Analysis
-
max time kernel
152s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 14:39
Static task
static1
Behavioral task
behavioral1
Sample
c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe
Resource
win10v2004-20220812-en
General
-
Target
c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe
-
Size
733KB
-
MD5
8d785f76e225f71d7344a72ee1c7843d
-
SHA1
bcb8fb534ed3381140e9ecb9ee399890c6532ac2
-
SHA256
c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6
-
SHA512
c917f0a543ae8c640ad483fb709357fcf81b1f5a5a5d03fc49f502d41773ab52fbba6552db3ba88cf315b9918fd8caa1c6e419c26817923fdb6930f8b92af20d
-
SSDEEP
12288:D5OG17KmKCKHamcQ+HLwUVKQNC20O2baimSH50zkUALaUzWzu5SY/7+kPrMZ7u:DIG1BKCKHqQmLVKQNCBO2P50oIPY/C6h
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1788 filmtvdy.exe.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in System32 directory 59 IoCs
description ioc Process File created C:\Windows\SysWOW64\taobao.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\免费电影.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\kuaijie.bat c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\mm.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\systemok.vbs c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\腾讯QQ.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\yx.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\Internet Exporer.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\sy.reg c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\taobao.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\taobao.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\ico.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\qq.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\zq.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\FilmTVkk.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\激情爽片.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\免费电影.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\taobao.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\hosok.bat c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\Internet Explorer.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\systemok.vbs c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\yx.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\__tmp_rar_sfx_access_check_240561578 c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\systemkj.vbs c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\淘宝购物.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\yx.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\腾讯QQ.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\yx.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\zq.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\qq.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\sp.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\ss.reg c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\zq.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\createcs.vbs cmd.exe File opened for modification C:\Windows\SysWOW64\kuaijie.bat c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\systemkj.vbs c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\激情爽片.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\hosok.bat c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\ico.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\ss.reg c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\sy.reg c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\yx.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\createcs.vbs cmd.exe File created C:\Windows\SysWOW64\FilmTVkk.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\zq.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\zq.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\filmtvdy.exe.exe c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\FilmTVkk.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\Internet Exporer.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\filmtvdy.exe.exe c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\Internet Explorer.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\yx.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\淘宝购物.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\FilmTVkk.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\sp.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\zq.lnk c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File created C:\Windows\SysWOW64\mm.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\taobao.ico c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe File opened for modification C:\Windows\SysWOW64\taobao.url c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\3b04fc1b-c76d-4307-bab7-e8cef5ccab97.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221206180337.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\7832.com filmtvdy.exe.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total filmtvdy.exe.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DOMStorage\vod.7832.com filmtvdy.exe.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\7832.com\Total = "63" filmtvdy.exe.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch filmtvdy.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" filmtvdy.exe.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" filmtvdy.exe.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage filmtvdy.exe.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" filmtvdy.exe.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync filmtvdy.exe.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DOMStorage\7832.com filmtvdy.exe.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\GPU filmtvdy.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"6.2.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" filmtvdy.exe.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\vod.7832.com\ = "63" filmtvdy.exe.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\7832.com\NumberOfSubdomains = "1" filmtvdy.exe.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.vvyy.net/" regedit.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Runs .reg file with regedit 1 IoCs
pid Process 5056 regedit.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 3272 msedge.exe 3272 msedge.exe 3132 identity_helper.exe 3132 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 1788 filmtvdy.exe.exe 1788 filmtvdy.exe.exe 1788 filmtvdy.exe.exe 1788 filmtvdy.exe.exe 1788 filmtvdy.exe.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 1788 filmtvdy.exe.exe 1788 filmtvdy.exe.exe 1788 filmtvdy.exe.exe 1788 filmtvdy.exe.exe 1788 filmtvdy.exe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1788 filmtvdy.exe.exe 1788 filmtvdy.exe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 544 wrote to memory of 712 544 c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe 77 PID 544 wrote to memory of 712 544 c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe 77 PID 544 wrote to memory of 712 544 c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe 77 PID 712 wrote to memory of 1532 712 WScript.exe 78 PID 712 wrote to memory of 1532 712 WScript.exe 78 PID 712 wrote to memory of 1532 712 WScript.exe 78 PID 1532 wrote to memory of 2704 1532 cmd.exe 80 PID 1532 wrote to memory of 2704 1532 cmd.exe 80 PID 1532 wrote to memory of 2704 1532 cmd.exe 80 PID 1532 wrote to memory of 392 1532 cmd.exe 81 PID 1532 wrote to memory of 392 1532 cmd.exe 81 PID 1532 wrote to memory of 392 1532 cmd.exe 81 PID 1532 wrote to memory of 3132 1532 cmd.exe 82 PID 1532 wrote to memory of 3132 1532 cmd.exe 82 PID 1532 wrote to memory of 3132 1532 cmd.exe 82 PID 3132 wrote to memory of 3040 3132 rundll32.exe 83 PID 3132 wrote to memory of 3040 3132 rundll32.exe 83 PID 3132 wrote to memory of 3040 3132 rundll32.exe 83 PID 3040 wrote to memory of 808 3040 runonce.exe 84 PID 3040 wrote to memory of 808 3040 runonce.exe 84 PID 3040 wrote to memory of 808 3040 runonce.exe 84 PID 1532 wrote to memory of 740 1532 cmd.exe 86 PID 1532 wrote to memory of 740 1532 cmd.exe 86 PID 1532 wrote to memory of 740 1532 cmd.exe 86 PID 1532 wrote to memory of 5056 1532 cmd.exe 87 PID 1532 wrote to memory of 5056 1532 cmd.exe 87 PID 1532 wrote to memory of 5056 1532 cmd.exe 87 PID 1532 wrote to memory of 3272 1532 cmd.exe 88 PID 1532 wrote to memory of 3272 1532 cmd.exe 88 PID 1532 wrote to memory of 1788 1532 cmd.exe 90 PID 1532 wrote to memory of 1788 1532 cmd.exe 90 PID 1532 wrote to memory of 1788 1532 cmd.exe 90 PID 1532 wrote to memory of 3280 1532 cmd.exe 91 PID 1532 wrote to memory of 3280 1532 cmd.exe 91 PID 1532 wrote to memory of 3280 1532 cmd.exe 91 PID 1532 wrote to memory of 444 1532 cmd.exe 93 PID 1532 wrote to memory of 444 1532 cmd.exe 93 PID 1532 wrote to memory of 444 1532 cmd.exe 93 PID 3272 wrote to memory of 2180 3272 msedge.exe 95 PID 3272 wrote to memory of 2180 3272 msedge.exe 95 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 PID 3272 wrote to memory of 3976 3272 msedge.exe 98 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3280 attrib.exe 444 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe"C:\Users\Admin\AppData\Local\Temp\c420063487050c49f8adc8738d22cbecf369d5d91a8c4aa0a3d12d619d4c77d6.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\systemok.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\WINDOWS\system32\hosok.bat" "3⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu" /v "{871C5380-42A0-1069-A2EA-08002B30309D}" /t "REG_DWORD" /d "1" /f4⤵PID:2704
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel" /v "{871C5380-42A0-1069-A2EA-08002B30309D}" /t "REG_DWORD" /d "1" /f4⤵PID:392
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32 SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\TmpInf.inf4⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r5⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o6⤵PID:808
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\createcs.vbs"4⤵PID:740
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s sy.reg4⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Runs .reg file with regedit
PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.vvyy.net/?v24⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa068746f8,0x7ffa06874708,0x7ffa068747185⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:25⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:85⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:15⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:15⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4948 /prefetch:85⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:15⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:15⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5232 /prefetch:85⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:15⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:15⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:85⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings5⤵
- Drops file in Program Files directory
PID:4080 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7305b5460,0x7ff7305b5470,0x7ff7305b54806⤵PID:1068
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:15⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6580 /prefetch:15⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:15⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2132,9318723481124291410,11298538962139791574,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4604 /prefetch:85⤵PID:4580
-
-
-
C:\Windows\SysWOW64\filmtvdy.exe.exefilmtvdy.exe.exe4⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\╫└├µ\*.lnk" +R +S4⤵
- Views/modifies file attributes
PID:3280
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*.lnk" +R +S4⤵
- Views/modifies file attributes
PID:444
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58B
MD5ef482bb78b8fff6cf20ec2ff9a677a93
SHA17613c5c62b89e63dc686c0f4007c4a77a4a77335
SHA2567fc3b374408af4dac1e4c39fc1218c98cb692241fd2a753ed169627e70f1536d
SHA512b4f00ef86cf8fa09517eb09d16d448d45363b87973fe346b3b6b6e9c3c41e087ede8c1a9aa0934fc1abd4d0fb01b853ec501c3bca5483a539c8d28607fd45166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5b0a042e2e7b0e4ffd8774a10d2d4f418
SHA1dbe2ab9066f96c09be7a64f73107225f0cf022da
SHA2562b01d2c1cb508c48ceaf433f6cdef6d03ae47d2e474044863ef7a630976956d9
SHA5129374a25065761868869b396af3dda24e6f3cc3b071574df83d128819164f528aab81d5b9ecb9f16d5612e3f00472ad47d7e138b9615ba188895be83b2d7b7960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5357759af3d3dca505c9625553e9ca4ae
SHA161b960445a1a33636b53b4f9796e5641271ad050
SHA256901ce4b0b2740e54f9274464ed3fb35a3200693e10bacd0f57184faface760ab
SHA512369c96bfe2dc9a57109e7caaa3fa27351b3a80f9ead3cc444a85aa93c4180bc76ad2851bca73fa8ee15d7860abcf80197130eafcb94fcd99a530260cb2079e7a
-
Filesize
750B
MD5b9f15477397d9f3ae25c17e4b2dd3cee
SHA16e3fd0d8bae6f821050f41bda9f8cb875085e311
SHA256b17d6cda34f2a70222343052d6191d38a93dc2341b84592c9051272ebb8da89d
SHA512bb4231db0aa11c48d51e709d565636c02f324c19d1a5fa88c62f3c700deb4bfff78f3a4c3d7351734476a2c9631157e9fee66cf573fc5e68cfacd7c154c44f94
-
C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\╞⌠╢» Internet Explorrer Σ»└└╞≈.lnk
Filesize793B
MD5b9b3f37909df0306280446af2ae0295e
SHA131893a8359176fc271ce7cfd1c697bbcc17de2c5
SHA256018e9ad135e3ac0ec7257a87a70eb912a6b042bcc53245b43448783a655f5876
SHA51246455b232759fd64edf2a6553d86242da8d6329ee7140ce40b27fbf50c9a1bbd459f36098a92ef36bcc5911c5c068cddef00f9b27c50d89fb27169bd70a7b5a3
-
Filesize
1KB
MD5c323e59b3ee8e4df72521695e237fd5a
SHA19ab2591e5e89dea89dc7c0ebd369cba10edfc881
SHA256e69e08efa66dd6b9c2f2b38798309e46a08441daf6d774f03f4af2c75f90ce9f
SHA5122fdd32eccde68504d814dea85ee44f82cb7d52d912936664bd787931fbca3f03a05c54e9fe91e9c6c07743b3144dcf7b1865f5b21986a231c1da043af47c9784
-
Filesize
3KB
MD5d66655961b12484eff9fbfb44f24376e
SHA17babd1d68980c4ed67cfe5a57710b44191beefae
SHA2567709c6e9f9b561d77a638e3c7eddd28c78c214e0afaea0e140d747ec62b14bb9
SHA5125dfd4c638f6f3431e934c1f463cd9dbc176c7282975b334e02be667524b63044f92e186e3267195e6e2b245f18ed150b1239142d3519c7441f74c7b29c7cc96e
-
Filesize
750B
MD5b9f15477397d9f3ae25c17e4b2dd3cee
SHA16e3fd0d8bae6f821050f41bda9f8cb875085e311
SHA256b17d6cda34f2a70222343052d6191d38a93dc2341b84592c9051272ebb8da89d
SHA512bb4231db0aa11c48d51e709d565636c02f324c19d1a5fa88c62f3c700deb4bfff78f3a4c3d7351734476a2c9631157e9fee66cf573fc5e68cfacd7c154c44f94
-
Filesize
793B
MD5b9b3f37909df0306280446af2ae0295e
SHA131893a8359176fc271ce7cfd1c697bbcc17de2c5
SHA256018e9ad135e3ac0ec7257a87a70eb912a6b042bcc53245b43448783a655f5876
SHA51246455b232759fd64edf2a6553d86242da8d6329ee7140ce40b27fbf50c9a1bbd459f36098a92ef36bcc5911c5c068cddef00f9b27c50d89fb27169bd70a7b5a3
-
Filesize
793B
MD5b9b3f37909df0306280446af2ae0295e
SHA131893a8359176fc271ce7cfd1c697bbcc17de2c5
SHA256018e9ad135e3ac0ec7257a87a70eb912a6b042bcc53245b43448783a655f5876
SHA51246455b232759fd64edf2a6553d86242da8d6329ee7140ce40b27fbf50c9a1bbd459f36098a92ef36bcc5911c5c068cddef00f9b27c50d89fb27169bd70a7b5a3
-
Filesize
468B
MD533bbb14d4da349dbc6b31ea38b41ff52
SHA1301fc96ff9d7b44a853c84435278027eeac44209
SHA256ac3c2df4f0254f3df34bfd773af30d55220f1e82d937ad1a60d6d7301b1cbe95
SHA5123c054e2ab74493667452909590b60237346a1526227cba2390d8d61477c5d1077c832b41f8a217b791598f6361604322874f6ada26a45beece11b26e5282fa69
-
Filesize
1.3MB
MD54ec2c2cfeef1af870a02e8aa00fc3363
SHA1b2262ee0e7d5daa11b017b26c10ae118efb7c6f2
SHA2565851378994d31c78eff09b3f22af8959d4c660f5fb7da33dc4b9d83b04056cb7
SHA5121a6438436822616bc58d2a34a0b406e6f42a09d9defce14f3e06d35e6035347dc4e9213926cdc72571fa536debe950f69272db87d51e8fb1347e395b0fb14bec
-
Filesize
1.3MB
MD54ec2c2cfeef1af870a02e8aa00fc3363
SHA1b2262ee0e7d5daa11b017b26c10ae118efb7c6f2
SHA2565851378994d31c78eff09b3f22af8959d4c660f5fb7da33dc4b9d83b04056cb7
SHA5121a6438436822616bc58d2a34a0b406e6f42a09d9defce14f3e06d35e6035347dc4e9213926cdc72571fa536debe950f69272db87d51e8fb1347e395b0fb14bec
-
Filesize
136B
MD527aab962f791e0e80d20c2051b9a03ba
SHA18f64172827ad5da7b76b2f29503dad89849904c8
SHA256a26b4beb8ec1587564d9682b0ee02e5292c030760c1de3003a092dc13c8e2a8d
SHA512fe18f2ab6ed4d9acbfcd5debc5b92e4928e3b901deb4c262a31d40bae7b846959461844baca7bcbfb0246bc7a70f03c73fe0f9846c7030061262bfc1385d7d1a
-
Filesize
67B
MD5f03e7702a11c470021bcddc98a64b383
SHA1694e8b23752071e2892cf881b41627cb5db67517
SHA256cdcbdd321373c5897e3d8d14ba5604ae53c259f06de4f65cd6953339838a19f8
SHA512357be3b87ac7576fd2f7a72d3ee911104b8cfb6cf709ce11b8e02043b9e10349247731e7abeac3a9d10d20d31fe0632cb67cdca5fe6e1aa397b76436a5b886a2
-
Filesize
1KB
MD5b1f1a9b43438c78d39e1dcb3968a029e
SHA19601901ef6f97b1d67aaa797626428c1a9811763
SHA25664181c2268f0c8b90c4035824c6e71fbe4ff42ada68f2ce5d46511e5e612ab1a
SHA512d4a4bd29901a0df073386c021486d472d9dd8648216d069d9f567a586c63fa59e824e96ddb179f08e4b44faa97711f9b3b3978591df58cdb66d598d248cab664
-
Filesize
1KB
MD5c323e59b3ee8e4df72521695e237fd5a
SHA19ab2591e5e89dea89dc7c0ebd369cba10edfc881
SHA256e69e08efa66dd6b9c2f2b38798309e46a08441daf6d774f03f4af2c75f90ce9f
SHA5122fdd32eccde68504d814dea85ee44f82cb7d52d912936664bd787931fbca3f03a05c54e9fe91e9c6c07743b3144dcf7b1865f5b21986a231c1da043af47c9784