Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 14:51
Static task
static1
Behavioral task
behavioral1
Sample
6fb50713314e5efdea6285202214fbbf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6fb50713314e5efdea6285202214fbbf.exe
Resource
win10v2004-20231215-en
General
-
Target
6fb50713314e5efdea6285202214fbbf.exe
-
Size
54KB
-
MD5
6fb50713314e5efdea6285202214fbbf
-
SHA1
0ca70c75795286d099e1ab7559b8f8a5c5061df6
-
SHA256
51c2c22dd1b44e70b2b5ce8a9bb10b279527e03dbfb60d0810e7b4b2dc1c2dc3
-
SHA512
855df736f424c765a7561a11807af24fefc64cb5d6a10bddfe0cd525be6249f30c26523abbaca320653bcf210d1efc2a174182ba37fdb2bf24878ba012a8fd40
-
SSDEEP
1536:/KZiivgFkkHnjXVJj+AvIvWC61AIRNG4ij:UvcDHnjFByvb613A
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4568 attrib.exe 2880 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 6fb50713314e5efdea6285202214fbbf.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation inlA46B.tmp -
Executes dropped EXE 1 IoCs
pid Process 1896 inlA46B.tmp -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\hsdfasd = "\"C:\\Users\\Admin\\AppData\\Roaming\\redload\\tmp.\\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}\" hh.exe" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe File created C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\Total = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3720602795" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3722009165" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31083842" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{09401F62-B936-11EE-9963-CA152A8DAB80} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com\ = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31083842" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cnkankan.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31083842" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main reg.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3720602795" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\DOMStorage\cnkankan.com IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://www.71628.com/?S" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.71628.com/?S" reg.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\IsShortCut reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H) reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command\ = "wscript -e:vbs \"C:\\Users\\Admin\\AppData\\Roaming\\redload\\3.bat\"" reg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1896 inlA46B.tmp Token: SeIncBasePriorityPrivilege 1440 6fb50713314e5efdea6285202214fbbf.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1980 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1980 iexplore.exe 1980 iexplore.exe 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 1440 wrote to memory of 3980 1440 6fb50713314e5efdea6285202214fbbf.exe 98 PID 1440 wrote to memory of 3980 1440 6fb50713314e5efdea6285202214fbbf.exe 98 PID 1440 wrote to memory of 3980 1440 6fb50713314e5efdea6285202214fbbf.exe 98 PID 3980 wrote to memory of 4320 3980 cmd.exe 100 PID 3980 wrote to memory of 4320 3980 cmd.exe 100 PID 3980 wrote to memory of 4320 3980 cmd.exe 100 PID 4320 wrote to memory of 1948 4320 cmd.exe 102 PID 4320 wrote to memory of 1948 4320 cmd.exe 102 PID 4320 wrote to memory of 1948 4320 cmd.exe 102 PID 4320 wrote to memory of 4572 4320 cmd.exe 103 PID 4320 wrote to memory of 4572 4320 cmd.exe 103 PID 4320 wrote to memory of 4572 4320 cmd.exe 103 PID 4320 wrote to memory of 3456 4320 cmd.exe 104 PID 4320 wrote to memory of 3456 4320 cmd.exe 104 PID 4320 wrote to memory of 3456 4320 cmd.exe 104 PID 4320 wrote to memory of 4600 4320 cmd.exe 105 PID 4320 wrote to memory of 4600 4320 cmd.exe 105 PID 4320 wrote to memory of 4600 4320 cmd.exe 105 PID 4320 wrote to memory of 776 4320 cmd.exe 106 PID 4320 wrote to memory of 776 4320 cmd.exe 106 PID 4320 wrote to memory of 776 4320 cmd.exe 106 PID 4320 wrote to memory of 4568 4320 cmd.exe 107 PID 4320 wrote to memory of 4568 4320 cmd.exe 107 PID 4320 wrote to memory of 4568 4320 cmd.exe 107 PID 4320 wrote to memory of 2880 4320 cmd.exe 108 PID 4320 wrote to memory of 2880 4320 cmd.exe 108 PID 4320 wrote to memory of 2880 4320 cmd.exe 108 PID 4320 wrote to memory of 2340 4320 cmd.exe 109 PID 4320 wrote to memory of 2340 4320 cmd.exe 109 PID 4320 wrote to memory of 2340 4320 cmd.exe 109 PID 4320 wrote to memory of 1468 4320 cmd.exe 110 PID 4320 wrote to memory of 1468 4320 cmd.exe 110 PID 4320 wrote to memory of 1468 4320 cmd.exe 110 PID 2340 wrote to memory of 3128 2340 rundll32.exe 111 PID 2340 wrote to memory of 3128 2340 rundll32.exe 111 PID 2340 wrote to memory of 3128 2340 rundll32.exe 111 PID 3128 wrote to memory of 1112 3128 runonce.exe 112 PID 3128 wrote to memory of 1112 3128 runonce.exe 112 PID 3128 wrote to memory of 1112 3128 runonce.exe 112 PID 1440 wrote to memory of 1896 1440 6fb50713314e5efdea6285202214fbbf.exe 113 PID 1440 wrote to memory of 1896 1440 6fb50713314e5efdea6285202214fbbf.exe 113 PID 1440 wrote to memory of 1896 1440 6fb50713314e5efdea6285202214fbbf.exe 113 PID 4320 wrote to memory of 3936 4320 cmd.exe 116 PID 4320 wrote to memory of 3936 4320 cmd.exe 116 PID 4320 wrote to memory of 3936 4320 cmd.exe 116 PID 3936 wrote to memory of 1980 3936 cmd.exe 117 PID 3936 wrote to memory of 1980 3936 cmd.exe 117 PID 3936 wrote to memory of 3556 3936 cmd.exe 118 PID 3936 wrote to memory of 3556 3936 cmd.exe 118 PID 3936 wrote to memory of 3556 3936 cmd.exe 118 PID 1980 wrote to memory of 1044 1980 iexplore.exe 119 PID 1980 wrote to memory of 1044 1980 iexplore.exe 119 PID 1980 wrote to memory of 1044 1980 iexplore.exe 119 PID 1896 wrote to memory of 2984 1896 inlA46B.tmp 120 PID 1896 wrote to memory of 2984 1896 inlA46B.tmp 120 PID 1896 wrote to memory of 2984 1896 inlA46B.tmp 120 PID 1440 wrote to memory of 1988 1440 6fb50713314e5efdea6285202214fbbf.exe 123 PID 1440 wrote to memory of 1988 1440 6fb50713314e5efdea6285202214fbbf.exe 123 PID 1440 wrote to memory of 1988 1440 6fb50713314e5efdea6285202214fbbf.exe 123 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4568 attrib.exe 2880 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb50713314e5efdea6285202214fbbf.exe"C:\Users\Admin\AppData\Local\Temp\6fb50713314e5efdea6285202214fbbf.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s_min_run.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\redload\1.bat3⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.71628.com/?S"" /f4⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:1948
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.71628.com/?S"" /f4⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:4572
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\tmp" /v "key" /d ""http://www.71628.com/?S"" /f4⤵PID:3456
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f4⤵
- Modifies registry class
PID:4600
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\Users\Admin\AppData\Roaming\redload\3.bat""" /f4⤵
- Modifies registry class
PID:776
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\redload\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4568
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\redload\tmp4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2880
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\redload\2.inf4⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r5⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o6⤵PID:1112
-
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 D:\VolumeDH\inj.dat,MainLoad4⤵PID:1468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\redload\2.bat4⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\PROGRA~1\INTERN~1\iexplore.exeC:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://www.cnkankan.com/?716285⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\redload\1.inf5⤵PID:3556
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inlA46B.tmpC:\Users\Admin\AppData\Local\Temp\inlA46B.tmp2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inlA46B.tmp > nul3⤵PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\6FB507~1.EXE > nul2⤵PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD5084125acf8be8c62c9878ba86bfc9418
SHA133e5c79d62ec9b8496a54d66661f0d791f76b068
SHA256484ae917a5312740cc924fc7efee7bc9394e577d14b2f76ec21d9f82ec46918f
SHA51205c7415d5c15ecdc339a4a7724f8be4425efad06c72528a2b2fb520eca02fa6e35fb67eaa358944975fc7446f173365122acd27bfca39e84823a3f8bf2ebb4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD500c810ad5af9bb1ffa13d83698695136
SHA1356ae631a77f5b6039531fd01904a27e8d64fd3c
SHA256646abae3e23a04a2e487d6811e6fa2f65666e86f650baefcd821f45737165854
SHA512b7335f7b5f9a36999e5eb128f839ad8566c50ef9922f19ddff691266c745faa72a8ecedc97de3e91aa7be7e99df3c4928660f147aa1c9dd76361eb2eb2b1c3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD58670ec099cdef4acf9f0f1b98d76705f
SHA1f35f7250dd785d7a10941a4b2213aa1cdb5d435b
SHA256d93981bbc027f2f8aad7f552fc11d32618697a23c12beedd6f4629ad305d3f61
SHA512a8affe0a3524452a7e520e24cf534129e6a9a9c526daf7f05a51b0df0d3b2c2ef17c1aaa580e5cf82bd9e19d8bbbc6d91f1bbcf914d095f596e795ceac9fcf15
-
Filesize
1KB
MD5e7722a99dd6874521f08fc6ae3e7f2c4
SHA1490e9c5c4531cee6a6ce5f665faf1f28444cd749
SHA256e031f59351fdbfc96b444b14408ccb71f8da803afeb6cdc8f313fdff3ee9934b
SHA512a29154f7f63d6134961a024ab5a3f8fe780e25264b267c2e34609e04a2de17c83a22da216f735f3f648180b62859085b11249c6db80cf0396b69cce614afa34f
-
Filesize
1KB
MD57ef1f0a0093460fe46bb691578c07c95
SHA12da3ffbbf4737ce4dae9488359de34034d1ebfbd
SHA2564c62eef22174220b8655590a77b27957f3518b4c3b7352d0b64263b80e728f2c
SHA51268da2c2f6f7a88ae364a4cf776d2c42e50150501ccf9b740a2247885fb21d1becbe9ee0ba61e965dd21d8ee01be2b364a29a7f9032fc6b5cdfb28cc6b42f4793
-
Filesize
790B
MD5b18422bf438bbb7798280375a7bc0976
SHA1c1b77b35e3a38ff2ad119f25e548beb5ff68c2e2
SHA256ee8709e751067193dccdfe218108bdae6a30919d7b6c860bc848c7cc4b242fa4
SHA51223cb9c74905f514a2bf4ef91afc53ceb08230b3ce68e3eab17bb36c674260d143a7e7105958ff4ed5c2a416bddffb3c7e28dcf8060cbf323c7e4cab71f613176
-
Filesize
1.4MB
MD5068c9a7169f61522b0f7461d98d4c5cf
SHA1dee4e976cf9fb36e681f0226f339ff58fb34d13a
SHA256b374facbf692703dd50de302feaaaf5949741b4e11772ed5f010ac55ea68297a
SHA5122a11a8e68a7065245aef3ca84db8f9eb84ef37b9646dee9ddd9587b4e3b15031ca532a2a6984714b0414f8b57993ef585bf3fbca4113adea77f6e8ba170ee6bc
-
Filesize
1.6MB
MD522becd82324246cb105e4def945a2a72
SHA11715c008c60e7ca783f4dcb988c105be9ef2f89d
SHA256450cc48029ba107b6270faf6a59c0e33b122e55366ffc0761d1ae21839105ccc
SHA512bc37ca25dc66924e6ca0b69a415ffd5423898679c62a2661065e39a0f07457a99366d32af15b461bf8996002f807da89a0d8879781c2d9167d38d6a211848d81
-
Filesize
54B
MD5504490369970f1c0eb580afbcdf91618
SHA1b52f65cd538e6c998b2c7e3167f9c8e8fa6c7971
SHA256a13a0579286521f0d7cb55fc7d28c6d33f14c0573e9e69f7584fa4008a8e7d43
SHA5125495ce79abf0fc4ffbfaf9aefa484145f4e0d3e8457be0e2e4dfb1284fb5413016f2d9867e2386db5c4f7b51863bfffeae8ea6bd879053fdf6a928ab2a0857ad
-
Filesize
3KB
MD558db0fb8d73a32c0e8057a6f78c16d07
SHA15cca0167d57e8bc9a8a228134db7456bfedeb63e
SHA2565191c4b522b9dd8369363060d5e03b2728f71c09855daf1ebc418f592c50029a
SHA512829e9da755fdd4c0b0b276ee47775af66f264ac7ae0e8bb8dec1480a038c58cb6d9e9cdd3706ca7b412f6d143ea6e1034da9993220ae0329e1323d9c5c5ab75a
-
Filesize
410B
MD566a1f0147fed7ddd19e9bb7ff93705c5
SHA19d803c81ea2195617379b880b227892ba30b0bf6
SHA2564f45ce85e221352f7fe26e04968c7f7267dc24b55cf2b72b929b4c90e48cb764
SHA512cfe51756ddec75d240249980a4d27870d15983add25058e4d0da4d8a3ea11384d4d228d6cbc95091f91e516e1ab4dfb1e315941dbd95bf717d4b31936311d597
-
Filesize
3KB
MD5e0c1d8f31000bfbb421ec380b2b33a1c
SHA13ab4f702f7f0614268d1f244617b331b49b03e3e
SHA25621ecb6568e1a4610e87e0a976a478f9097ca44024d1f9a491ec249443a233865
SHA51232f711c0bef8af5d9d67e1807d5aa78b73412c128f82a8e6c498b6a68ee5682d90047beb25ecd6c032256d41e4fbb3b9faefd3ca0fdf500e7f5c27468e2665bc
-
Filesize
248B
MD52197ffb407fb3b2250045c084f73b70a
SHA13d0efbacba73ac5e8d77f0d25d63fc424511bcf6
SHA256a1a42f5a41ce65135b1ad525eabc04cce89ee07d2f51d06e5e1dea6047081591
SHA512b35a99e144da3f02de71158f58a6b937435d1bce941126a554783c667654b880527b11ba8a5c0fcf093ce28863ea4f5e60f73f8f973a727f177d584d2e9c80fe
-
Filesize
5.8MB
MD5d20e4926f69c662c79629d82ec369c0e
SHA1c898b6f2306b33d4a8beec4fb3c2090036b854a1
SHA25654b1337044bbd5ffff161edcaba706d4549deeb1508ad50016b92f5d262bd4ac
SHA5125f63c1b4b4ce74d88a7825a0d3157122106b1bbd343ee2f60bfbbe4eed4b1f47c1b9020e6f92b0fb336d7d456764daaafb6bdc5aecfd333a17e8395b16985f69