Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
79bf643bd019830ddeea79d738f344bf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
79bf643bd019830ddeea79d738f344bf.exe
Resource
win10v2004-20231222-en
General
-
Target
79bf643bd019830ddeea79d738f344bf.exe
-
Size
168KB
-
MD5
79bf643bd019830ddeea79d738f344bf
-
SHA1
c6f1b1a2231a90bcac591405ae7fcaedca0a91e6
-
SHA256
7f7b62f546109ab0c734cbd8397deef2f4f1dfe27714c0c5bbe86ba315b88985
-
SHA512
97d2670cd819921bde674b6b9965eee8f821cbfde50f7e070e791350c6d12b95c100121860469a6ce50b5abe8fa41ffd886337e305b376819b9a1439f0a21794
-
SSDEEP
1536:AgIMXN4czoLRpCt98SaE4cku5V72O0zR1VuCEWWAERIxpE+4:BBARzSaEkuj72rzR1VuzWWCk
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1272 attrib.exe 2392 attrib.exe -
Deletes itself 1 IoCs
pid Process 1908 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1708 inlBA9A.tmp -
Loads dropped DLL 2 IoCs
pid Process 1756 79bf643bd019830ddeea79d738f344bf.exe 1756 79bf643bd019830ddeea79d738f344bf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\hsdfasd = "\"C:\\Users\\Admin\\AppData\\Roaming\\PPLive\\tmp.\\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}\" hh.exe" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe File created C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\Total = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com\ = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DOMStorage\cnkankan.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB214761-BCED-11EE-BF15-464D43A133DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412505815" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.82133.com/?o" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.82133.com/?o" reg.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H) reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\IsShortCut reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E} reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command\ = "wscript -e:vbs \"C:\\Users\\Admin\\AppData\\Roaming\\PPLive\\3.bat\"" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E} reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1620 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeRestorePrivilege 1620 rundll32.exe Token: SeRestorePrivilege 1620 rundll32.exe Token: SeRestorePrivilege 1620 rundll32.exe Token: SeRestorePrivilege 1620 rundll32.exe Token: SeRestorePrivilege 1620 rundll32.exe Token: SeRestorePrivilege 1620 rundll32.exe Token: SeRestorePrivilege 1620 rundll32.exe Token: SeRestorePrivilege 2560 rundll32.exe Token: SeRestorePrivilege 2560 rundll32.exe Token: SeRestorePrivilege 2560 rundll32.exe Token: SeRestorePrivilege 2560 rundll32.exe Token: SeRestorePrivilege 2560 rundll32.exe Token: SeRestorePrivilege 2560 rundll32.exe Token: SeRestorePrivilege 2560 rundll32.exe Token: SeIncBasePriorityPrivilege 1756 79bf643bd019830ddeea79d738f344bf.exe Token: SeIncBasePriorityPrivilege 1708 inlBA9A.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2880 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2880 iexplore.exe 2880 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2600 1756 79bf643bd019830ddeea79d738f344bf.exe 29 PID 1756 wrote to memory of 2600 1756 79bf643bd019830ddeea79d738f344bf.exe 29 PID 1756 wrote to memory of 2600 1756 79bf643bd019830ddeea79d738f344bf.exe 29 PID 1756 wrote to memory of 2600 1756 79bf643bd019830ddeea79d738f344bf.exe 29 PID 2600 wrote to memory of 2704 2600 cmd.exe 31 PID 2600 wrote to memory of 2704 2600 cmd.exe 31 PID 2600 wrote to memory of 2704 2600 cmd.exe 31 PID 2600 wrote to memory of 2704 2600 cmd.exe 31 PID 2704 wrote to memory of 2880 2704 cmd.exe 33 PID 2704 wrote to memory of 2880 2704 cmd.exe 33 PID 2704 wrote to memory of 2880 2704 cmd.exe 33 PID 2704 wrote to memory of 2880 2704 cmd.exe 33 PID 2704 wrote to memory of 1620 2704 cmd.exe 34 PID 2704 wrote to memory of 1620 2704 cmd.exe 34 PID 2704 wrote to memory of 1620 2704 cmd.exe 34 PID 2704 wrote to memory of 1620 2704 cmd.exe 34 PID 2704 wrote to memory of 1620 2704 cmd.exe 34 PID 2704 wrote to memory of 1620 2704 cmd.exe 34 PID 2704 wrote to memory of 1620 2704 cmd.exe 34 PID 2704 wrote to memory of 2776 2704 cmd.exe 35 PID 2704 wrote to memory of 2776 2704 cmd.exe 35 PID 2704 wrote to memory of 2776 2704 cmd.exe 35 PID 2704 wrote to memory of 2776 2704 cmd.exe 35 PID 2880 wrote to memory of 2484 2880 iexplore.exe 37 PID 2880 wrote to memory of 2484 2880 iexplore.exe 37 PID 2880 wrote to memory of 2484 2880 iexplore.exe 37 PID 2880 wrote to memory of 2484 2880 iexplore.exe 37 PID 2776 wrote to memory of 2572 2776 cmd.exe 38 PID 2776 wrote to memory of 2572 2776 cmd.exe 38 PID 2776 wrote to memory of 2572 2776 cmd.exe 38 PID 2776 wrote to memory of 2572 2776 cmd.exe 38 PID 2776 wrote to memory of 2652 2776 cmd.exe 39 PID 2776 wrote to memory of 2652 2776 cmd.exe 39 PID 2776 wrote to memory of 2652 2776 cmd.exe 39 PID 2776 wrote to memory of 2652 2776 cmd.exe 39 PID 2776 wrote to memory of 1180 2776 cmd.exe 40 PID 2776 wrote to memory of 1180 2776 cmd.exe 40 PID 2776 wrote to memory of 1180 2776 cmd.exe 40 PID 2776 wrote to memory of 1180 2776 cmd.exe 40 PID 2776 wrote to memory of 1412 2776 cmd.exe 41 PID 2776 wrote to memory of 1412 2776 cmd.exe 41 PID 2776 wrote to memory of 1412 2776 cmd.exe 41 PID 2776 wrote to memory of 1412 2776 cmd.exe 41 PID 2776 wrote to memory of 276 2776 cmd.exe 42 PID 2776 wrote to memory of 276 2776 cmd.exe 42 PID 2776 wrote to memory of 276 2776 cmd.exe 42 PID 2776 wrote to memory of 276 2776 cmd.exe 42 PID 2776 wrote to memory of 1272 2776 cmd.exe 44 PID 2776 wrote to memory of 1272 2776 cmd.exe 44 PID 2776 wrote to memory of 1272 2776 cmd.exe 44 PID 2776 wrote to memory of 1272 2776 cmd.exe 44 PID 1756 wrote to memory of 1708 1756 79bf643bd019830ddeea79d738f344bf.exe 45 PID 1756 wrote to memory of 1708 1756 79bf643bd019830ddeea79d738f344bf.exe 45 PID 1756 wrote to memory of 1708 1756 79bf643bd019830ddeea79d738f344bf.exe 45 PID 1756 wrote to memory of 1708 1756 79bf643bd019830ddeea79d738f344bf.exe 45 PID 2776 wrote to memory of 2392 2776 cmd.exe 46 PID 2776 wrote to memory of 2392 2776 cmd.exe 46 PID 2776 wrote to memory of 2392 2776 cmd.exe 46 PID 2776 wrote to memory of 2392 2776 cmd.exe 46 PID 2776 wrote to memory of 2560 2776 cmd.exe 48 PID 2776 wrote to memory of 2560 2776 cmd.exe 48 PID 2776 wrote to memory of 2560 2776 cmd.exe 48 PID 2776 wrote to memory of 2560 2776 cmd.exe 48 PID 2776 wrote to memory of 2560 2776 cmd.exe 48 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1272 attrib.exe 2392 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79bf643bd019830ddeea79d738f344bf.exe"C:\Users\Admin\AppData\Local\Temp\79bf643bd019830ddeea79d738f344bf.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\julia_fun219.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\PPLive\1.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\PROGRA~1\INTERN~1\iexplore.exeC:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?821334⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\PPLive\1.inf4⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\PPLive\2.bat4⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?o"" /f5⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:2572
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?o"" /f5⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:2652
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?o"" /f5⤵PID:1180
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f5⤵
- Modifies registry class
PID:1412
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\Users\Admin\AppData\Roaming\PPLive\3.bat""" /f5⤵
- Modifies registry class
PID:276
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\PPLive\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1272
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\PPLive\tmp5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2392
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 D:\VolumeDH\inj.dat,MainLoad5⤵PID:2524
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\PPLive\2.inf5⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2560 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r6⤵
- Checks processor information in registry
PID:2436 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o7⤵PID:2024
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inlBA9A.tmpC:\Users\Admin\AppData\Local\Temp\inlBA9A.tmp2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inlBA9A.tmp > nul3⤵PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\79BF64~1.EXE > nul2⤵
- Deletes itself
PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD55aad081e130b648eb8aabf2285569838
SHA16d6f4a8a3bae73174b9f575116a7cfe89ae5a3f4
SHA25677a7a67d87f5bb54be7b2960416010d5be054e4a7bee12391bb8d88d679e948f
SHA5128d53bdd016dd2321ed1f985f9769ce218f65f4eb57f027eadb0e3741811cdcee3c38f147ddf206a3a4e6ac05a0ee1521a645944e443525f4f86becaed5e4cf2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a7c2143cb58618e4001ef60e5a374f0
SHA172286913410a08f9847e9e7dac873df3450872a1
SHA25647f4fb8d20bbf9dd22476e44a5e36d29c1f53639f74f81cae2575fff1f85e924
SHA512a472dc9a7c721511028d1f20a64ea048a8d5e367cf79c51254d8b63a34857bc393f59ad1e10dffa7865ced6864a2f612927b0eb91a105ffd1bf1f455c2a8f30a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf8ee1cda5923d7bf5eef55053b52348
SHA13c8af7fb3ef1c264a03009889b980ce82a8113fa
SHA2563b3363e8ed8e48bc9661dd1ee7b22e46f9703c3452148156bb9a93231db0fa72
SHA512042f9cdc6767bb47b9052cf15565e14acce6582da83b87025664104f6ab836fecbf6424cb7e9382203fa2d7e96638f767f5f945ed5d6982c830e734d3a49e525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8ee5b3d069beb579645c4f308d26bce
SHA156c35a7811e95fd7980c1a20a6784987cac4d375
SHA25679cb63bd87df80e4d09c6c0fe368ca600ffb5dca9d5e428860a067e2219364e3
SHA512553f16b4c30c52af9c915d85acf9662511e67957605ebb054f315987f3231e8d13bf858b4f6a21bd143c85d8cb2e5b7305f56535bdc541f170df08cdef33ee32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5661d4add6bc987a19bdffb89caa65e19
SHA1732ec0d0d2994754790dd0f08ec43d4f0ceebe61
SHA2561569425aeeb787d469b458767c5f7b8d880108091c7399d508c47102a85c96ba
SHA5125ec9f2f331ed8c5125cc7787fa08ebfe9c48bed0f7613fc62376abaa189626d1a96cb98357e6247dece9c2e229962eb9c67816d674ba8da70c4ec13dca8492b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5861b4603689ed99465d01440ef98f93a
SHA1c72256e4a823bf565a82fe6e72389f6a2581c154
SHA256553183372ed0c5c17a9d55b6cfc61655cb7d3b3f5b6a2732dce8cbd245ddaf94
SHA5123a71749ff7f7d3570da43cc675a50538e64550cb7af44a733b64667013900b2faf3f5b9700be34c1371324cd52c5badc4e0339c32749b821b02af88d6cb62fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555f83641517190cb38a9241c2fe3c962
SHA150a5c189cb0b7c01e7eb1563fb370633d515e37f
SHA2564a408844faa60d241f131f9d5547813bb24b1bbbf09eff3291366d05b8bf9761
SHA51252a59f0689f7af00186cf688bafe92590786c16282707d4a38668f83bebd075c221c41c981c3f4e59450617ef9deadbc8c1d62ce8176b7950b5a9e7d18fdc35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536b09c9fe0f5f26d3f4acc3b3f82c2de
SHA159fba2badbfb031d3bd4fd941251053faa34afe7
SHA2565b359dce3fa13ecd9261e5758d153f409917dee087435c3cdff88687b1a19f48
SHA5129437eb200ebef4f6fa3c5ea230ba996de9ead7f3848ca98da5694b4a81abc4098005d202ab448c5dac39fc9c63f5756f9e8a0109788692ef98962b3ab1591c82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5add62cc5ad1c6463104113f65fe4831f
SHA19b6cba16e985d0090a3096c11633ac3735cccb61
SHA256377a2b88f92ab89a83be05e1b732a799252b81ef2cc22d682e8acadd46f3f884
SHA51294e5ee4cf473cc3c3075e8028b0db45677e26163859b679205c715d3bf06b2e99449f4251848aacd9d146116cd0439c192fd997afa33277c1f5a97c8340c6133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e717e88bb3885a33d4a3d05cc8badbc2
SHA1b6fd576ddca95252e11a981ff60ce9d00e033e16
SHA256c9339a52ff63d45efb919a8251301d8a303314880e475c393716bda356fc4b70
SHA5120304089407bf187b6583774c77069a4e1488b5d011db4ec96aade426cde5aa1d762d45943e11b673c1a9958bbf272543b944ffa27630aa97e64c053f75b83093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5cd657f488f3d8a6e9c4e5c927c1a99
SHA157db6b2164ea13b5a44c9eb7727aae8db2f0ed41
SHA2566e776beb6d6c20e48f91fb917f6148d826e7d22c8d5a3da690a162b5247b2381
SHA512e55b0748e2fc83e8323ec2bb19b4044bc718dff7ada131e3f11f048ab3d19dee853708810a21a42be672f08c272490a73e89e28d34fee228043282e23e7510b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddbfeb9eebe12c92c14107360c73e148
SHA17ef6334e4ddbc546d99ad0c2169e967fef5e114b
SHA25639d245276924901b158371620431abd7d0c0fa5246c502e47ec16fe2e76f8a89
SHA5121830e7963eca43d99a557204656b5e48305ab5c685cd9c1761c279ddc4b84fe2613684dccb41d2df7c781b44c5ffeec9aa7f2013279c80d43d89350634537f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fc0dc1f90d1a96754435a59f584b070
SHA1671b6195f71c4ceb389d3c23097b0f26324de56a
SHA25621d3a89a01900a42773156ca47a1477e285bc08503f0e6125f8a869d94822554
SHA512b7fc4956819b49a9e642f02bde14da13c9bf240d89f3e10b08f7454446a10f0b79d1d9664703aa3b2c8139f9683c7e06ee906a4793ec8ad2458e90ee74a05abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595b4a61de64454cdba2f2ce284be71d1
SHA13f856f56da1ce002e555f63a56451f42924a6731
SHA2565ad4ab5bb4a32547b9898adcbdac1c83a3764403a2e7899925e1cef8d65e4fc5
SHA512e4057abb098bcb2e8e8fb7718f9045d492e2595a8ef090e03eda67d42f276d986a9cd3b72c9074f33d4cdba463077c8968e8cdeef3ac6467ad306d24cc359acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5238e1b2bb2c12c66576999ed470c29eb
SHA101a7778218a325fbc9b3fa726e89e59c631f1255
SHA2564bdcb5447ba81d0a407b58e28d7f93c12fde7ac631cd9840115b84a91d1cbe40
SHA512bb39cf6435eac21898503f5562a51141dd2cd23f6f8622fd3154de08b903a4ea3fe1c4b12b8329d443212925639e87dc23bc240458a8322a83e792696610c821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55faea8bc1df0a2e1b37a1c7767a76642
SHA1aa79389751d395d82937bfe405cbbe6cec723e0f
SHA256067ac3feb81cedeadfae967fd3574e1ce59de5b6b6b55f856964a0b5c46c2327
SHA512ebdc5b3e1f7cbead2ab5d19a3c92cb16435a70c43d4e9c5a2838016afa92af7484ccd79ecf7d8fd0a281b4a9f27f6869418287dbac732daca604cfc639e782cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591c2bbc6c45dacb40de35326abeb53c9
SHA1608d1c2977686c862a3d71200e177c8ac3b3f48f
SHA256230f54de9c631f8151fbe3293a353e34c685ea8469a270e9d1d3974758fc8e50
SHA5124e7c67a14cff04ba49c86b5c0fd517b5f67445201aad86be1c5cbce9b1a77eb1d0cf62ddc1d4336b07f04ed73e18fbdb03c3fff28f2c601390e9c09ea98b46a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53717a891909e50e55ece3ac0d2b56c4c
SHA13c2233b9e754fdabdb53ecfac2e454e8408e2d35
SHA2564e28093fddd979426aa98e6da70dd8f5e288cb97f3214909cf4b5bb924e5b229
SHA512875064f9956513fcbbf2b8da3aef30a8e10050704a30a73159adf4130accc11e46ad4a25155d2d110a0ec71028fe9495b6a402cba46b186eda09a65f32defa6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f1dcba93e748ec366a50f1c098647af6
SHA1c15790549d4f5562a0b514ecd21b20ef6847423e
SHA256daebc17ae6f93f38c44b0d34d0e7465676d2dfda4a5d403d850f090018b3a802
SHA51292c0af39e8f4f6ad562eeeb461b8f6df798acdae97cd3d811337a703d48cfa8e69feb8d8daa1792a417376d24006b2f37bbeb2852c984d6bcb41622cfcfbbc98
-
Filesize
1KB
MD51b8c04ebe7d5fe5c347beba034d0aec3
SHA16b08a519ef37497a509ebe135803cd772e0eff73
SHA256276e5826576121dca6a916ad85fc1dd12786778bd5ec801b2ac8954c327c1ddf
SHA5122ab17372dcc85dcd13bc75d364f1105ddbe21f8d48d7952fbeee8d422856bffb1161ece9ea3e44ed274bd06decab720d36c51f26a00375aeeab843e30e1cb4e3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RU3RPYUN\favicon[1].ico
Filesize1KB
MD57ef1f0a0093460fe46bb691578c07c95
SHA12da3ffbbf4737ce4dae9488359de34034d1ebfbd
SHA2564c62eef22174220b8655590a77b27957f3518b4c3b7352d0b64263b80e728f2c
SHA51268da2c2f6f7a88ae364a4cf776d2c42e50150501ccf9b740a2247885fb21d1becbe9ee0ba61e965dd21d8ee01be2b364a29a7f9032fc6b5cdfb28cc6b42f4793
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
8.9MB
MD51fa93f48122a6955618a4dbe4f470509
SHA1bac5474c3aee5e40b8a7a4f2201930ebba7dd392
SHA256f8953979805ed66524d12e7a8c56b74e80e432e8256d9ce4cbe51868573e31e1
SHA51222a6541e69fc73683531a72db8321d78c4c59f02f090618059cd54f2a9864aab76c2e374cc33b9e3ffe9a973f4c571a7eb3bbf9905531d9aa66b2a0759ead8e2
-
Filesize
6.3MB
MD5793247ffa0f36b5884e9418628f305bc
SHA17db18352ff387e4975a9b823bd0d00eab333acff
SHA25675390c9809352ceb90401791e55035d36124b52bb2dcfc66867af76ef8cdaa0d
SHA51258e59b5ad3765bfc8c47dbf56d652d8a6ab31f48b4768175962b1736dca1bc12d44bd28a15f297d884160ed2015cc2c5e9e49ccbd5887b152017806bfc98c50d
-
Filesize
53B
MD523962a245f75fe25510051582203aff1
SHA120832a3a1179bb2730194d2f7738d41d5d669a43
SHA2561abcea214b9b2bd76cc04be07ae2d4d70371e6ca443d99f4f1327afe7a5fc647
SHA512dc36b64f2dbb710652900a31295c148760b0c44eae13515aa29613916c9dffe3d8e55ba61568f7c27b43bf0c341f7dcd4b9c721f81627fc6bb915b15c358fe80
-
Filesize
660B
MD5c40ea8f677b3f48bfb7f4cfc6d3f03ab
SHA110b94afd8e6ea98a3c8a955304f9ce660b0c380a
SHA256b1a31a74cc88d0f8e39aaebf58a724b89391dc3fbac733953790edf8ded8172c
SHA512409b8a45576bf08e185446b13a512c115df7483ff8ec30ea51ee93ee1ac8153ae3b615650ff69a5d1e41fa0cd57fcdc4c5d03b4b4453431114ac018f48e194d9
-
Filesize
3KB
MD5b7c5e3b416b1d1b5541ef44662e1a764
SHA18bff7ea2be2f3cf29f2381d8007198b5991ca3ae
SHA256f1a2f9fdebb3cac24756e53fa5e1628b2bd1cc130480c1878e3b3bc880575cd1
SHA51265dbd6a7a7cf6fec00e6b0f1d7d5655769e6087ad09cad74c91c5a3395e675ac8f9df5c7185327e6f8dd03ddb60504400f54237d9e4b53c8b08e7e3d41ee61fc
-
Filesize
492B
MD534c14b8530e1094e792527f7a474fe77
SHA1f71c4e9091140256b34c18220d1dd1efab1f301d
SHA256fe0dfb3458bfe2a3632d365e00765fa10f14d62e7dfa8b70a055c7eb9fdb6713
SHA51225bb09b526e1e9f5c6052f1f7c36b37c956c1b5649936af8df3abfcf120c931f3d2603e17a061cb99d8c8074bfb1973a5423cce89762fca53cd46aeb3e8944a2
-
Filesize
3KB
MD56b78cb8ced798ca5df5612dd62ce0965
SHA15a9c299393b96b0bf8f6770e3c7b0318a9e2e0cf
SHA25681f64f42edfac2863a55db8fabd528c4eefc67f7e658cad6a57eeec862e444e3
SHA512b387ba10021f3284d1406d520a2c8b3ba0c87922d67c79394c1aa50c631194519ac6bb5b898956533f040d48e1c7b202734e0075f8fc8c8bfab82c8ef359b28e
-
Filesize
247B
MD5ca436f6f187bc049f9271ecdcbf348fa
SHA1bf8a548071cfc150f7affb802538edf03d281106
SHA2566cdfa9b7f0e1e4ee16bc8ce5d7448d47ea8866c1f55f3e56be5c2a4d183ca534
SHA512d19e20aabddad6b0284f8c1d473e9180f30b49d4d8b54f26e7c8630228e16b1f6ba04023c5e8b1993d8a10d97adcfff683b216f79b9981bf16181641aebdd591
-
Filesize
12.3MB
MD598be5018f105087fd9901beadae44f5a
SHA163bce53aa4325daa60ceb061318329c90867425d
SHA256a197d031dc9697beb7d51bba43c1fa6c86f805d8a2dd4fd48d1f66aff5096c72
SHA512b94bfa500e6e7592ec11e627c796712f6b852f87ed318ca7a912be24431574f3e5d9d6e68571800ba363e4100fecd3bd78d5beb6bc097fca64b4a3de0a4a4dfc
-
Filesize
11.8MB
MD51efae14f968ba25acde0fa84c5fbda01
SHA1ed82899e557318db25f6eb22c9f0f59682e4cbe9
SHA256fad66c3e440f01cbef5a11daf24305784b156e842501db4ce8787fa075b61e75
SHA5129ac1029aca0278c57d46f8c6b0a20bf1fe0ff7776db4f3472e6d89f257985dc5bc31301bbe06c44931a1db86aabc3372ccb2f24baf82c32311e5302dbdfb8d57
-
Filesize
5.2MB
MD56db4cff3a67e03d4e3cf39c23a2a076a
SHA13165cbe953e8c25554feb2bc1440855b293e0615
SHA256f6c1137a7e813390d64371eb5d19e2f74e5869a2a013a7cc9523a412e2663417
SHA512ef08d0791610e64eaf57d4b26d85a95a1967d664f0c076630cf255b91c7e8843360f3bc95a2dd258654749464749fd4f78d8c8cb81ec63a7e37532b1e227513d