Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe
Resource
win10v2004-20221111-en
General
-
Target
a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe
-
Size
1.5MB
-
MD5
c4d112b122745f2edfd1d2840ade624a
-
SHA1
8393a23ca04408c150df5cf43b72c950fd75edcb
-
SHA256
a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572
-
SHA512
aa64a51421440a2b7cfd9110977e26a8f9cf8f41c8e8e5172f430e110dad0df3260d611216a8bfa215d4e44e20c9d31ba24d347bd668398512d9560470334a2c
-
SSDEEP
24576:ZBrr/4p6qO4pDlPJsZtZQk5p8hulbEwfDpBzjRvdsxlTShiVPDvE:rv/4Qf4pxPctqG8IllnxvdsxZ4U7M
Malware Config
Signatures
-
Loads dropped DLL 10 IoCs
pid Process 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File created C:\Program Files (x86)\jishu_251811\sc\²ÊƱ¿ª½±²éѯ-ÔÚÏßÂò²ÊƱ.url a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File opened for modification C:\Program Files (x86)\jishu_251811\jishu_251811.ini a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\soft251811\CoralExplorer_200402.exe a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\jishu_251811\FlashIcon.ico a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\jishu_251811\ImgCache\www.2144.net_favicon.ico a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\jishu_251811\sc\ÍøÉϹºÎïÍøÖ·´óÈ«-Íø¹ºµÚÒ»Õ¾.url a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\soft251811\B_1120111106111122181125111111.txt a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\soft251811\seemaos_setup_BC21.exe a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\jishu_251811\newnew.exe a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\jishu_251811\sc\ÿÌìÍŹºÒ»ÏÂ-¾Û±ãÒË.url a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\soft251811\a a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\soft251811\1120111106111122181125111111.txt a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\soft251811\guoguo_251811.exe a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\soft251811\wl06079.exe a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\jishu_251811\newnew.ini a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\jishu_251811\sc\»Æ¹ÏµçÓ°Íø-ÔÚÏßµçÓ°.url a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\jishu_251811\sc\2144СÓÎÏ·--³¬¼¶ºÃÍ棬ÀֺǺÇ.url a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\jishu_251811\sc\GoogleËÑË÷.url a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\soft251811\pipi_dae_381.exe a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\jishu_251811\dailytips.ini a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe File created C:\Program Files (x86)\jishu_251811\sc\126ÍøÖ·´óÈ«ÉÏÍø×î·½±ã.url a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{522FB271-797A-11ED-8B07-42F1C931D1AB} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377545187" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5239EBA1-797A-11ED-8B07-42F1C931D1AB} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da000000000200000000001066000000010000200000000d088da75f5e70797b88aa532b6d54744d563b84c0cb406c2f8e2042af422633000000000e8000000002000020000000838f89c65e65280aeaed0a0e819e642c932ae579ae7484d00d6d3bf9a4aa35bc200000004c380dfb9bbc9e77c59e639787b2e3b6905a02c2f1c64eee33c26b4858312ec940000000e4444298b3fbb5bc791e38ca980789c1d2afb0b4c4dd798e9cdd87c0212a2c35b411e6d4c49b74df289750a7739cac77dec50e0cdaaa3a1d0fd706f342a66b0d IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5057f94e870dd901 IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1128 IEXPLORE.EXE 1348 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1348 IEXPLORE.EXE 1348 IEXPLORE.EXE 1128 IEXPLORE.EXE 1128 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 856 wrote to memory of 1392 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 28 PID 856 wrote to memory of 1392 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 28 PID 856 wrote to memory of 1392 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 28 PID 856 wrote to memory of 1392 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 28 PID 856 wrote to memory of 1392 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 28 PID 856 wrote to memory of 1392 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 28 PID 856 wrote to memory of 1392 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 28 PID 1392 wrote to memory of 1348 1392 IEXPLORE.EXE 29 PID 1392 wrote to memory of 1348 1392 IEXPLORE.EXE 29 PID 1392 wrote to memory of 1348 1392 IEXPLORE.EXE 29 PID 1392 wrote to memory of 1348 1392 IEXPLORE.EXE 29 PID 856 wrote to memory of 1224 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 30 PID 856 wrote to memory of 1224 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 30 PID 856 wrote to memory of 1224 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 30 PID 856 wrote to memory of 1224 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 30 PID 856 wrote to memory of 1224 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 30 PID 856 wrote to memory of 1224 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 30 PID 856 wrote to memory of 1224 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 30 PID 1224 wrote to memory of 1128 1224 IEXPLORE.EXE 31 PID 1224 wrote to memory of 1128 1224 IEXPLORE.EXE 31 PID 1224 wrote to memory of 1128 1224 IEXPLORE.EXE 31 PID 1224 wrote to memory of 1128 1224 IEXPLORE.EXE 31 PID 856 wrote to memory of 1928 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 33 PID 856 wrote to memory of 1928 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 33 PID 856 wrote to memory of 1928 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 33 PID 856 wrote to memory of 1928 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 33 PID 856 wrote to memory of 1928 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 33 PID 856 wrote to memory of 1928 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 33 PID 856 wrote to memory of 1928 856 a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe 33 PID 1348 wrote to memory of 1696 1348 IEXPLORE.EXE 35 PID 1348 wrote to memory of 1696 1348 IEXPLORE.EXE 35 PID 1348 wrote to memory of 1696 1348 IEXPLORE.EXE 35 PID 1348 wrote to memory of 1696 1348 IEXPLORE.EXE 35 PID 1348 wrote to memory of 1696 1348 IEXPLORE.EXE 35 PID 1348 wrote to memory of 1696 1348 IEXPLORE.EXE 35 PID 1348 wrote to memory of 1696 1348 IEXPLORE.EXE 35 PID 1128 wrote to memory of 1716 1128 IEXPLORE.EXE 34 PID 1128 wrote to memory of 1716 1128 IEXPLORE.EXE 34 PID 1128 wrote to memory of 1716 1128 IEXPLORE.EXE 34 PID 1128 wrote to memory of 1716 1128 IEXPLORE.EXE 34 PID 1128 wrote to memory of 1716 1128 IEXPLORE.EXE 34 PID 1128 wrote to memory of 1716 1128 IEXPLORE.EXE 34 PID 1128 wrote to memory of 1716 1128 IEXPLORE.EXE 34 PID 1928 wrote to memory of 1748 1928 Wscript.exe 37 PID 1928 wrote to memory of 1748 1928 Wscript.exe 37 PID 1928 wrote to memory of 1748 1928 Wscript.exe 37 PID 1928 wrote to memory of 1748 1928 Wscript.exe 37 PID 1928 wrote to memory of 1748 1928 Wscript.exe 37 PID 1928 wrote to memory of 1748 1928 Wscript.exe 37 PID 1928 wrote to memory of 1748 1928 Wscript.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe"C:\Users\Admin\AppData\Local\Temp\a9373762aae59bab9ed837cba6b3df80c5d200831f1eb9c79701af4aad723572.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm2⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1348 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://taourl.com/6jb4v2⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://taourl.com/6jb4v3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1128 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
-
-
C:\Windows\SysWOW64\Wscript.exe"C:\Windows\system32\Wscript" "C:\Program Files (x86)\soft251811\b_2511.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\soft251811\300.bat" "3⤵PID:1748
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5269ca4bcff76c416808ff1e5472e2bbe
SHA17d9cea09d6d5633ecb89817ac046aec056a30ee1
SHA25653c02fd73eb05e0cd4153fe10db550f9fdd3ab4f0563d7289830efaaeee54de0
SHA5128ec7284889022829f521bc99ddafff641c33129854e9fb4941fe6ec8ad85d1ac2e52e39012ea84f99250c5b493dd04413ae8e152f4bfe06802371d75e89ce84b
-
Filesize
348B
MD52a843158e18cff58acbd98aa49574b08
SHA1fdf78e410b1d98a7856a7114add6f1150c69bc48
SHA256c2b28114de4c4967df161de3583671bbdbb0da60724eb79b6794137da987359d
SHA5122cdb0e9829113b65b3b51c71fc9090e5c0c0147c50e5cd5a419d87e1d60de0032f061db21700e550a62660a9dc11695961c46bf637cadea46d817b175d2a518c
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ce25af948e41f972f8d717724242bc
SHA159799a3051420eed7f86ee0edecfeae041a6ff9f
SHA256437da11fd69b86e074e0cb47397981aa273955e151d2459c6053230e3ca7e5eb
SHA512cc203583fdda5d64941e9760e668e15968d155853f810db4ed8296263544c39c5f5d54056a2af22ba257e8fd88bac83de2986803c8de8acfbb96a7d3124f444b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{522FB271-797A-11ED-8B07-42F1C931D1AB}.dat
Filesize3KB
MD5e926b418689f5b0a1e5762c8bcec1de4
SHA129e8586cc0dcb702482d4d7c2ad7316f0cc8084d
SHA256cbdc02ca71a40ae713f7cfc9a74fc41ad86b016293f1882dcafe5b551cbb8db2
SHA5127099b8008e317bf770de92e9ad56ccb02640764ce91855b2455ed5fe0f78df7adc72391943a8b17d635122be506e1eb01f072ad49b3b6f4ac8d05d9c471f3a60
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5239EBA1-797A-11ED-8B07-42F1C931D1AB}.dat
Filesize3KB
MD5c3d50af94c47eeab3c08014c37bfc674
SHA13633ee13adf795ee0b307b4cb29f40d674713464
SHA2562d66ae654cfaa1aecb1b4f870c5d85fa41db6580f054e956ce88bc1d40fb9639
SHA51244a2ab3aea83b2ca9049a483c01c4ab36c128b623f7051a5670188fae1bb990460028b19706c43dd558de667f5202236607b2fec11cf2ab53ef162b2f0ee198d
-
Filesize
608B
MD5f45dfdece29247368bab78308d29a52b
SHA1e656d3bdc10a272e6b4541755172d8fabd64ad83
SHA256a8ce5ed753a441e97471aa7c0fc74f2a5500275616519acbaa22d6200e1237e1
SHA512c0c9ca5d46e412e36af45681813622897317ae0247d61218c2c9cfc816a3645094e69c28cf6560ded6de1571130752d9014b84151f7d0a0dd482f61d05930dc5
-
Filesize
1KB
MD58ae843980e0c951fabc0727ad3450b74
SHA13d311845705b48493c69f73bb0c2e1220fab3340
SHA256e190831ef29787297b8fb3113292d588b80a3572cfa41c42bbac300ee02ef185
SHA512fd1a92ab7f10ed25ab12c5a8e4a46de59bda8691947923a30c6782b53d4cfb0eb29c73fcbc8acf9ae6c76c64a713f9a8581991ec39d44c6cc2490711e8a80dca
-
Filesize
1.0MB
MD5e2590fb7bac27dbfa512820e9139f28b
SHA1209d8d0b77c7a8863a3c68464ce47f6a3f00d454
SHA2564369c213390dd318aaf57b841e338f0b781b16e61713c39e3d961d6065de1821
SHA512a6b8cdac512c2d05eb2270f8b4f64248cc177785acbd8d4f0ad725acdd2c894f639e7e7259066a8014a79d69f213812dc09793a2bad7a3d6bd9a511f3ee57223
-
Filesize
1.0MB
MD5e2590fb7bac27dbfa512820e9139f28b
SHA1209d8d0b77c7a8863a3c68464ce47f6a3f00d454
SHA2564369c213390dd318aaf57b841e338f0b781b16e61713c39e3d961d6065de1821
SHA512a6b8cdac512c2d05eb2270f8b4f64248cc177785acbd8d4f0ad725acdd2c894f639e7e7259066a8014a79d69f213812dc09793a2bad7a3d6bd9a511f3ee57223
-
Filesize
31KB
MD583cd62eab980e3d64c131799608c8371
SHA15b57a6842a154997e31fab573c5754b358f5dd1c
SHA256a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294
SHA51291cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9
-
Filesize
31KB
MD583cd62eab980e3d64c131799608c8371
SHA15b57a6842a154997e31fab573c5754b358f5dd1c
SHA256a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294
SHA51291cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9
-
Filesize
31KB
MD583cd62eab980e3d64c131799608c8371
SHA15b57a6842a154997e31fab573c5754b358f5dd1c
SHA256a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294
SHA51291cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9
-
Filesize
14KB
MD5254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
Filesize
14KB
MD5254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
Filesize
14KB
MD5254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
Filesize
14KB
MD5254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
Filesize
14KB
MD5254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7