Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16/08/2023, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe
Resource
win7-20230712-en
General
-
Target
7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe
-
Size
15.6MB
-
MD5
d9a1bbe6b6df4a3cc87fd2b5bc840411
-
SHA1
0c74c0403ddc126996eb56c20f5092dcc8e78794
-
SHA256
7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076
-
SHA512
92bfcb33dec794cc964886a0d239bb0701e8174fb8c42e6e8e0a4aef16d0d6949ace46a78bb7184b6a211bb4c77297c632deb7a1743ae79d50880f025625d9f0
-
SSDEEP
196608:yKT6Gig2RSWz2tCb4JY27RNQiI3YuVC7DkF8NcIfsr8QLOtJnre6t5UL:Vig2RSWmn3SYusfo8NcIfsr8QLCJ66
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/2952-76-0x0000000001DF0000-0x0000000001E28000-memory.dmp family_blackmoon behavioral1/memory/2952-77-0x0000000001DF0000-0x0000000001E28000-memory.dmp family_blackmoon behavioral1/memory/2952-90-0x0000000001DF0000-0x0000000001E28000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/memory/2952-61-0x00000000045D0000-0x00000000046AB000-memory.dmp upx behavioral1/memory/2952-63-0x00000000045D0000-0x00000000046AB000-memory.dmp upx behavioral1/memory/2952-76-0x0000000001DF0000-0x0000000001E28000-memory.dmp upx behavioral1/memory/2952-77-0x0000000001DF0000-0x0000000001E28000-memory.dmp upx behavioral1/memory/2952-75-0x0000000001BB0000-0x0000000001BE8000-memory.dmp upx behavioral1/memory/2952-74-0x0000000000290000-0x00000000002B1000-memory.dmp upx behavioral1/memory/2952-90-0x0000000001DF0000-0x0000000001E28000-memory.dmp upx behavioral1/memory/2952-89-0x0000000001BB0000-0x0000000001BE8000-memory.dmp upx behavioral1/memory/2952-88-0x0000000000290000-0x00000000002B1000-memory.dmp upx behavioral1/memory/2952-101-0x0000000001BB0000-0x0000000001BE8000-memory.dmp upx behavioral1/memory/2952-115-0x0000000001BB0000-0x0000000001BE8000-memory.dmp upx behavioral1/memory/2952-134-0x0000000001BB0000-0x0000000001BE8000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DOMStorage\lanzouj.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DOMStorage\lanzouj.com\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b021000000000200000000001066000000010000200000004489f9c0d3cb7e507df3026c06bdf8c897eaba779ed14a0aa16d14e7d73b7eac000000000e8000000002000020000000f0bd335244c19ed9ca80815779b13a66aa1f013ba7bf8d1b9b2ccba2a2d7431720000000e809eac829628b387cd4450f864be510b81536529e25ca2a1baa20a11fac7a1c400000003b1ec30a6bc2607b14af0f4fd3b9cbd440d791d366b29b8a59fe6aefa115b38efd889c158c4ff4ff0104e34e17d7e398761e45c6c255de47592ed495fc6ce108 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DOMStorage\fqnb.lanzouj.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509326b11bd0d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "398336353" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DOMStorage\lanzouj.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DOMStorage\fqnb.lanzouj.com\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF5C00D1-3C0E-11EE-B986-76CD9FE4BCE3} = "0" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2524 WMIC.exe Token: SeSecurityPrivilege 2524 WMIC.exe Token: SeTakeOwnershipPrivilege 2524 WMIC.exe Token: SeLoadDriverPrivilege 2524 WMIC.exe Token: SeSystemProfilePrivilege 2524 WMIC.exe Token: SeSystemtimePrivilege 2524 WMIC.exe Token: SeProfSingleProcessPrivilege 2524 WMIC.exe Token: SeIncBasePriorityPrivilege 2524 WMIC.exe Token: SeCreatePagefilePrivilege 2524 WMIC.exe Token: SeBackupPrivilege 2524 WMIC.exe Token: SeRestorePrivilege 2524 WMIC.exe Token: SeShutdownPrivilege 2524 WMIC.exe Token: SeDebugPrivilege 2524 WMIC.exe Token: SeSystemEnvironmentPrivilege 2524 WMIC.exe Token: SeRemoteShutdownPrivilege 2524 WMIC.exe Token: SeUndockPrivilege 2524 WMIC.exe Token: SeManageVolumePrivilege 2524 WMIC.exe Token: 33 2524 WMIC.exe Token: 34 2524 WMIC.exe Token: 35 2524 WMIC.exe Token: SeIncreaseQuotaPrivilege 2524 WMIC.exe Token: SeSecurityPrivilege 2524 WMIC.exe Token: SeTakeOwnershipPrivilege 2524 WMIC.exe Token: SeLoadDriverPrivilege 2524 WMIC.exe Token: SeSystemProfilePrivilege 2524 WMIC.exe Token: SeSystemtimePrivilege 2524 WMIC.exe Token: SeProfSingleProcessPrivilege 2524 WMIC.exe Token: SeIncBasePriorityPrivilege 2524 WMIC.exe Token: SeCreatePagefilePrivilege 2524 WMIC.exe Token: SeBackupPrivilege 2524 WMIC.exe Token: SeRestorePrivilege 2524 WMIC.exe Token: SeShutdownPrivilege 2524 WMIC.exe Token: SeDebugPrivilege 2524 WMIC.exe Token: SeSystemEnvironmentPrivilege 2524 WMIC.exe Token: SeRemoteShutdownPrivilege 2524 WMIC.exe Token: SeUndockPrivilege 2524 WMIC.exe Token: SeManageVolumePrivilege 2524 WMIC.exe Token: 33 2524 WMIC.exe Token: 34 2524 WMIC.exe Token: 35 2524 WMIC.exe Token: SeIncreaseQuotaPrivilege 2832 WMIC.exe Token: SeSecurityPrivilege 2832 WMIC.exe Token: SeTakeOwnershipPrivilege 2832 WMIC.exe Token: SeLoadDriverPrivilege 2832 WMIC.exe Token: SeSystemProfilePrivilege 2832 WMIC.exe Token: SeSystemtimePrivilege 2832 WMIC.exe Token: SeProfSingleProcessPrivilege 2832 WMIC.exe Token: SeIncBasePriorityPrivilege 2832 WMIC.exe Token: SeCreatePagefilePrivilege 2832 WMIC.exe Token: SeBackupPrivilege 2832 WMIC.exe Token: SeRestorePrivilege 2832 WMIC.exe Token: SeShutdownPrivilege 2832 WMIC.exe Token: SeDebugPrivilege 2832 WMIC.exe Token: SeSystemEnvironmentPrivilege 2832 WMIC.exe Token: SeRemoteShutdownPrivilege 2832 WMIC.exe Token: SeUndockPrivilege 2832 WMIC.exe Token: SeManageVolumePrivilege 2832 WMIC.exe Token: 33 2832 WMIC.exe Token: 34 2832 WMIC.exe Token: 35 2832 WMIC.exe Token: SeIncreaseQuotaPrivilege 2832 WMIC.exe Token: SeSecurityPrivilege 2832 WMIC.exe Token: SeTakeOwnershipPrivilege 2832 WMIC.exe Token: SeLoadDriverPrivilege 2832 WMIC.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 2232 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 2404 iexplore.exe 2404 iexplore.exe 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2592 2232 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 28 PID 2232 wrote to memory of 2592 2232 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 28 PID 2232 wrote to memory of 2592 2232 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 28 PID 2232 wrote to memory of 2592 2232 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 28 PID 2592 wrote to memory of 2524 2592 cmd.exe 30 PID 2592 wrote to memory of 2524 2592 cmd.exe 30 PID 2592 wrote to memory of 2524 2592 cmd.exe 30 PID 2592 wrote to memory of 2524 2592 cmd.exe 30 PID 2232 wrote to memory of 884 2232 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 32 PID 2232 wrote to memory of 884 2232 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 32 PID 2232 wrote to memory of 884 2232 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 32 PID 2232 wrote to memory of 884 2232 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 32 PID 884 wrote to memory of 2832 884 cmd.exe 34 PID 884 wrote to memory of 2832 884 cmd.exe 34 PID 884 wrote to memory of 2832 884 cmd.exe 34 PID 884 wrote to memory of 2832 884 cmd.exe 34 PID 2232 wrote to memory of 2952 2232 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 35 PID 2232 wrote to memory of 2952 2232 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 35 PID 2232 wrote to memory of 2952 2232 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 35 PID 2232 wrote to memory of 2952 2232 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 35 PID 2952 wrote to memory of 2816 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 36 PID 2952 wrote to memory of 2816 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 36 PID 2952 wrote to memory of 2816 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 36 PID 2952 wrote to memory of 2816 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 36 PID 2816 wrote to memory of 2976 2816 cmd.exe 38 PID 2816 wrote to memory of 2976 2816 cmd.exe 38 PID 2816 wrote to memory of 2976 2816 cmd.exe 38 PID 2816 wrote to memory of 2976 2816 cmd.exe 38 PID 2952 wrote to memory of 1404 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 39 PID 2952 wrote to memory of 1404 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 39 PID 2952 wrote to memory of 1404 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 39 PID 2952 wrote to memory of 1404 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 39 PID 1404 wrote to memory of 2000 1404 cmd.exe 41 PID 1404 wrote to memory of 2000 1404 cmd.exe 41 PID 1404 wrote to memory of 2000 1404 cmd.exe 41 PID 1404 wrote to memory of 2000 1404 cmd.exe 41 PID 2952 wrote to memory of 1648 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 46 PID 2952 wrote to memory of 1648 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 46 PID 2952 wrote to memory of 1648 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 46 PID 2952 wrote to memory of 1648 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 46 PID 1648 wrote to memory of 1632 1648 cmd.exe 48 PID 1648 wrote to memory of 1632 1648 cmd.exe 48 PID 1648 wrote to memory of 1632 1648 cmd.exe 48 PID 1648 wrote to memory of 1632 1648 cmd.exe 48 PID 2952 wrote to memory of 2404 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 49 PID 2952 wrote to memory of 2404 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 49 PID 2952 wrote to memory of 2404 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 49 PID 2952 wrote to memory of 2404 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 49 PID 2952 wrote to memory of 564 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 50 PID 2952 wrote to memory of 564 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 50 PID 2952 wrote to memory of 564 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 50 PID 2952 wrote to memory of 564 2952 7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe 50 PID 2404 wrote to memory of 1224 2404 iexplore.exe 51 PID 2404 wrote to memory of 1224 2404 iexplore.exe 51 PID 2404 wrote to memory of 1224 2404 iexplore.exe 51 PID 2404 wrote to memory of 1224 2404 iexplore.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe"C:\Users\Admin\AppData\Local\Temp\7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic path Win32_ComputerSystemProduct get uuid /value2⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path Win32_ComputerSystemProduct get uuid /value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic path Win32_ComputerSystemProduct get uuid /value2⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path Win32_ComputerSystemProduct get uuid /value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe"C:\Users\Admin\AppData\Local\Temp\7b08e52e021d737bdab15f7bcf8e5534fa2f0aa5c2167a73f6fde50b8ea5c076.exe" 1AE4B3805D986D34C6590F3A6981310404C2F8E2061E893AAB3136A5F53807B696FE867F08F4FE23586385547D7D8C302CB2D01B8AB3D8ED2B886A1E399F9951C2585EC576FDD865627BA5716632F6B079884918FB61F075A2C3CBF7C612E2C81843C3520C26CABF71E7C6111BD08F6489558CB3DE4842DEBC505280B00D2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic path Win32_ComputerSystemProduct get uuid /value3⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path Win32_ComputerSystemProduct get uuid /value4⤵PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic path Win32_ComputerSystemProduct get uuid /value3⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path Win32_ComputerSystemProduct get uuid /value4⤵PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic path Win32_ComputerSystemProduct get uuid /value3⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path Win32_ComputerSystemProduct get uuid /value4⤵PID:1632
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://fqnb.lanzouj.com/b0112rmmb3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1224
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ß±ÉñÕߣº´íÎóÌáʾ.txt3⤵PID:564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d97148b64ae3973d0584559bdd912c82
SHA1bad6bc69e1a3e9f5c56da816f41c8610193caf8c
SHA256f1e3cb9daa57e0a20b754ac9f75d10e8f985efad6ad338150cd121864d4221ae
SHA51202ec9a1275f33b7efa71762c224ffba18fa41687165becfe2b7660ba114440fe4f6b7281ed0dfac9d8e0dc6a684892a7a523389f90dd28ad8af9269d5339e1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c93dcd2a21eabe059f528c8ba32773a4
SHA1377210e4866ed20f8d63b65f32436e41d3a2aabd
SHA2568eeb13cbde750d88d2a163e657fce239ec7f7a7895ac25f53897ed3e2913004b
SHA512b1c5e6c0ed4465d35699eabcd9c18222ed6a458de63f4f51eeb4bbcfdd74b53006178395085a8679090fc3732801ea205b27daa4a035996eaa5eda2f42653558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55979ff7197b59d881042db77a4d0d27b
SHA159306b4cf8c00a2e7af336d127a7b165d2f5d4d4
SHA256cf795925d77e5dee8532195dec9f6b6263ec093b8fbe795d0838c1ac8e73020f
SHA512a6a1a82bfda12112035562e7f5270f6e5147cc9cacdfeb942624da2f4901a4e8e376f9ba6877aa470b4bd60eda8cdd44affc835dfa7ead870dea7d0f9c152c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571e4d5b5a36e615711ca0195e7fa3228
SHA182aef79e22ac603e932e3bec75f0c20b88e033f7
SHA256f16f1141e6969982af634cb26a14d72b0ea2fab9f005b254bd84bd100b78659d
SHA512355ff3dd0a540591d8014db95e46acb6e2826dc0a8e5428866db62377e303b3d9bc5bc29a35999675b304c83e57a858b0e16f20f5621db26e96d9be8cd4ab466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d10ab2a6d6779edd013b29498b5a215
SHA1a910add3f19c1b2ca727e5f56441cb8a950d65c1
SHA2560fc50201937d2c4e309a77ff95a65c78195e7ffd3379022b256355a88d36e91e
SHA512f20f1ecf2c3a83dcea726462bbe98fbb2ce56eae62162f59e1e0eeb2efbe7ac964620e36fc946fc137fc1c4d5618abfc897151c47fa1c8a70937fbc47cef0acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbd5740c53224a591fd6a47615521e54
SHA1fb86b3e33ca64b353eecb74a682147924bddac75
SHA256518eae0a8c3e35f8f4c0d46b9b6769895d21171c364259c8eac961a120f448aa
SHA512301b6a6b095837e7c5eb501b6e171d50ee7f35d87cb283ab7a08dc951627d0f5af7c97a5498d4913356b3b00960b61cc31ed19432284fc1207a78a3b4846398d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f498f3129b8cdbe8be9a9af5674f4c5b
SHA1e1c3635f10027d9e1e4f823ef5aa0c18fa96f918
SHA25674fa4c821205299614a802db45e77e88dc3200fdb56e6e9ead5de798f1a700ed
SHA5128fed98f4b5c6609c34d9641e3fd001a15b03d261b249ccdd8c8b1a2e0ce98303f19b7b6cd16bb4f709cce722a0c58691c24bb300733dfe3ef4d9dc10b87ab05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ffd0f247e0a2ba0ed484a0f7cd1e700
SHA1eca8a0c4fc7f9ae91ec0b98d7b17fe033e1cd123
SHA25633fc23a121c77761da64d79f79b7b8a2a9df49bb73f0c12f06c87a4dab44260b
SHA5124b201b22a7958053ddf6c6a3b5277466c5b409e61f8b991713de8e93c43163283cfd330f89d6083077974433abc0153581df12975189f449685101e1ac716eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ca65789fe7b50e128f6ec9a98755d5a
SHA18e7441c07282ab8ffc98ffed0cad366f6ebc6628
SHA25631d566e3fd13468924c58d923ae93cfc4a090cb71df5ccb211ad03daba915428
SHA5120eb8b9630e22094d3b7b2d3021da800552e55566ae097db876cc47fc5bc19bae0b04d66e827f76624a8d96d8bf0e4c4fea713c99bfa6fcefc80b6fa16d05d398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5471c0aca6e55ed076d474880321d9d17
SHA1b976ffadb8145a18d1a45bcc9c8912f5138d01be
SHA2564122a923261a48bb37376ca0097505ec739fc64b5e73d7633920860ed9019a47
SHA51296b7efeac040a99e8746222f46593727bb261e780dd9b92f1045ce9f118b94ac688ef28e537e5f52011a50e5c420e1f75b09bcaaa3b112d10fa76048b63a27ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55908b9cd229bfab5086fbd3127db17ea
SHA11a40fc0277f6343070312f33add19d793a7b1c8a
SHA2569990c4e2b7775013c3011efcbd8eba457d04ea84bab8d5c8e49abff6bcd071f0
SHA512a34ce918749cd843c227dd450daf2e49715fb3be2e04d7e5c632a2bb4d83a2af6dc53c2a21e2d73cddede12f0a8c3b34f60c5701a32213b647de482af6d0049f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d80e274100ada56f7cc799c671b2117
SHA1e9af252c8644afc5d802848ddb82cbce494c8e49
SHA256a4cf69df0e75ac7e3174f38f6f41c430b281575cf7bbb892aaaf5096599cf9aa
SHA512ab053a74983fa97de13c079e92888e687eec3962fd16cbbcc4ffc779a4d19d2ec067b930d9cc8b9a78762c021d68fbed962541ea00a68bf74cc9667d56fe125b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fdca2f6b03637c6e01e255b7cc31e13
SHA16074f10bff36833e39c4c9c5113c1e07b1b22ed3
SHA25681e4d6b8aee0e9c22e28140a0b6ceb1c2a714017a934fb81b09454ad562ccd2b
SHA512adee6ee2818a970c1642e399af7961c66e421be2cb3052f49b469363e8732d07fef225ff01a334fab358e536e7e3ab58774ef5cbbcd6a72decc3e70f93e26950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5343e5f0da3c7d03d4f2f6cb51af8c7e1
SHA13b2da7746a54e3bfce9d0f9fb7c2e8171f9d4cdd
SHA256fc62ceeaa53fe2b301c9c335be5d12f46b345d30c9e325b449e986d53abf5b1c
SHA512c443088adabf410642dc5e28802e1bee417335e2ac63d74d35ebd7a47180da427fdaa914b272dc93ffa7847c55ebe3e1f62b1ca86d666b818e96c10cdeca87c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb80e44bda509591830e95bafb35e655
SHA1a7a5a73141e543a40fbf1fb513a86e0ed2a2ceea
SHA2565714fcec0de4e0b413988cd2088d76e12e764e8bca310d9e33811fd0c1eb678f
SHA5125f36c24c6022d4cb50ced02600e8a158958b04612cdf15127b517a3eceaeb5fc12ab714a9a4cdf0b4cfd53e2378afd2c590af0eee362d5cab065b426955ba6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afefcdc357422c8fb018d500e99e7672
SHA1f12537d05a81a70aa3fa710869d3f28690f8f2b5
SHA2568015a40a5e0c0b013f149ec54953bf770882f9a548fe6f8fe29ef329d6a399a3
SHA512743b71e7fca9a98c429c1063eadc5a06b08383cdb89a87cc702d00ebdeb2bead0cffb2f9142584ffe79efad2750717cb3c79759c0d40767192212b2bb41d26cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573f167ebf1485e6a4a056833753dd5a1
SHA1f50f82b2c18f466fd250b286e20fd44d9fc4c51e
SHA256099223d2be4e3e42fc49a619e2b183b84401ea878831a366fa19f0ac4c963fff
SHA5120c0094fbd3ab7d38d79cb118d911eff019ea44fef76995d8dede9a0484118f5555b801bff19773f267bdd0b1d09d773419b8db88d719c1441efcf785f93bfb08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9112e24244ac4203a58459d311591e0
SHA1d08c2be774a29bf73ae408b329471be783a8f174
SHA2565e6cce54d18fed6e1238376fcd144f4dc6e3c29d8752f7f4b46398ce3f645847
SHA512acabd2926515b2725e82b8c4e810646cda13a9e3e08f9de1b39644ab40787b34a2aa395204917f64193059e0d7e4dd0a317cace3f61f14a41108269536df09a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526315579cf7041831ba10dff6e57fe64
SHA16098cfa35136649aed16e684b84c5003d1c9dff7
SHA256a6d4cb56eade28ccdfec48e793e6e81c7557cee12e91d6a25c04ffa5e224dc57
SHA512f9da44479be8b09865f602fc3d142a53cf4ee66441849e3036a0c70c0c12f67e6f8b6d612d5a678cca5ac9a2bd54daf524876b90b61b6862b75c795845dc2374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530e192cf316175f9b2fdcc124f0dbf2b
SHA18a18bf22e32a74ac9ac1d9ad2bc68b7e62541776
SHA2564cb498c27723f1763034b866809edb9fc7ce335e3aa72ad58b1ba458f2a39ae9
SHA512a1e6218e4c7376e98b8b985cd1f31be5bbf32ac7ce555c5b5049a24ad24730057e2a993cdb3df69fe7c02b06c76a1cda2af4bf1e77bc488b49bf56e2c35899e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ea48dfff922cd23ba663c54db86a264f
SHA1f1b9bbe5e9efa24a9f2c6bbd1d76b44cd0c93ecf
SHA256f7fd32280786f3a4e1e82b83266809360c52e5ea7452569df5de5256cac88617
SHA512b9a307c1ece839b414a5212fe9b47c69f2984f532173aea3133b5f6a46d76a9deb4b956939b5025c2a0376c8279768e320309f4205fb3db254cb768de7874247
-
Filesize
5KB
MD541c8d89880abd2425b3d7a94916d116b
SHA1fcb0613d53f4ff18168375fe45dbb8d1b7922727
SHA256d899d6193a34fa0bbd15750ac676e8be31e3c1f55e366f9ea8cbb7623f87b7a5
SHA51269fc1c10f54366446b9617ba4ef15d72d414c4c974c6f0dce3fcf26e531b74f1d5706fd01cb07a55dfb32fc39b3e5ef70e33b8e97d62d234f0404a424e463b21
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E2UNMO2B\favicon[1].ico
Filesize1KB
MD5e2a12d30813a67034ecef52f8f5447d9
SHA187cbf0958c40d8c61c591020fae3f5e2b5dfb6de
SHA25622489aa1578915c922e7d16566a5b926a6c430961f3327e90f0b10dad21f0781
SHA512f9743821b5f4a1253e600813a3ffc81ee37bdc0774379227f9b5dfb2fd7aad3270b01246580fd73e8d42cc0611b6d4078ef09b4b53f2edb2cc6cfa2c83d54c48
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
258B
MD599e65e8363a9911292b6af275484ba6e
SHA14738a69e3351a8ba47b77d5cbc0c5883f71ccd94
SHA256c4f5d7c4812a62ad0b29e5d3fca09c7533a02d5223bdfd95c973c0374df3d3dc
SHA5129640c91d4a5ab0255955f93b2610ea888854c17557b6179157c2ae190b1f992184ddf46cf95fa875dd15f0a5350ba23e3088eeef1c362755746700d773d2c68e