d2
SHA1abdd3678d3f9ad3751ef82c8912828802e3e565f
SHA2564b11aff6f8821fe3160c071f78db37c33226d163a4503678e2ffa1e96f37c86a
SHA51269f8b4ec629c0951c84bb7f118690c6bbdeaa0b24b2a9bccad6417e1eef983fb159a2872c9f2b020923074ea005cf03c2588a3533daf855b34217f2991c25ea7
-
Filesize
19.7MB
MD56430600d3f47519135cd132e219164ff
SHA1466580f053f216afbed956b46096fd2edb985e17
SHA256786d74121b9c74494a619e53ad283b94b5dfa0fd97d7854854e12f397c4c9ec1
SHA512236f4a40319d320f4e5e405bae99936fc29861ae98e4000c5a116b709c5ebe3b79c2a09bd9d7cd8ed981441825cd1cfe00d0fcb16753c657550a6f90384fa154
-
Filesize
19.7MB
MD56430600d3f47519135cd132e219164ff
SHA1466580f053f216afbed956b46096fd2edb985e17
SHA256786d74121b9c74494a619e53ad283b94b5dfa0fd97d7854854e12f397c4c9ec1
SHA512236f4a40319d320f4e5e405bae99936fc29861ae98e4000c5a116b709c5ebe3b79c2a09bd9d7cd8ed981441825cd1cfe00d0fcb16753c657550a6f90384fa154
-
Filesize
52KB
MD5c19a9f52996c85527e500747a7d69749
SHA1ad867382e1f3696f1a46a577c62e49cbd3b03a14
SHA2561c335c6d63bdf8fc0382bca35a0da10b2b0d4f338f85e18189beab13c45a942b
SHA512e54323b141d813499b9e763de8df06870fa6a225d1403bd1bec49dc4a0996d11f53706bb6fe58a11f5dc639999a51a8f99d4241b54a1edaf75ba43a30dd78f12
-
Filesize
52KB
MD5c19a9f52996c85527e500747a7d69749
SHA1ad867382e1f3696f1a46a577c62e49cbd3b03a14
SHA2561c335c6d63bdf8fc0382bca35a0da10b2b0d4f338f85e18189beab13c45a942b
SHA512e54323b141d813499b9e763de8df06870fa6a225d1403bd1bec49dc4a0996d11f53706bb6fe58a11f5dc639999a51a8f99d4241b54a1edaf75ba43a30dd78f12