Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 02:16
Behavioral task
behavioral1
Sample
4d14a384c5358c2d26f5db549947a4b8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d14a384c5358c2d26f5db549947a4b8.exe
Resource
win10v2004-20231215-en
General
-
Target
4d14a384c5358c2d26f5db549947a4b8.exe
-
Size
16KB
-
MD5
4d14a384c5358c2d26f5db549947a4b8
-
SHA1
71eb2effdd0ea2d86f9dd83a1030b5a9bccb4398
-
SHA256
f2baf566a9d11685e1e7d5a5c4779239e8c37bd2e94ff1b433322c3532442ded
-
SHA512
fc7b18a79b678528d5b1be180ec1f03ce9fd2e5116140e006b7840ed694db72359d652854c2c7009765260e0b1db04385f703ab51af5c562135441cfbaa3d852
-
SSDEEP
384:/TXq//y5ivc3H3VlHANohw3R4no/qOnjVmzzdOwD/rMVdWw3tKGd3xWcA:/zk5cTHANohw3Ruo/qOZmzzswDoj9TjA
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\disableregistrytools = "2" reg.exe -
resource yara_rule behavioral1/memory/2280-0-0x0000000000400000-0x0000000000411240-memory.dmp upx behavioral1/memory/2280-19-0x0000000000400000-0x0000000000411240-memory.dmp upx behavioral1/memory/2280-454-0x0000000000400000-0x0000000000411240-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Program Files\\Internet Explorer\\svchost.exe" 4d14a384c5358c2d26f5db549947a4b8.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\svchost.exe 4d14a384c5358c2d26f5db549947a4b8.exe File opened for modification C:\Program Files\Internet Explorer\svchost.exe 4d14a384c5358c2d26f5db549947a4b8.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 4d14a384c5358c2d26f5db549947a4b8.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\ftp.bat 4d14a384c5358c2d26f5db549947a4b8.exe File created C:\windows\ftp.txt 4d14a384c5358c2d26f5db549947a4b8.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2807DC61-AE95-11EE-AD90-6A1079A24C90} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27FE56E1-AE95-11EE-AD90-6A1079A24C90} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b6c6fca142da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000081acdde8d7c5705aa5527b9dab513544b685412be1a8c6f0cf89cd7e5fc0e50a000000000e800000000200002000000058b20eac6fecc6a9b1ee465d588eda2ccb05aa13eb0ae508a767d3af1c003f6b2000000090ace2fdedbf96f90a0b485bf09eb90d55e40d0a8b3967275ae6c1afeec2ea544000000082ffab731a548dd01351a8dd2192a13fe07bd1905160e64850ae19af4478af4f86448a88b8e9dd940dedd0835ca26e6984de314e1d4cc322a6bfe8bfe902c71e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff00000000000000008604000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410928487" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3052 reg.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2816 iexplore.exe 2744 iexplore.exe 2556 iexplore.exe 2816 iexplore.exe 2816 iexplore.exe 2816 iexplore.exe 2816 iexplore.exe -
Suspicious use of SetWindowsHookEx 37 IoCs
pid Process 2280 4d14a384c5358c2d26f5db549947a4b8.exe 2816 iexplore.exe 2816 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2744 iexplore.exe 2744 iexplore.exe 2556 iexplore.exe 2556 iexplore.exe 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2816 iexplore.exe 2816 iexplore.exe 2816 iexplore.exe 2816 iexplore.exe 844 IEXPLORE.EXE 844 IEXPLORE.EXE 276 IEXPLORE.EXE 276 IEXPLORE.EXE 276 IEXPLORE.EXE 276 IEXPLORE.EXE 2816 iexplore.exe 2816 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2816 iexplore.exe 2816 iexplore.exe 108 IEXPLORE.EXE 108 IEXPLORE.EXE 108 IEXPLORE.EXE 108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 3052 2280 4d14a384c5358c2d26f5db549947a4b8.exe 28 PID 2280 wrote to memory of 3052 2280 4d14a384c5358c2d26f5db549947a4b8.exe 28 PID 2280 wrote to memory of 3052 2280 4d14a384c5358c2d26f5db549947a4b8.exe 28 PID 2280 wrote to memory of 3052 2280 4d14a384c5358c2d26f5db549947a4b8.exe 28 PID 2280 wrote to memory of 2816 2280 4d14a384c5358c2d26f5db549947a4b8.exe 30 PID 2280 wrote to memory of 2816 2280 4d14a384c5358c2d26f5db549947a4b8.exe 30 PID 2280 wrote to memory of 2816 2280 4d14a384c5358c2d26f5db549947a4b8.exe 30 PID 2280 wrote to memory of 2816 2280 4d14a384c5358c2d26f5db549947a4b8.exe 30 PID 2816 wrote to memory of 2876 2816 iexplore.exe 32 PID 2816 wrote to memory of 2876 2816 iexplore.exe 32 PID 2816 wrote to memory of 2876 2816 iexplore.exe 32 PID 2816 wrote to memory of 2876 2816 iexplore.exe 32 PID 2280 wrote to memory of 2744 2280 4d14a384c5358c2d26f5db549947a4b8.exe 33 PID 2280 wrote to memory of 2744 2280 4d14a384c5358c2d26f5db549947a4b8.exe 33 PID 2280 wrote to memory of 2744 2280 4d14a384c5358c2d26f5db549947a4b8.exe 33 PID 2280 wrote to memory of 2744 2280 4d14a384c5358c2d26f5db549947a4b8.exe 33 PID 2280 wrote to memory of 2560 2280 4d14a384c5358c2d26f5db549947a4b8.exe 35 PID 2280 wrote to memory of 2560 2280 4d14a384c5358c2d26f5db549947a4b8.exe 35 PID 2280 wrote to memory of 2560 2280 4d14a384c5358c2d26f5db549947a4b8.exe 35 PID 2280 wrote to memory of 2560 2280 4d14a384c5358c2d26f5db549947a4b8.exe 35 PID 2280 wrote to memory of 2556 2280 4d14a384c5358c2d26f5db549947a4b8.exe 34 PID 2280 wrote to memory of 2556 2280 4d14a384c5358c2d26f5db549947a4b8.exe 34 PID 2280 wrote to memory of 2556 2280 4d14a384c5358c2d26f5db549947a4b8.exe 34 PID 2280 wrote to memory of 2556 2280 4d14a384c5358c2d26f5db549947a4b8.exe 34 PID 2560 wrote to memory of 2980 2560 cmd.exe 37 PID 2560 wrote to memory of 2980 2560 cmd.exe 37 PID 2560 wrote to memory of 2980 2560 cmd.exe 37 PID 2560 wrote to memory of 2980 2560 cmd.exe 37 PID 2744 wrote to memory of 1200 2744 iexplore.exe 38 PID 2744 wrote to memory of 1200 2744 iexplore.exe 38 PID 2744 wrote to memory of 1200 2744 iexplore.exe 38 PID 2744 wrote to memory of 1200 2744 iexplore.exe 38 PID 2556 wrote to memory of 2800 2556 iexplore.exe 39 PID 2556 wrote to memory of 2800 2556 iexplore.exe 39 PID 2556 wrote to memory of 2800 2556 iexplore.exe 39 PID 2556 wrote to memory of 2800 2556 iexplore.exe 39 PID 2280 wrote to memory of 1976 2280 4d14a384c5358c2d26f5db549947a4b8.exe 44 PID 2280 wrote to memory of 1976 2280 4d14a384c5358c2d26f5db549947a4b8.exe 44 PID 2280 wrote to memory of 1976 2280 4d14a384c5358c2d26f5db549947a4b8.exe 44 PID 2280 wrote to memory of 1976 2280 4d14a384c5358c2d26f5db549947a4b8.exe 44 PID 2280 wrote to memory of 1840 2280 4d14a384c5358c2d26f5db549947a4b8.exe 45 PID 2280 wrote to memory of 1840 2280 4d14a384c5358c2d26f5db549947a4b8.exe 45 PID 2280 wrote to memory of 1840 2280 4d14a384c5358c2d26f5db549947a4b8.exe 45 PID 2280 wrote to memory of 1840 2280 4d14a384c5358c2d26f5db549947a4b8.exe 45 PID 2816 wrote to memory of 844 2816 iexplore.exe 47 PID 2816 wrote to memory of 844 2816 iexplore.exe 47 PID 2816 wrote to memory of 844 2816 iexplore.exe 47 PID 2816 wrote to memory of 844 2816 iexplore.exe 47 PID 2816 wrote to memory of 276 2816 iexplore.exe 46 PID 2816 wrote to memory of 276 2816 iexplore.exe 46 PID 2816 wrote to memory of 276 2816 iexplore.exe 46 PID 2816 wrote to memory of 276 2816 iexplore.exe 46 PID 2280 wrote to memory of 1260 2280 4d14a384c5358c2d26f5db549947a4b8.exe 50 PID 2280 wrote to memory of 1260 2280 4d14a384c5358c2d26f5db549947a4b8.exe 50 PID 2280 wrote to memory of 1260 2280 4d14a384c5358c2d26f5db549947a4b8.exe 50 PID 2280 wrote to memory of 1260 2280 4d14a384c5358c2d26f5db549947a4b8.exe 50 PID 2280 wrote to memory of 2772 2280 4d14a384c5358c2d26f5db549947a4b8.exe 53 PID 2280 wrote to memory of 2772 2280 4d14a384c5358c2d26f5db549947a4b8.exe 53 PID 2280 wrote to memory of 2772 2280 4d14a384c5358c2d26f5db549947a4b8.exe 53 PID 2280 wrote to memory of 2772 2280 4d14a384c5358c2d26f5db549947a4b8.exe 53 PID 2816 wrote to memory of 108 2816 iexplore.exe 54 PID 2816 wrote to memory of 108 2816 iexplore.exe 54 PID 2816 wrote to memory of 108 2816 iexplore.exe 54 PID 2816 wrote to memory of 108 2816 iexplore.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d14a384c5358c2d26f5db549947a4b8.exe"C:\Users\Admin\AppData\Local\Temp\4d14a384c5358c2d26f5db549947a4b8.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\system /v disableregistrytools /t REG_DWORD /d 2 /f2⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:3052
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" Http://2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
PID:2876
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:3748869 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:276
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:3814408 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:844
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:930847 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:108
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.xiuzhe.com/vip_520035041.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1200
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.okxiaoshuo.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\windows\ftp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\windows\SysWOW64\ftp.exeC:\windows\system32\ftp.exe -s:"c:\windows\ftp.txt"3⤵PID:2980
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1976
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.okxiaoshuo.com2⤵PID:1840
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1260
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.okxiaoshuo.com2⤵PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb3593f912bb584a02940a24305faaed
SHA1ebd3cd9de9693f1903e5e4abf03dc11f03b1d05f
SHA256a6539dea292b844eddf141705ac60a25a7f9673758d31586e08bd842cba09ed6
SHA51226908f874ccf5cdcfc6ceacb42e74e9c38d8153f9335fe26b3da66b1a535e5f633687ba14988514d08c69bd088234d4e8fbff0edf9b725e633191f4377299d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59799ecfa68d6b794b48ce97521d3690f
SHA19aefa07a3263aba706dd0980c5c7f4254b21df55
SHA2568854c27cb559e89fcdd0186b7f85e00a71f02304128d907f56921a16321005e2
SHA512d2fbc79a01024dcf8863d163497b6d361f0338423e60b96e1cec40191f6a1bc1c5b01aa7c47ec292ea35c8798868188c9fa9bdddb14dcd789ce129c4fd47b3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c914857a479142dfe59f440f1608dc6
SHA116755fd497ce967837e16bc662bcafdeeec0ba17
SHA25609ce80b3491d7ead62ecebf79e2d7578d324799cf132dcff296b848a5326e3d3
SHA5121c93b06ef9330f397365d6833bcfa1da6050570e64c1d837cb29be53fd06eecf91daafca3faaeadcc6a558caa743dd881b1fd3e98f043bffb7580bc78dce71f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b55a7296584461885ba7db86b18d528b
SHA1334528fb360097197e5bfbb97002e63966d402b5
SHA25602a931288e3c4f1513bde8157f1ac62cf1c3f4b034e93267d93d70dfe9e615f7
SHA5121a62faa84d5352d5ece2863ef42893a8ae8335bdee2878554156f649a14764ffdae29f0c7c9e43cd790847633ef8001e6de8d98fd50a5e977388c51be9d4ea93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5296529e218c099bf667f595163c5c9b8
SHA10f5dc400070a204212725340cf2a3e68ab51c833
SHA2566e46600161a5b871b3db28031b691bc3fd2ad9effcc2e8de5be941cbfcad1d86
SHA512d0de48d5c3537fc6d69f13d445997a35bfbaf9fa23e20d75b4107933d879964249c5169386c091349d7bf28ff84c8695141442c7236e022b481045f273bf9309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e9898d6b64dfcdd308cd22769cdd5b5
SHA15ede318f3de7d041359d77623d0d5124722581e2
SHA256248f6801acaa0cbb7a89ec86accd26ca7e014630ac739a90b2efa16207dd9515
SHA512fb7541e48dcfc9ce4e74acd48cc7d94bc403c0f2ed14f979546dc87fe39bfe46abc44b1391f853804a3740b549803d94c95daf7a7d47d7d6ff88499c964b34dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5970954702b664641f76b45206d512119
SHA1ac9c08bfc4f0b4beed4b44dabd87c34e2da9ec5d
SHA256260afbd6be499f8af5f18e9a10c4ad6ee72a0c8fabd0b03b93ea3b9d1216fb9d
SHA512cf1551fd2d36d49dbcc64096c69df7f65e11e2b11e3fdb910e6d9a12c3705dd21f0154ea16692094ec6b19b3afd2db9cac1d1f6aa35b63743e887246e4ff78d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557623c46a08375cc516f605f3389388d
SHA1d6f88f27d834edff8fa4fa1e4f84c0626edd6d71
SHA256a8f4d39b5d94978239249f36f1a473e2c628eeffa9adc3a4f93821925ba95fbc
SHA51260f97c4ffd0518510010c01d7e834ca1712ccffbc4a6b33636d8aef9b2ee14c7b43db0665a188c1c2b7dea61eb9ef90dc117c5fc54c995b7011dba1b25223446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516bf14068f546797705623dc6d927a16
SHA1d3c272dde2c2ddd5c808b03d567eeace0204febc
SHA256b59245e849c7f746f84111fca1cf70155af8f31158da7047d8b3f8e118ef8656
SHA51242caea54fbd53a89db229ae774e41365aa20de1c36421cf9d674b627f93714a7e546795a5c8534d6e2f6a6bb41755a169ff3bfb4da02b34e11abc9a4068bab00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569222204996d049cb60a7f9b17e385a1
SHA1e57c952c51cc6e270df96e66e1eea386d4304163
SHA256763d8a5ac35582572e2751e914119b05ccb9f268783f70c846f64529f685a8c8
SHA51240556b65fbccb798c81395ccf7b999eeb1806b304c346bf2df034eec31076361e7f27f54416cf8d41014330b503d8b15aa7aa348692d4aa143f014dcbb81a11c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590f1f78cc7b3146189c408e80f91b11b
SHA117034604cd7cd0f7c597cfcb26e67c3ea3f0eb08
SHA256e35ba7d42a8d6a7de9ebfd94ea4481e87839b864a7b543b0b888e7bc4976b5ed
SHA5123e15d30220943fea346630e1f7ea87e275a2b81ba8e45a4c380d1370de9f9e1a25d462ac861489ed411fb56f46f17de4286d14d5141e69241d3fafa6a9fbfcbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554da7e082550fa26a3ae353bb5c239f7
SHA1a2e88f0059ad9a743bb17c6267a6cce5b515eb5b
SHA2565e41bde336c141204cf72285b89633d53fc679008cc4a32ef6d5caaf2931353b
SHA5122ff8e10f3ffad0103039254bec0c89cf5f7bf84b720a99250ba06965eda29bf56718f87ee78a4e08adeb38bb42a9335dc2313365e27c343d238eeca23340f4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5739e3f00c73805f30c2919954de7fb2a
SHA10995c9cd0e71244181479b74ca84b5e8919e7559
SHA2563491a4fe69a9e012aeaed59e1010ebe30d8e8c58f61e3ff184f118138319e4bb
SHA512e4231a100ebc5690eb6e70420bbc430d2f0ff10afd82ba9af7b50035c9f1f0357a4c7d089c6938709338b93fc57a11bcb907d8fcc1558675bcf2a075a3444992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5428749196b779e6b0cd4a27b9f199b81
SHA1250c291161fa02891e486625916fa8e61abccbbe
SHA256ba031244358d4fda53dfde8cfd09452f15b8b03295e30de88c3f8b6887990fa3
SHA5121efd3830055a5326934ce67630af3c2fe285d7197756c5a3f07d584da62dc7fc76657450d72a4bb7e879c94472801a2416550c9b09f5ae30476012435d9a91a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc6d027e1ddd2c197db96b16f23a239b
SHA1f422151c52584b5d8a15b5975d1c1497b5513dc7
SHA256656f790e73d9a816860b3efab7603a5ea9e8ff3d38dc7d7e378ed4fde8fd079d
SHA512d578f91f040c1b3926867029f38884c0a271649ecf206d60a1085b263285459cbb3131287fb86448073d1a62ea7b03865cd6795796c02ac4616c71fb31020f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adf58b5f68762fc49a2ca0955ae2739f
SHA14941cda1254712194f74b8b7dc11e91b265bf1f9
SHA25672c10a74cf52df6e27752e7cf080c015f66183f5daba468cca5db749d97b791c
SHA512ad8c554c474ec54a217395638068211a9c79133c41acc07ec7c83f0dff05a5d27798b233c1c8762f2f7d84fced92ae42e6c793a9ca7328d3cce2fbe26b4ae76a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{27FE56E1-AE95-11EE-AD90-6A1079A24C90}.dat
Filesize5KB
MD57b103d6af32dcbb51e738ad68fe5cf23
SHA19add5f32e5f952e63bee81be6d09dc77794b0386
SHA256a6db2d2f8a9d1307b601b51e462fdd6cc93a2564182889bdce91a6f6fd85a332
SHA51218c9157ad70efab36a42b648dff799920e68b0cfb8498bf31a1de6d34d480b5aa651254e0ca36b52d994b943234ca289ab6177dfe4989c3a9bbcc0b0104fc063
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2807DC61-AE95-11EE-AD90-6A1079A24C90}.dat
Filesize4KB
MD589313e07f1a3f3e77895c34ee3a6850a
SHA12dd04917812f922be8a28fab9186e30930aa573e
SHA256f6e90e56faae715650fd07b59d508482b66059be8225bcfcae4880b8879693eb
SHA512722a59112dd324fb230f1a34c171c8aa1e5a251cf4b7b5c17cc06b114f3dc953bd782c1b039b524955a44dc8d971f42d3f620b5944168c57ed8ab30527d4785b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\clipboard.min[1].js
Filesize10KB
MD5f06c52bfddb458ad87349acf9fac06c5
SHA1ee60ca5ba9401456105ef703a98092369b579c80
SHA2561626706afc88d95ebe1173b553ec732c6dc82a576989315fdf5e7779af738a44
SHA512e80151e5171dc24ce0c1a1ae4fe54826c4fdd2a8908efb2bcbcd0a6d731e13c54b29bc16e111b91b8e536615a968956c69a11e238b0ea68c253ae56017b8e1eb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
53B
MD58f2c89200ee65d9d082b9d77853f1859
SHA187539509609fa22e0085a135cf2f0feda33c3c2e
SHA2569717e9026eae402fae08713f0da7ed86fecf804c7d4c9c2a2020c8e5bcd3ea64
SHA5127d4fcf33bf7061cbbfa9b09432cc113f0f9aa57e43434b1b7c6c32f00bf22ba285a4fb310fbbac0a40179742e810276ae39ac99ad073ed587a8026586308e4b0
-
Filesize
76B
MD51c98763b64e29828316643dcbae341d5
SHA18719a329fd5945e412d99e89c5f99b41ab566f45
SHA256b24a9be1f5d3f017ffc55ad2f6427a33abaeccb4ce0fcfca025793f92a46318a
SHA512de82674faa37db26e5ba0af13a2ec45a1f34074f7dc4ed955b5722e6231c1abbc6424ced9c77695f736ac15d4e31240801a767784a1d4c7baa8aebb12a5b1254