Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe
Resource
win10v2004-20220812-en
General
-
Target
c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe
-
Size
733KB
-
MD5
8d785f76e225f71d7344a72ee1c7843d
-
SHA1
bcb8fb534ed3381140e9ecb9ee399890c6532ac2
-
SHA256
c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6
-
SHA512
c917f0a543ae8c640ad483fb709357fcf81b1f5a5a5d03fc49f502d41773ab52fbba6552db3ba88cf315b9918fd8caa1c6e419c26817923fdb6930f8b92af20d
-
SSDEEP
12288:D5OG17KmKCKHamcQ+HLwUVKQNC20O2baimSH50zkUALaUzWzu5SY/7+kPrMZ7u:DIG1BKCKHqQmLVKQNCBO2P50oIPY/C6h
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2032 filmtvdy.exe.exe -
Loads dropped DLL 2 IoCs
pid Process 1984 cmd.exe 1984 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Drops file in System32 directory 59 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\systemkj.vbs c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\taobao.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\yx.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\zq.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\sp.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\yx.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\FilmTVkk.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\hosok.bat c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\ss.reg c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\mm.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\taobao.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\zq.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\激情爽片.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\yx.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\zq.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\systemkj.vbs c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\激情爽片.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\createcs.vbs cmd.exe File created C:\Windows\SysWOW64\hosok.bat c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\Internet Explorer.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\腾讯QQ.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\zq.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\Internet Exporer.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\Internet Exporer.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\sy.reg c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\yx.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\yx.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\zq.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\qq.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\ss.reg c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\taobao.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\淘宝购物.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\taobao.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\taobao.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\FilmTVkk.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\Internet Explorer.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\kuaijie.bat c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\sp.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\systemok.vbs c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\qq.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\免费电影.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\yx.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\createcs.vbs cmd.exe File created C:\Windows\SysWOW64\kuaijie.bat c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\systemok.vbs c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\腾讯QQ.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\filmtvdy.exe.exe c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\FilmTVkk.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\ico.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\免费电影.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\ico.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\mm.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\sy.reg c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\taobao.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\淘宝购物.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\zq.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\__tmp_rar_sfx_access_check_7082382 c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\filmtvdy.exe.exe c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\FilmTVkk.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\7832.com\NumberOfSubdomains = "1" filmtvdy.exe.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000007af2b02c0fce14e9c4e789927d5446500000000020000000000106600000001000020000000c318eb8b41daa8708466f031c24646fc21e8be0a69f8a62705c7481f5754f65b000000000e8000000002000020000000c989962948de00a074f5759a05fe2ae9941179e80ea08b6820a24c5b6ecf187820000000f90f4185071a8b37b8e3cc82f45aa7c15a2dbe0c87646a2ac76ad8e86e3594f740000000be54ddf0be9f56282089154027317174d1c40e4f5d2a2df3edcc387a9f4a3e11c0be4853f5e57975ac001b2d1252453652d5ba732c0051053ed68bec90df9cc8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000007af2b02c0fce14e9c4e789927d5446500000000020000000000106600000001000020000000158c66d50e1bd896ecdc3b657078a0097bae3b484c5b71b21f0a2d2fb9d8bf12000000000e80000000020000200000003c205b65832926a33425eac9b0592534682ed2ab91b1b30c0125949196707ed09000000056db8fb37a707adfe502027dd38cd16acaa536f6da28d8a20e0b35b925745fb15df6220d9f6c6df784b6f8091c9a55686cd2367a039874cb77e67df19db6b0b2f2fbfbccde8f390c28e29ee365cd3f0d2a98f070d4b533bfdf4db256c5efa36ecb6740b1446dbd1ad73521b041dfca19c25af5ed6912c3b21cd82c2e5432fd1c6bd890899090edaf4f90d3c599b2f60540000000b324f0f24df91032cc2b871fd2b3bec7b94a3852920570b95ca3f61667eeb95eb69ae2032a36e9ab236fb63dd987ac0e303a328879eeae525f49b65ba8550825 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\vod.7832.com\ = "63" filmtvdy.exe.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\7832.com filmtvdy.exe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" filmtvdy.exe.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch filmtvdy.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" filmtvdy.exe.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4AD9C6C1-7590-11ED-965B-E20468906380} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\vod.7832.com filmtvdy.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\7832.com\Total = "63" filmtvdy.exe.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main regedit.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377114797" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage filmtvdy.exe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f0f8369d09d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main filmtvdy.exe.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total filmtvdy.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.vvyy.net/" regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1324 regedit.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 984 rundll32.exe Token: SeRestorePrivilege 984 rundll32.exe Token: SeRestorePrivilege 984 rundll32.exe Token: SeRestorePrivilege 984 rundll32.exe Token: SeRestorePrivilege 984 rundll32.exe Token: SeRestorePrivilege 984 rundll32.exe Token: SeRestorePrivilege 984 rundll32.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2032 filmtvdy.exe.exe 2032 filmtvdy.exe.exe 2032 filmtvdy.exe.exe 2032 filmtvdy.exe.exe 2032 filmtvdy.exe.exe 512 iexplore.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2032 filmtvdy.exe.exe 2032 filmtvdy.exe.exe 2032 filmtvdy.exe.exe 2032 filmtvdy.exe.exe 2032 filmtvdy.exe.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 filmtvdy.exe.exe 2032 filmtvdy.exe.exe 512 iexplore.exe 512 iexplore.exe 892 IEXPLORE.EXE 892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 900 wrote to memory of 1920 900 c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe 27 PID 900 wrote to memory of 1920 900 c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe 27 PID 900 wrote to memory of 1920 900 c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe 27 PID 900 wrote to memory of 1920 900 c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe 27 PID 1920 wrote to memory of 1984 1920 WScript.exe 29 PID 1920 wrote to memory of 1984 1920 WScript.exe 29 PID 1920 wrote to memory of 1984 1920 WScript.exe 29 PID 1920 wrote to memory of 1984 1920 WScript.exe 29 PID 1984 wrote to memory of 1288 1984 cmd.exe 30 PID 1984 wrote to memory of 1288 1984 cmd.exe 30 PID 1984 wrote to memory of 1288 1984 cmd.exe 30 PID 1984 wrote to memory of 1288 1984 cmd.exe 30 PID 1984 wrote to memory of 944 1984 cmd.exe 31 PID 1984 wrote to memory of 944 1984 cmd.exe 31 PID 1984 wrote to memory of 944 1984 cmd.exe 31 PID 1984 wrote to memory of 944 1984 cmd.exe 31 PID 1984 wrote to memory of 984 1984 cmd.exe 32 PID 1984 wrote to memory of 984 1984 cmd.exe 32 PID 1984 wrote to memory of 984 1984 cmd.exe 32 PID 1984 wrote to memory of 984 1984 cmd.exe 32 PID 1984 wrote to memory of 984 1984 cmd.exe 32 PID 1984 wrote to memory of 984 1984 cmd.exe 32 PID 1984 wrote to memory of 984 1984 cmd.exe 32 PID 984 wrote to memory of 584 984 rundll32.exe 33 PID 984 wrote to memory of 584 984 rundll32.exe 33 PID 984 wrote to memory of 584 984 rundll32.exe 33 PID 984 wrote to memory of 584 984 rundll32.exe 33 PID 584 wrote to memory of 520 584 runonce.exe 34 PID 584 wrote to memory of 520 584 runonce.exe 34 PID 584 wrote to memory of 520 584 runonce.exe 34 PID 584 wrote to memory of 520 584 runonce.exe 34 PID 1984 wrote to memory of 1528 1984 cmd.exe 36 PID 1984 wrote to memory of 1528 1984 cmd.exe 36 PID 1984 wrote to memory of 1528 1984 cmd.exe 36 PID 1984 wrote to memory of 1528 1984 cmd.exe 36 PID 1984 wrote to memory of 1324 1984 cmd.exe 37 PID 1984 wrote to memory of 1324 1984 cmd.exe 37 PID 1984 wrote to memory of 1324 1984 cmd.exe 37 PID 1984 wrote to memory of 1324 1984 cmd.exe 37 PID 1984 wrote to memory of 512 1984 cmd.exe 38 PID 1984 wrote to memory of 512 1984 cmd.exe 38 PID 1984 wrote to memory of 512 1984 cmd.exe 38 PID 1984 wrote to memory of 512 1984 cmd.exe 38 PID 1984 wrote to memory of 2032 1984 cmd.exe 39 PID 1984 wrote to memory of 2032 1984 cmd.exe 39 PID 1984 wrote to memory of 2032 1984 cmd.exe 39 PID 1984 wrote to memory of 2032 1984 cmd.exe 39 PID 1984 wrote to memory of 816 1984 cmd.exe 40 PID 1984 wrote to memory of 816 1984 cmd.exe 40 PID 1984 wrote to memory of 816 1984 cmd.exe 40 PID 1984 wrote to memory of 816 1984 cmd.exe 40 PID 1984 wrote to memory of 916 1984 cmd.exe 41 PID 1984 wrote to memory of 916 1984 cmd.exe 41 PID 1984 wrote to memory of 916 1984 cmd.exe 41 PID 1984 wrote to memory of 916 1984 cmd.exe 41 PID 512 wrote to memory of 892 512 iexplore.exe 43 PID 512 wrote to memory of 892 512 iexplore.exe 43 PID 512 wrote to memory of 892 512 iexplore.exe 43 PID 512 wrote to memory of 892 512 iexplore.exe 43 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 816 attrib.exe 916 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe"C:\Users\Admin\AppData\Local\Temp\c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\systemok.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\WINDOWS\system32\hosok.bat" "3⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu" /v "{871C5380-42A0-1069-A2EA-08002B30309D}" /t "REG_DWORD" /d "1" /f4⤵PID:1288
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel" /v "{871C5380-42A0-1069-A2EA-08002B30309D}" /t "REG_DWORD" /d "1" /f4⤵PID:944
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32 SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\TmpInf.inf4⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r5⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o6⤵PID:520
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\createcs.vbs"4⤵PID:1528
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s sy.reg4⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Runs .reg file with regedit
PID:1324
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.vvyy.net/?v24⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:512 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:892
-
-
-
C:\Windows\SysWOW64\filmtvdy.exe.exefilmtvdy.exe.exe4⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\╫└├µ\*.lnk" +R +S4⤵
- Views/modifies file attributes
PID:816
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*.lnk" +R +S4⤵
- Views/modifies file attributes
PID:916
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58B
MD5ef482bb78b8fff6cf20ec2ff9a677a93
SHA17613c5c62b89e63dc686c0f4007c4a77a4a77335
SHA2567fc3b374408af4dac1e4c39fc1218c98cb692241fd2a753ed169627e70f1536d
SHA512b4f00ef86cf8fa09517eb09d16d448d45363b87973fe346b3b6b6e9c3c41e087ede8c1a9aa0934fc1abd4d0fb01b853ec501c3bca5483a539c8d28607fd45166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5a702797d4d28437ec645efcf2de31df9
SHA10a6a3fcb80ebf9c1bdc31b38df244b62f2d88ddb
SHA256a912d9002b06460bfc0f420547d82ba030f4ec379b91c49e77a9babf92f83ea7
SHA5126a12e991375a06bbc491b220b73fb0c2be00db6f438b1876884dd429cf31f6239e023ae3ca58c29d5093c91a937af310bfd14192eacab853bde638fc5fe5c1b4
-
Filesize
603B
MD5b543183a68a0fbfef5be2ec0622dff03
SHA17688b2198fff840f92fa82c35dd992f986098b70
SHA256c14c5651ca48c3f319dcea92e168061536958b7e99d7f4d9c63c6abf0c315b41
SHA5127c6839c094cbf7221d47b00ab18fe879225c8d06cd68c43e0e995b961323cb5ae79587330df9e60f8632956287023b83871f7f746ba5e5dc25c7adcb123d731e
-
Filesize
750B
MD5b9f15477397d9f3ae25c17e4b2dd3cee
SHA16e3fd0d8bae6f821050f41bda9f8cb875085e311
SHA256b17d6cda34f2a70222343052d6191d38a93dc2341b84592c9051272ebb8da89d
SHA512bb4231db0aa11c48d51e709d565636c02f324c19d1a5fa88c62f3c700deb4bfff78f3a4c3d7351734476a2c9631157e9fee66cf573fc5e68cfacd7c154c44f94
-
C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\╞⌠╢» Internet Explorrer Σ»└└╞≈.lnk
Filesize793B
MD5b9b3f37909df0306280446af2ae0295e
SHA131893a8359176fc271ce7cfd1c697bbcc17de2c5
SHA256018e9ad135e3ac0ec7257a87a70eb912a6b042bcc53245b43448783a655f5876
SHA51246455b232759fd64edf2a6553d86242da8d6329ee7140ce40b27fbf50c9a1bbd459f36098a92ef36bcc5911c5c068cddef00f9b27c50d89fb27169bd70a7b5a3
-
Filesize
1KB
MD5c323e59b3ee8e4df72521695e237fd5a
SHA19ab2591e5e89dea89dc7c0ebd369cba10edfc881
SHA256e69e08efa66dd6b9c2f2b38798309e46a08441daf6d774f03f4af2c75f90ce9f
SHA5122fdd32eccde68504d814dea85ee44f82cb7d52d912936664bd787931fbca3f03a05c54e9fe91e9c6c07743b3144dcf7b1865f5b21986a231c1da043af47c9784
-
Filesize
3KB
MD5d66655961b12484eff9fbfb44f24376e
SHA17babd1d68980c4ed67cfe5a57710b44191beefae
SHA2567709c6e9f9b561d77a638e3c7eddd28c78c214e0afaea0e140d747ec62b14bb9
SHA5125dfd4c638f6f3431e934c1f463cd9dbc176c7282975b334e02be667524b63044f92e186e3267195e6e2b245f18ed150b1239142d3519c7441f74c7b29c7cc96e
-
Filesize
750B
MD5b9f15477397d9f3ae25c17e4b2dd3cee
SHA16e3fd0d8bae6f821050f41bda9f8cb875085e311
SHA256b17d6cda34f2a70222343052d6191d38a93dc2341b84592c9051272ebb8da89d
SHA512bb4231db0aa11c48d51e709d565636c02f324c19d1a5fa88c62f3c700deb4bfff78f3a4c3d7351734476a2c9631157e9fee66cf573fc5e68cfacd7c154c44f94
-
Filesize
793B
MD5b9b3f37909df0306280446af2ae0295e
SHA131893a8359176fc271ce7cfd1c697bbcc17de2c5
SHA256018e9ad135e3ac0ec7257a87a70eb912a6b042bcc53245b43448783a655f5876
SHA51246455b232759fd64edf2a6553d86242da8d6329ee7140ce40b27fbf50c9a1bbd459f36098a92ef36bcc5911c5c068cddef00f9b27c50d89fb27169bd70a7b5a3
-
Filesize
793B
MD5b9b3f37909df0306280446af2ae0295e
SHA131893a8359176fc271ce7cfd1c697bbcc17de2c5
SHA256018e9ad135e3ac0ec7257a87a70eb912a6b042bcc53245b43448783a655f5876
SHA51246455b232759fd64edf2a6553d86242da8d6329ee7140ce40b27fbf50c9a1bbd459f36098a92ef36bcc5911c5c068cddef00f9b27c50d89fb27169bd70a7b5a3
-
Filesize
468B
MD533bbb14d4da349dbc6b31ea38b41ff52
SHA1301fc96ff9d7b44a853c84435278027eeac44209
SHA256ac3c2df4f0254f3df34bfd773af30d55220f1e82d937ad1a60d6d7301b1cbe95
SHA5123c054e2ab74493667452909590b60237346a1526227cba2390d8d61477c5d1077c832b41f8a217b791598f6361604322874f6ada26a45beece11b26e5282fa69
-
Filesize
1.3MB
MD54ec2c2cfeef1af870a02e8aa00fc3363
SHA1b2262ee0e7d5daa11b017b26c10ae118efb7c6f2
SHA2565851378994d31c78eff09b3f22af8959d4c660f5fb7da33dc4b9d83b04056cb7
SHA5121a6438436822616bc58d2a34a0b406e6f42a09d9defce14f3e06d35e6035347dc4e9213926cdc72571fa536debe950f69272db87d51e8fb1347e395b0fb14bec
-
Filesize
1.3MB
MD54ec2c2cfeef1af870a02e8aa00fc3363
SHA1b2262ee0e7d5daa11b017b26c10ae118efb7c6f2
SHA2565851378994d31c78eff09b3f22af8959d4c660f5fb7da33dc4b9d83b04056cb7
SHA5121a6438436822616bc58d2a34a0b406e6f42a09d9defce14f3e06d35e6035347dc4e9213926cdc72571fa536debe950f69272db87d51e8fb1347e395b0fb14bec
-
Filesize
136B
MD527aab962f791e0e80d20c2051b9a03ba
SHA18f64172827ad5da7b76b2f29503dad89849904c8
SHA256a26b4beb8ec1587564d9682b0ee02e5292c030760c1de3003a092dc13c8e2a8d
SHA512fe18f2ab6ed4d9acbfcd5debc5b92e4928e3b901deb4c262a31d40bae7b846959461844baca7bcbfb0246bc7a70f03c73fe0f9846c7030061262bfc1385d7d1a
-
Filesize
67B
MD5f03e7702a11c470021bcddc98a64b383
SHA1694e8b23752071e2892cf881b41627cb5db67517
SHA256cdcbdd321373c5897e3d8d14ba5604ae53c259f06de4f65cd6953339838a19f8
SHA512357be3b87ac7576fd2f7a72d3ee911104b8cfb6cf709ce11b8e02043b9e10349247731e7abeac3a9d10d20d31fe0632cb67cdca5fe6e1aa397b76436a5b886a2
-
Filesize
1KB
MD5b1f1a9b43438c78d39e1dcb3968a029e
SHA19601901ef6f97b1d67aaa797626428c1a9811763
SHA25664181c2268f0c8b90c4035824c6e71fbe4ff42ada68f2ce5d46511e5e612ab1a
SHA512d4a4bd29901a0df073386c021486d472d9dd8648216d069d9f567a586c63fa59e824e96ddb179f08e4b44faa97711f9b3b3978591df58cdb66d598d248cab664
-
Filesize
1KB
MD5c323e59b3ee8e4df72521695e237fd5a
SHA19ab2591e5e89dea89dc7c0ebd369cba10edfc881
SHA256e69e08efa66dd6b9c2f2b38798309e46a08441daf6d774f03f4af2c75f90ce9f
SHA5122fdd32eccde68504d814dea85ee44f82cb7d52d912936664bd787931fbca3f03a05c54e9fe91e9c6c07743b3144dcf7b1865f5b21986a231c1da043af47c9784
-
Filesize
1.3MB
MD54ec2c2cfeef1af870a02e8aa00fc3363
SHA1b2262ee0e7d5daa11b017b26c10ae118efb7c6f2
SHA2565851378994d31c78eff09b3f22af8959d4c660f5fb7da33dc4b9d83b04056cb7
SHA5121a6438436822616bc58d2a34a0b406e6f42a09d9defce14f3e06d35e6035347dc4e9213926cdc72571fa536debe950f69272db87d51e8fb1347e395b0fb14bec
-
Filesize
1.3MB
MD54ec2c2cfeef1af870a02e8aa00fc3363
SHA1b2262ee0e7d5daa11b017b26c10ae118efb7c6f2
SHA2565851378994d31c78eff09b3f22af8959d4c660f5fb7da33dc4b9d83b04056cb7
SHA5121a6438436822616bc58d2a34a0b406e6f42a09d9defce14f3e06d35e6035347dc4e9213926cdc72571fa536debe950f69272db87d51e8fb1347e395b0fb14bec