Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
hosts自动更新工具/hostsup.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
hosts自动更新工具/hostsup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
hosts自动更新工具/新云软件.url
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
hosts自动更新工具/新云软件.url
Resource
win10v2004-20231222-en
General
-
Target
hosts自动更新工具/hostsup.exe
-
Size
1.3MB
-
MD5
c21960106da028ab79683b1734959d2f
-
SHA1
c5f8ee61978422dfaba4a910c11136fad6ac3ea6
-
SHA256
8245fbf6adfce62357bf92c6e4e12358e04ad7ea9b6b131fb30ba03eaa8c9443
-
SHA512
d3629fe553eb4920731db4e05ad17e12f10691ff4a4a5e811de8701f0f8748335ce90c506934f82b813b0f6f2ee84710eca2aec7213df1444af8e111da01cc06
-
SSDEEP
24576:vczJKVdfnx6G7Aa6lMr1SA3IreNbNhl88Vo5i+MgZPeScqzYcypZBecGnQ2J+x:vcAvx6GJ6lM1SaAeVl88Vo5qgcqzY7Zx
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts hostsup.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation hostsup.exe -
Executes dropped EXE 1 IoCs
pid Process 5036 hostsup.exe -
Loads dropped DLL 16 IoCs
pid Process 1668 regsvr32.exe 1668 regsvr32.exe 1668 regsvr32.exe 3964 regsvr32.exe 3964 regsvr32.exe 4664 regsvr32.exe 1344 regsvr32.exe 4436 regsvr32.exe 4436 regsvr32.exe 4436 regsvr32.exe 5036 hostsup.exe 5036 hostsup.exe 5036 hostsup.exe 5036 hostsup.exe 5036 hostsup.exe 5036 hostsup.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\windows\SysWOW64\wbem\hostsup.exe xcopy.exe File opened for modification C:\windows\SysWOW64\wbem\hostsup.exe xcopy.exe File opened for modification C:\windows\SysWOW64\MSSOAP30.dll xcopy.exe File opened for modification C:\windows\SysWOW64\MSSOAPR3.dll xcopy.exe File created C:\windows\SysWOW64\msxml4.dll xcopy.exe File opened for modification C:\windows\SysWOW64\msxml4.dll xcopy.exe File created C:\windows\SysWOW64\WINHTTP5.DLL xcopy.exe File created C:\windows\SysWOW64\WISC30.dll xcopy.exe File created C:\windows\SysWOW64\MSSOAP30.dll xcopy.exe File created C:\windows\SysWOW64\MSSOAPR3.dll xcopy.exe File opened for modification C:\windows\SysWOW64\msxml4r.dll xcopy.exe File opened for modification C:\windows\SysWOW64\WISC30.dll xcopy.exe File opened for modification C:\windows\SysWOW64\wbem xcopy.exe File created C:\windows\SysWOW64\msxml4r.dll xcopy.exe File opened for modification C:\windows\SysWOW64\WINHTTP5.DLL xcopy.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\windows\SysWOW64 xcopy.exe File opened for modification C:\windows\SysWOW64 xcopy.exe File opened for modification C:\windows\SysWOW64 xcopy.exe File opened for modification C:\windows\SysWOW64 xcopy.exe File opened for modification C:\windows\SysWOW64 xcopy.exe File opened for modification C:\windows\SysWOW64 xcopy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{05AE7FB3-C4E9-4F79-A5C3-DAB525E31F2C}\InprocServer32\ = "c:\\Windows\\SysWow64\\MSSOAP30.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B313A227-0798-4A87-9074-48CA2164D0F7}\TypeLib\ = "{91147A58-DFE4-47C0-8E76-987FC1A6001B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A0B762A7-9F3E-48D8-B333-770E5FA72A1E}\TypeLib\ = "{91147A58-DFE4-47C0-8E76-987FC1A6001B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4D40B730-F5FA-472C-8819-DDCD183BD0DE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DE523FD4-AFB8-4643-BA90-9DEB3C7FB4A3} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSSOAP.SoapReader30 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{176B81CD-4F22-4CA0-9F54-9FE5935A595B}\TypeLib\Version = "3.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{88d969c5-f192-11d4-a65f-0040963251e5}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msxml2.MXHTMLWriter.4.0\CLSID\ = "{88d969c9-f192-11d4-a65f-0040963251e5}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{565FBBE9-8563-4302-BE8A-7C6A64FB0A85}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ABAADE34-EEF6-408A-8896-65BE669D27FA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{88d969c8-f192-11d4-a65f-0040963251e5}\ProgID\ = "Msxml2.MXXMLWriter.4.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Msxml2.MXNamespaceManager.4.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B85E6E71-1493-442F-BC97-B511BE0D5D96}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB0E0268-304D-43FC-8603-B1105F3A7512} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7F017F97-9257-11D5-87EA-00B0D0BE6479}\ProgID\ = "MSSOAP.SoapClient30" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE1DBCF5-2260-470A-8E1C-E2406D106E0A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E3F8BAA5-8A05-4641-91CE-3FBC533D1EDB} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{104F6816-093E-41D7-A68B-8E1CC408B279} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{88d969c4-f192-11d4-a65f-0040963251e5}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{565FBBE9-8563-4302-BE8A-7C6A64FB0A85} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{565FBBE9-8563-4302-BE8A-7C6A64FB0A85}\TypeLib\ = "{91147A58-DFE4-47C0-8E76-987FC1A6001B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8004A743-6A1E-45E4-B2E2-A6D117F06008}\ = "IStringAttachment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB0E0268-304D-43FC-8603-B1105F3A7512}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0871607-8C99-4824-92CD-85CBD4C7273F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{88d969c6-f192-11d4-a65f-0040963251e5}\ = "Server XML HTTP 4.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C92A03CF-B92B-404F-9AC5-58664A592E4C}\5.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF90A715-925B-11D5-87EA-00B0D0BE6479}\ = "MSSOAP30.DLL SoapTypeMapperFactory class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A51A663-4790-4885-B0E4-124D4BDADB3E}\ = "Microsoft SOAP Data Encoder Factory class version 3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91147A58-DFE4-47C0-8E76-987FC1A6001B}\3.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B21F31CA-0F45-4046-A231-CFB386E9E45F}\TypeLib\ = "{91147A58-DFE4-47C0-8E76-987FC1A6001B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0C9F1C0-0039-427B-8ACC-AD172FE557A8}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7F017F92-9257-11D5-87EA-00B0D0BE6479}\TypeLib\Version = "3.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7F017F93-9257-11D5-87EA-00B0D0BE6479}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7c6e29bc-8b8b-4c3d-859e-af6cd158be0f} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00b7e0ab-817a-44ad-a04b-d1148d524136}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Msxml2.MXXMLWriter.4.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{176B81CD-4F22-4CA0-9F54-9FE5935A595B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{456C5AB4-2A2A-4289-9D4C-0C28BF739EE4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0AF40C50-9257-11D5-87EA-00B0D0BE6479}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF9B6377-6505-4934-AD85-BAB87E15EF65}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A51A663-4790-4885-B0E4-124D4BDADB3E}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{663EB158-8D95-4657-AE32-B7C60DE6122F}\TypeLib\ = "{91147A58-DFE4-47C0-8E76-987FC1A6001B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{70824404-7A18-412A-9A83-A9EC0F3FF045} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B313A227-0798-4A87-9074-48CA2164D0F7}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF90A715-925B-11D5-87EA-00B0D0BE6479}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3B2A98E6-F76A-48B1-8F7D-0139A8D0258C}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{49F9421C-DC88-43E1-825F-70E788E9A9A9}\TypeLib\Version = "3.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C0871607-8C99-4824-92CD-85CBD4C7273F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{88d969c4-f192-11d4-a65f-0040963251e5}\InProcServer32\ = "%SystemRoot%\\SysWow64\\msxml4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7c6e29bc-8b8b-4c3d-859e-af6cd158be0f}\InProcServer32\ = "%SystemRoot%\\SysWow64\\msxml4.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F5078F18-C551-11D3-89B9-0000F81FE221}\4.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A51A663-4790-4885-B0E4-124D4BDADB3E}\TypeLib\ = "{91147A58-DFE4-47C0-8E76-987FC1A6001B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{23BDF2B5-2304-4550-BBE2-F197E2CC47B6}\TypeLib\Version = "3.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B0BBA669-55F7-4E9C-941E-49BC4715C834}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB0E0268-304D-43FC-8603-B1105F3A7512} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Msxml2.SAXAttributes.4.0\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0AF40C58-9257-11D5-87EA-00B0D0BE6479}\InprocServer32\ = "c:\\Windows\\SysWow64\\MSSOAP30.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{95A098C0-EB61-4895-91C7-78873251322E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9E6CDFEF-4C42-411B-BACA-FE96F7A13C04}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B0BBA669-55F7-4E9C-941E-49BC4715C834}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A2C40FB2-B768-4EC8-809A-6ECB4B89C6A7}\TypeLib\Version = "3.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{663EB158-8D95-4657-AE32-B7C60DE6122F}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EC189C1C-31B3-4193-BDCA-98EC44FF3EE0}\TypeLib regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5036 hostsup.exe 5036 hostsup.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3296 wrote to memory of 3528 3296 hostsup.exe 88 PID 3296 wrote to memory of 3528 3296 hostsup.exe 88 PID 3296 wrote to memory of 3528 3296 hostsup.exe 88 PID 3528 wrote to memory of 2492 3528 cmd.exe 90 PID 3528 wrote to memory of 2492 3528 cmd.exe 90 PID 3528 wrote to memory of 2492 3528 cmd.exe 90 PID 3528 wrote to memory of 2384 3528 cmd.exe 91 PID 3528 wrote to memory of 2384 3528 cmd.exe 91 PID 3528 wrote to memory of 2384 3528 cmd.exe 91 PID 3528 wrote to memory of 3512 3528 cmd.exe 104 PID 3528 wrote to memory of 3512 3528 cmd.exe 104 PID 3528 wrote to memory of 3512 3528 cmd.exe 104 PID 3528 wrote to memory of 4868 3528 cmd.exe 102 PID 3528 wrote to memory of 4868 3528 cmd.exe 102 PID 3528 wrote to memory of 4868 3528 cmd.exe 102 PID 3528 wrote to memory of 520 3528 cmd.exe 96 PID 3528 wrote to memory of 520 3528 cmd.exe 96 PID 3528 wrote to memory of 520 3528 cmd.exe 96 PID 3528 wrote to memory of 4604 3528 cmd.exe 95 PID 3528 wrote to memory of 4604 3528 cmd.exe 95 PID 3528 wrote to memory of 4604 3528 cmd.exe 95 PID 3528 wrote to memory of 1080 3528 cmd.exe 92 PID 3528 wrote to memory of 1080 3528 cmd.exe 92 PID 3528 wrote to memory of 1080 3528 cmd.exe 92 PID 3528 wrote to memory of 1752 3528 cmd.exe 93 PID 3528 wrote to memory of 1752 3528 cmd.exe 93 PID 3528 wrote to memory of 1752 3528 cmd.exe 93 PID 3528 wrote to memory of 1932 3528 cmd.exe 100 PID 3528 wrote to memory of 1932 3528 cmd.exe 100 PID 3528 wrote to memory of 1932 3528 cmd.exe 100 PID 3528 wrote to memory of 2964 3528 cmd.exe 97 PID 3528 wrote to memory of 2964 3528 cmd.exe 97 PID 3528 wrote to memory of 2964 3528 cmd.exe 97 PID 3528 wrote to memory of 1816 3528 cmd.exe 99 PID 3528 wrote to memory of 1816 3528 cmd.exe 99 PID 3528 wrote to memory of 1816 3528 cmd.exe 99 PID 3528 wrote to memory of 3452 3528 cmd.exe 98 PID 3528 wrote to memory of 3452 3528 cmd.exe 98 PID 3528 wrote to memory of 3452 3528 cmd.exe 98 PID 3528 wrote to memory of 1296 3528 cmd.exe 101 PID 3528 wrote to memory of 1296 3528 cmd.exe 101 PID 3528 wrote to memory of 1296 3528 cmd.exe 101 PID 3528 wrote to memory of 1600 3528 cmd.exe 103 PID 3528 wrote to memory of 1600 3528 cmd.exe 103 PID 3528 wrote to memory of 1600 3528 cmd.exe 103 PID 3528 wrote to memory of 1668 3528 cmd.exe 105 PID 3528 wrote to memory of 1668 3528 cmd.exe 105 PID 3528 wrote to memory of 1668 3528 cmd.exe 105 PID 3528 wrote to memory of 3964 3528 cmd.exe 106 PID 3528 wrote to memory of 3964 3528 cmd.exe 106 PID 3528 wrote to memory of 3964 3528 cmd.exe 106 PID 3528 wrote to memory of 4664 3528 cmd.exe 107 PID 3528 wrote to memory of 4664 3528 cmd.exe 107 PID 3528 wrote to memory of 4664 3528 cmd.exe 107 PID 3528 wrote to memory of 1344 3528 cmd.exe 108 PID 3528 wrote to memory of 1344 3528 cmd.exe 108 PID 3528 wrote to memory of 1344 3528 cmd.exe 108 PID 3528 wrote to memory of 4436 3528 cmd.exe 109 PID 3528 wrote to memory of 4436 3528 cmd.exe 109 PID 3528 wrote to memory of 4436 3528 cmd.exe 109 PID 3528 wrote to memory of 5036 3528 cmd.exe 110 PID 3528 wrote to memory of 5036 3528 cmd.exe 110 PID 3528 wrote to memory of 5036 3528 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\hosts自动更新工具\hostsup.exe"C:\Users\Admin\AppData\Local\Temp\hosts自动更新工具\hostsup.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\hosts\hosts.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2492
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /c /s /h /d /y c:\hosts\MSSOAP30.dll C:\windows\system32\3⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Enumerates system info in registry
PID:2384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1080
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /c /s /h /d /y c:\hosts\msxml4r.dll C:\windows\system32\3⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Enumerates system info in registry
PID:1752
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /c /s /h /d /y c:\hosts\msxml4.dll C:\windows\system32\3⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Enumerates system info in registry
PID:4604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:520
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /c /s /h /d /y c:\hosts\WINHTTP5.DLL C:\windows\system32\3⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Enumerates system info in registry
PID:2964
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /c /s /h /d /y c:\hosts\WISC30.dll C:\windows\system32\3⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Enumerates system info in registry
PID:3452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1296
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /c /s /h /d /y c:\hosts\MSSOAPR3.dll C:\windows\system32\3⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Enumerates system info in registry
PID:4868
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /c /s /h /d /y c:\hosts\hostsup.exe C:\windows\system32\wbem\3⤵
- Drops file in System32 directory
- Enumerates system info in registry
PID:1600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3512
-
-
C:\Windows\SysWOW64\regsvr32.exeRegSvr32 c:\Windows\System32\MSSOAP30.dll /s3⤵
- Loads dropped DLL
- Modifies registry class
PID:1668
-
-
C:\Windows\SysWOW64\regsvr32.exeRegSvr32 c:\Windows\System32\MSSOAPR3.dll /s3⤵
- Loads dropped DLL
PID:3964
-
-
C:\Windows\SysWOW64\regsvr32.exeRegSvr32 c:\Windows\System32\msxml4.dll /s3⤵
- Loads dropped DLL
- Modifies registry class
PID:4664
-
-
C:\Windows\SysWOW64\regsvr32.exeRegSvr32 c:\Windows\System32\WINHTTP5.DLL /s3⤵
- Loads dropped DLL
- Modifies registry class
PID:1344
-
-
C:\Windows\SysWOW64\regsvr32.exeRegSvr32 c:\Windows\System32\WISC30.dll /s3⤵
- Loads dropped DLL
PID:4436
-
-
C:\WINDOWS\SysWOW64\wbem\hostsup.exeC:\WINDOWS\system32\wbem\hostsup.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5ebb97e14bae904875dc8d81b14e0b302
SHA1a2f1f59ff4e21016b83a9339ba665e52873c93ba
SHA25604cee747869111519df599c57462e3559ced6145a74b961436830fdbc9a94294
SHA51217de7557cb9eba97e7de7e07c0289f2eb81b911db28409ed7fc3187325b9b7efd2c8a68f4b322701720ce6718ec82ec8baf3840abb84800e94fefd77323d2632
-
Filesize
965B
MD5833e6a34800eac4da9ba3b8b7830e220
SHA1c0b5b21b1dcdc5f0c892ab8fde66d5bf5ff76ca9
SHA256f1802ff1038969dff5111c155812fd0bc1793ed9fd59afbc63275cf539ee679a
SHA5120e46a3efa3553909cb16e476aeef0347c7ad27abc818f1beea1b39a0428157ababc67b910e13033ada7af3775d1f5f37a8348c7de881d54740a4b4221130638c
-
Filesize
448KB
MD544733d9cb04d497770257315d801efcc
SHA14cd0ccab7b7514da75a9d6a91ab9440af1e0a654
SHA25652a9e5e82dfa659e3de9566e814021722c6c49d718b5d5d7e85ec87af34b34da
SHA5128832107a5119a311f8f436b2e211e1698244f4794732b4044badbda892797b17bcf03882fd5556ced70894b1a5ff7683487cd4857ae2824bde3cd40c0d70bb1b
-
Filesize
427KB
MD526479ad282b3217ab36560993f25ba70
SHA1b689dff53771551e0bb75fe2584327596efeb3c4
SHA25600feee373742308df9de9a064225ce367401ac96250deb0c9806f773c70ac789
SHA51219327a4949c77fc1a083dcd715133994d920a7cdfa2799530cfe94d6b6f63268a9f0420bb6ec20a87832f7d7cd08bb0a515e25a8e500a03dd30f176a4f0c7de7
-
Filesize
284KB
MD51d030bf7c36f7998d3783af54eb0cf92
SHA1b27c12c5cd60f25c33049a7a46db10e6640165e6
SHA256a648e8e8b73a750007e73db5a6a0e39852498fcfb4ca587dbe16d19630ee54de
SHA512bdd370b1a4b6db07fabbb688115d7d7c882662b892b8f88fad2600eead642ac899f3d9a9f637355b889e5d1dbe7409ccdc6ace5fd3d62e37fbec59e872b500da
-
Filesize
950KB
MD5cf5ac041c3677c1f1f7c4a5cf21721f5
SHA1e08a866c9e0e20c287cdcbf63905953584c6545d
SHA2560108a6636d98b8322b4bfd2034ec26f6367e741fa5002fbe6e53c44812e56a34
SHA5120bc6c44164a80c7038c488dedc23c151d153aabf6de433e82e02b8d4a2fbb6ac566933e0d8fe252bc7fb0cc5eea195e98507b797f76289a2fe46a6c788153931
-
Filesize
582KB
MD50e89e3f7a4891c354f8eae8d1bea62ba
SHA108c74c3acf30fb2e0abeaea2b981a4a34a612a7f
SHA256037e576cb78c0ce15d7b448ffa9d4ad7666c42d28dd12aa200a09f06fa5fb50e
SHA5121c1a55f2e3be3a5f1f9869859d64b3910f1eaacfc5497a0129dadb1d86b0ec3f3d907fb49f335092d0acb2b5ae1afd8ed7e0cb891d86ce76a60ce6f97bb8d95f
-
Filesize
752KB
MD5669c79a14c7ad7598aba9301633cfe85
SHA14828022e53400e66d41bddb7e1c80fbc80c74c07
SHA25603cc55df832221082f3fcc0f53bb5cd45e3108bdf0d03cf70d0cafef2554537e
SHA51239bdcd1d8ca8bd3765e4e997b5653966e94505759bec74413dbc960a2716f1b059218a4ca44d0ae8cb50d12635826ab4f1af970b1a6b553a16fe69f4e9cf26a5
-
Filesize
450KB
MD523f3422da183f695663e0add206a4114
SHA18700c97757e6b25283c9aa99727ae6e6cd77570f
SHA256d2348f88ed5d2601999a5cb9321c2b8879ab8059e83b9e0c56439b983bfcadce
SHA512e6aeef31afad144f0a8bca68533369db7cf16f7dd7885852ace5747691f3d18dc67654dd0c92b012ef8bb356ebe320c64ab7936ece58e46a7554b9c9d57ae4f1
-
Filesize
29KB
MD50180d57b4c0145c855369a9608022863
SHA1a1b199c1e8eedfb5db68396e205818539e990fb3
SHA256fb7fdc200117760ba28007aece7ed01c37a5570b4d88294511333c3609266bc0
SHA5125abb4c1f2df003b1bd90277d15e5c6070eb5b199b40135673cf4f31a5239828b4cb5a57c3a2b0276031e7c2168e4fc903438605eeb6a808e2519094d8c13c814
-
Filesize
90KB
MD5b3f0f6f16a6e28e98daef67ebc172de0
SHA148b27f906c89868c98199487fbcdc228757ff347
SHA25680d5b669e3eaa308f8a021fb399f050ceeb917919567c834477f4e21db5d948f
SHA51239686459e7857358303067e2dc59bcd92850c17e3e91b3f9f801dadc4586a9bb16a1949a3dde089b0f1f5b8b03ce5d1455d0945edac64dac1c74490a20cc74f2
-
Filesize
810B
MD54de9325a6e13693d333ad9c66a271913
SHA1985a5c4d2445719c0a540a1721140c80b3796fda
SHA256bf30b5b5eac4cc90e4ca26115a4fb8b7da4a1ea34c7584d1f9c68b6d9e093b09
SHA512cd4b250dede041d8148ce6cf1b6629a7f17d2e0953ec5d01efe096755a564f4d087496a7c58c9d4d976df5cac1c0d9f411d335098639b0fd94406acd9c186b02
-
Filesize
756KB
MD5ccc072684e4f7bee0ae666667e0429c4
SHA12e4e4c95a780d058e51d211445f9c775d9ef3841
SHA2569c72bdf8222d10f66659effc757a50995985dcabd045b534cd03509db94689e0
SHA51280641784fe6ef3f4167c30343f84fb42d37e8f3383a5bbde4e15aa123eda68719032440faaf5cb25bf5b3aec47ca2325465be5f5a682604821f5ae9b337819c4
-
Filesize
1.2MB
MD50038c321f4322702a3b1532a7287fd82
SHA17314176c7228c5b000ec21ee479c50c22a1f67b5
SHA2567fca0c82477671891b2384d1fc456bd0f273ae7fbf2bf49fe2bf75bd8c0a105c
SHA51223474fd8d34e8a5d1f10ccbbc3a386656f1c263a13fa2d8a8634d6b3a5ecb473d40622e46fa4185a59c62a50527ac1ce93b50c00efa45599db3a7c697e5388a3
-
Filesize
80KB
MD5cf34eec288a4c53e71602d5e0d65ef89
SHA1b360c17666f748e424e1802e79b9c8fc827d754e
SHA2564e75a8e8cbc8486cafc73b208532c6969c23731ecf0c93e66a4ac076136de750
SHA51299a6ff9a7b45ba58e492e2850e1e2900c80cb7909e3dac6264da2e43fba8c69ec19291acf4aa1dce555cf5e779438eb52f2cfb32b860eab4fce7dcef84dacefb
-
Filesize
670KB
MD5f28e935ffcf0973a0c0871d6b6963e25
SHA14f45fad573b68796e81106a186971318c9984135
SHA2562790a4c2787020f6889672c97bbb4d48e91ddb36da324b743895b587515761a2
SHA512bae1b0d5c95df1a39d28ddcdf3401519a48f5a8c1f4bdaea4c74af746a283c9e576b106ff864344f0c97b7a745dbf1471e3f9142feaf42bbd4b29b02d79716e4
-
Filesize
9KB
MD5c54da81eff73fb9067fd151e389b6706
SHA1b816b70a37d197143e8a5899d60df735e1500ba8
SHA2564ff4b4c7afc853ecf2f26abfe990bfd1833529a4027da7020e984091e0e11573
SHA512cca2b8404551d3701adb01d1d1680c3442b7053db47584375cae71418a730b1eedce47a9fa38b48b0fd205f66d577a2c7370d5f6c3bde39749f79c8b343f18ab