Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
8b1b007b0187d647b51ad8af1b2e1215.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b1b007b0187d647b51ad8af1b2e1215.exe
Resource
win10v2004-20231215-en
General
-
Target
8b1b007b0187d647b51ad8af1b2e1215.exe
-
Size
57KB
-
MD5
8b1b007b0187d647b51ad8af1b2e1215
-
SHA1
739f81b42682217508397d5461437b6c1b2a660a
-
SHA256
8db2a9b4bfd8828fb029f8bec50d364b07f0253075fb2b541e1fbd75cbe38871
-
SHA512
e0e4d716804d2d39d591e8dbb477958434ecc27c0c9e0ae1b5c9a717d4862ab1e53fcfe3c89012e78cd7503260a3dccb0a944634245a19ff8d59edb21c347d1c
-
SSDEEP
1536:+TbbFsJXt+zYI6evWmB05G4MkX9hqHvlLkrE:+ZMXE81b9Okb09GE
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1280 attrib.exe 868 attrib.exe -
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2888 inl32E.tmp -
Loads dropped DLL 2 IoCs
pid Process 1888 8b1b007b0187d647b51ad8af1b2e1215.exe 1888 8b1b007b0187d647b51ad8af1b2e1215.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\hsdfasd = "\"C:\\Users\\Admin\\AppData\\Roaming\\PPLive\\tmp.\\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}\" hh.exe" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe File opened for modification C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com\ = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\cnkankan.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\Total = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413087694" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\Total = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77626BC1-C238-11EE-B5B2-6A53A263E8F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\cnkankan.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.cnkankan.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.82133.com/?o" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.82133.com/?o" reg.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H) reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command\ = "wscript -e:vbs \"C:\\Users\\Admin\\AppData\\Roaming\\PPLive\\3.bat\"" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E} reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\IsShortCut reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1528 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeRestorePrivilege 1528 rundll32.exe Token: SeRestorePrivilege 1528 rundll32.exe Token: SeRestorePrivilege 1528 rundll32.exe Token: SeRestorePrivilege 1528 rundll32.exe Token: SeRestorePrivilege 1528 rundll32.exe Token: SeRestorePrivilege 1528 rundll32.exe Token: SeRestorePrivilege 1528 rundll32.exe Token: SeRestorePrivilege 2504 rundll32.exe Token: SeRestorePrivilege 2504 rundll32.exe Token: SeRestorePrivilege 2504 rundll32.exe Token: SeRestorePrivilege 2504 rundll32.exe Token: SeRestorePrivilege 2504 rundll32.exe Token: SeRestorePrivilege 2504 rundll32.exe Token: SeRestorePrivilege 2504 rundll32.exe Token: SeIncBasePriorityPrivilege 1888 8b1b007b0187d647b51ad8af1b2e1215.exe Token: SeIncBasePriorityPrivilege 2888 inl32E.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2284 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2284 iexplore.exe 2284 iexplore.exe 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2948 1888 8b1b007b0187d647b51ad8af1b2e1215.exe 31 PID 1888 wrote to memory of 2948 1888 8b1b007b0187d647b51ad8af1b2e1215.exe 31 PID 1888 wrote to memory of 2948 1888 8b1b007b0187d647b51ad8af1b2e1215.exe 31 PID 1888 wrote to memory of 2948 1888 8b1b007b0187d647b51ad8af1b2e1215.exe 31 PID 2948 wrote to memory of 1956 2948 cmd.exe 33 PID 2948 wrote to memory of 1956 2948 cmd.exe 33 PID 2948 wrote to memory of 1956 2948 cmd.exe 33 PID 2948 wrote to memory of 1956 2948 cmd.exe 33 PID 1956 wrote to memory of 2284 1956 cmd.exe 35 PID 1956 wrote to memory of 2284 1956 cmd.exe 35 PID 1956 wrote to memory of 2284 1956 cmd.exe 35 PID 1956 wrote to memory of 2284 1956 cmd.exe 35 PID 1956 wrote to memory of 1528 1956 cmd.exe 36 PID 1956 wrote to memory of 1528 1956 cmd.exe 36 PID 1956 wrote to memory of 1528 1956 cmd.exe 36 PID 1956 wrote to memory of 1528 1956 cmd.exe 36 PID 1956 wrote to memory of 1528 1956 cmd.exe 36 PID 1956 wrote to memory of 1528 1956 cmd.exe 36 PID 1956 wrote to memory of 1528 1956 cmd.exe 36 PID 1956 wrote to memory of 1800 1956 cmd.exe 37 PID 1956 wrote to memory of 1800 1956 cmd.exe 37 PID 1956 wrote to memory of 1800 1956 cmd.exe 37 PID 1956 wrote to memory of 1800 1956 cmd.exe 37 PID 2284 wrote to memory of 1752 2284 iexplore.exe 38 PID 2284 wrote to memory of 1752 2284 iexplore.exe 38 PID 2284 wrote to memory of 1752 2284 iexplore.exe 38 PID 2284 wrote to memory of 1752 2284 iexplore.exe 38 PID 1800 wrote to memory of 340 1800 cmd.exe 40 PID 1800 wrote to memory of 340 1800 cmd.exe 40 PID 1800 wrote to memory of 340 1800 cmd.exe 40 PID 1800 wrote to memory of 340 1800 cmd.exe 40 PID 1800 wrote to memory of 1628 1800 cmd.exe 41 PID 1800 wrote to memory of 1628 1800 cmd.exe 41 PID 1800 wrote to memory of 1628 1800 cmd.exe 41 PID 1800 wrote to memory of 1628 1800 cmd.exe 41 PID 1800 wrote to memory of 864 1800 cmd.exe 42 PID 1800 wrote to memory of 864 1800 cmd.exe 42 PID 1800 wrote to memory of 864 1800 cmd.exe 42 PID 1800 wrote to memory of 864 1800 cmd.exe 42 PID 1800 wrote to memory of 2416 1800 cmd.exe 43 PID 1800 wrote to memory of 2416 1800 cmd.exe 43 PID 1800 wrote to memory of 2416 1800 cmd.exe 43 PID 1800 wrote to memory of 2416 1800 cmd.exe 43 PID 1800 wrote to memory of 640 1800 cmd.exe 44 PID 1800 wrote to memory of 640 1800 cmd.exe 44 PID 1800 wrote to memory of 640 1800 cmd.exe 44 PID 1800 wrote to memory of 640 1800 cmd.exe 44 PID 1800 wrote to memory of 1280 1800 cmd.exe 45 PID 1800 wrote to memory of 1280 1800 cmd.exe 45 PID 1800 wrote to memory of 1280 1800 cmd.exe 45 PID 1800 wrote to memory of 1280 1800 cmd.exe 45 PID 1800 wrote to memory of 868 1800 cmd.exe 46 PID 1800 wrote to memory of 868 1800 cmd.exe 46 PID 1800 wrote to memory of 868 1800 cmd.exe 46 PID 1800 wrote to memory of 868 1800 cmd.exe 46 PID 1800 wrote to memory of 2504 1800 cmd.exe 47 PID 1800 wrote to memory of 2504 1800 cmd.exe 47 PID 1800 wrote to memory of 2504 1800 cmd.exe 47 PID 1800 wrote to memory of 2504 1800 cmd.exe 47 PID 1800 wrote to memory of 2504 1800 cmd.exe 47 PID 1800 wrote to memory of 2504 1800 cmd.exe 47 PID 1800 wrote to memory of 2504 1800 cmd.exe 47 PID 1800 wrote to memory of 1464 1800 cmd.exe 48 PID 1800 wrote to memory of 1464 1800 cmd.exe 48 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1280 attrib.exe 868 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b1b007b0187d647b51ad8af1b2e1215.exe"C:\Users\Admin\AppData\Local\Temp\8b1b007b0187d647b51ad8af1b2e1215.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mother_check219.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\PPLive\1.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\PROGRA~1\INTERN~1\iexplore.exeC:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?821334⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1752
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\PPLive\1.inf4⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\PPLive\2.bat4⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?o"" /f5⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:340
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?o"" /f5⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:1628
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?o"" /f5⤵PID:864
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f5⤵
- Modifies registry class
PID:2416
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\Users\Admin\AppData\Roaming\PPLive\3.bat""" /f5⤵
- Modifies registry class
PID:640
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\PPLive\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1280
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\PPLive\tmp5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:868
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\PPLive\2.inf5⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2504 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r6⤵
- Checks processor information in registry
PID:2620 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o7⤵PID:2756
-
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 D:\VolumeDH\inj.dat,MainLoad5⤵PID:1464
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inl32E.tmpC:\Users\Admin\AppData\Local\Temp\inl32E.tmp2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl32E.tmp > nul3⤵PID:2608
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\8B1B00~1.EXE > nul2⤵
- Deletes itself
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD594b98f3d1dbc7d3db08fb638057b588f
SHA12da77a6071df73654bfb525588141218d5d0903d
SHA256d2a27fb3d77ebe27cccb94ffe6b308643365824c9cd309d0fc799793e0b7b4bc
SHA5129051211db6adfbabbdf78d47de2fcd6168a80f46372f23975959b46e275d945fa2038fa419e85a78dea6f5f24137803a4e541c13d4e137633ef698620d266ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3e676469445ba94eb220f15db1cdc23
SHA19d38a8f03dd655b29456c6d9adcd681e17eaa100
SHA2567eee58c618b963b6b1378b166e2d140616fbac0405931937fb838b981e77e40c
SHA512956ff67666d215601555d1ea4b3d82a4148df0474eb3b9a4a39c3388250ce530138cd171cd8b7edc2d773caca9b5b1c5d31c24f19dd14f540cef90f148ded8b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9f3883c8056c52311afd633751bbbf0
SHA119743c62e400037255ae97c3fb133d33ab0e3fea
SHA256ad81db069588fb4d2231f029d50f7ef812364dbc855e0bcd5b6ed9af05db4c2f
SHA512cc32aa7f137dd01c074d4755d9795890bcca2b91588703356e92f98105b8ad76d7ee7dc520c2a7a947267f6188f67f3fa8dd8d53e67409083f444f5b99104dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520fafb5f448a9df09721de778ebe285d
SHA11d75e23d10bae8b5491df420dd429ce8f7acf0e4
SHA256014c52b717ad6fac3c5e633b23d363ea4f352b9b51aa8d587a124d00901daa9a
SHA512fd17fe722b28e2ad78a62f7dacd2d998fb55cd5e225a661e129f9b6162ff32c3610bb1698c641bb528201f15d5a95b10b99db42869c4165e77af92bf8213ca44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa9e74831f95ca25c7eb3d9d956cec6a
SHA1409bda0239935ab13496c3011b0b4dab902e4bd0
SHA256342c4254838be6b8ff150eb7c35a2a95d23b1ab4022aebe5c76492132b297f1b
SHA512a56d64ef6845bfaa03567d8517e85790a2ef880b88f7559e6331046dbc8b60701911b57605115d68c8be2bdf01f58bf5190ae72de2c21e6a591f118274a1b3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5276c7060d17f4b027b59a4ac60cccdfc
SHA16f0ee37e73ceb74f330a1308f206ff9d4402735e
SHA25636fa610427c19ee51a4e3b960a5d442e88a9aaa279bf3c119580aeec4294d596
SHA512817c893adde60d3070caa3537b520920c76ff7f8bde47f9c1e0cf5b3aa81b9ce4b6028664ddd64d57dca4c3ce1668aafd44ee75b54e5890abec7c13af0a1fabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f332628a637f4d36bd661fa2d61810f6
SHA1e0c0b5773ee3d7fa160d4f9dbd83a7942056b751
SHA256121531b82d771d42b4db5a41aa851f0761f93309813f36fb08e86e402b83486f
SHA51255c3268a480776ecc5c9edfc5778c7e6c48e91d7ae31d993c089b845c2f31fe8154bb2fadc2c8359e9c8f23884d749238b0fc0a36a8071ea7ba4eb77b7efb9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8e2edf1408ed954e316ac9ed6c20845
SHA1eb4c987f68b96469bae5471ecf5245c8ff6fbcc7
SHA256712f78f6938b7add3744943a7701241a731aa6cb5bfd8934cc1616fbb006ac9e
SHA5124000f86b3371680f62eaf642a4ec6973aade091dc77d2a7b72277f72386e093f9d39098a70b508889fd3b94ac0973c27e43eb7bc79bda3ee0657a32b1028def7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558c93d3565288cf3f7445c34888219b7
SHA1efec480994733e03554bbffb3dbefbb5dcdfa0da
SHA256ac2dc53f24c3ec98f383501672edfa431dbb52656fb2f4fd02c0ba134649890e
SHA512c586619e9b771876719ddb88d77f63888769e1f919d67555622ca044d2ac2ff6d74d53cc96e07a59bb6c12dd283cc55fbd19f544bca14d733e0ecde68c94ad08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3c996062065ef220be9df4af7c536cd
SHA1292c72223a0f4b11e7be6cb18fdcd62fcb2decf7
SHA256b3f70b26cfc0cd889759d0fdf2688705ba77fc0fc76c24004f077ece1f35a517
SHA5127d2e926ef146f34dd0d4d01e47876e19c840194e1bb14166a7d2f3c04ce007c9e597e75e3db824e67ac6a05726395077f75fc3f20b83320c3154f42be59caafc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e73d018b249277957bc4f73d8618061
SHA10587d08c1a1962fbe24fc9c0eed16ab7d2872c18
SHA2564455e6a3744581d78227234affca51f5b6255359be8f2d84cbe6e7bc83d0edb1
SHA51265bf5dbafba212645b7b96ee69590c5e3ec9ad385a097e3d39b7d96966ff0668ed3a41d8c51222f0b2e708b50d721f3b221a8be3d0569d5a3c6ac3baa6c6d5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599fcb56c3535c42b7c8d557e3bb1e97f
SHA14c1372a2c5f25142c1fcfa3912e2d4fdf33e10b9
SHA25642f3721ec62f7b837a75501464e7e3365abfcaf99bb8db68b5c59c9442d0c73a
SHA5120968622f2d9a72d675f83320658442fa21235f7c758a4b493f1f54198501092b4093dd510954b039e946e83340ef19952615855dead19a4cb5822bd75ecfb8cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfcfbb385f0e4236f02929cf7e92818f
SHA1879829ba7f548d1c992b113bec8710f87182ff61
SHA256bf0c8909e55ad6ab08dc0166651c152d5197594c7542a82a06d918962dac3eb4
SHA5125d2e67fd57ec683d3eabb577964ac583725eca0fa63fea01ae26d9b1c65c167109e28378a41c27ac6c6d42f104a7754341e7319f49d809340489eeced524334e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5869db90c9f23e367569df60394610873
SHA128e1d27b52110efe1c957ba8312d03e709b269d0
SHA25645df9c9cf0e524ca0a73d9b9df60adc673c31d1af26d2611135f27d7e12771a0
SHA512e85857bc5a98ef2a7ce05bdbc98b8e2d2ee85463ac3e4d7a7113a287231752ebcb1ccb9355b8080289cfa4199e9efaca63e81009b503e6faaf7a54203e69f0f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d10e355b4c0bb536a685f3530bb5e97
SHA18a2585711c8a372537b5f6c4944f75eadedbf377
SHA2564530be64eca7e5b377a6060026d01e9460385bda89a81ab99ef5752ad3157719
SHA512dfc2b5b57024cd5523041433d9922bc83df1d95a5b0879ca8f11196db882742a76558a99f493af55a3cd5951762801ab511f4e9c23ee2c3f9bda91bc05216389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5041943f0b20dd405cfe49aa3e008fe5c
SHA1cac3a57ab1599aeea88d094b2abb7d0c225e2097
SHA25672e79e4ca5aba12cd3808d0a86ba40acf8e05342e945e0d154165ea695e6718c
SHA512ea38ec2c068d2338b9f4eaeb0c655932fd79aed6273e730345ebe230966b0b76d48a6d9d5ac6d5fb85fc77d9b85405e0d30811b421bf728ef25a77ccc6423d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffaa2bf6158bfa0555dd5790624c7630
SHA1c184305aed44f63a999eadabc99953fb9f878502
SHA256bd49447f5b2c81cef08868ad1681a10aefb446c3b37d410baf9773b8a8cb647e
SHA5128c2d6e8c14472dc6d53f31dbd3b3d7506c8b6eb5826d2d1c7098500a1e734dfc871e3f4750e9baca1fa13eb1af7a1cc70b82dd1c873374c7437eadf9a721c5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e00a2bb928c7869708c8168a7d62382
SHA1dfae3dd87b794b488765147146aeb2be2b744db8
SHA256828d2b03bbb6330a37dd40ab5350938bb877b7e5bcc27549f41cdfeb8af9d35c
SHA512720df15a0ccb57b850c04332f7ce7603da2feee49a1c13d9cc1ab32f7c623d57809d57890b05675b14466de4a52e34e15156500bcfb45e03c135ace895ac493a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de72ff9a322a11b4e95d7b2c698799d7
SHA1e012f66d90ab06aea244ed79afcd1e6db8dc64fc
SHA2560876aad3632a88df94b1346c77b4d8b7908a1d653975620e8034c8a00d991c41
SHA5121f9351818e4a917e9f223a85ae7e990ee325aee80e6999172b068b83d1b5b1bd97f9bc425db0c8ef330613b73f57f7a98cc44d3aa8f6ad15b3a17cde84673c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b7bd29e037f9761af1d938ccc74a4a5
SHA17bdc7ab58aa21f1fbd52c180bd5a68f79a25d832
SHA2567e0b18f8a1cb54af62c69768f5ec798fa69a097df995844dc1e63879e072e8b8
SHA5127ba46f6c488c78c7e705ae37f94b70d0fcbdb0290660d4cd9ae580919d94590c67768eda347cb8652db5fa9554dbf2afd9d28a88b5aecd87f4e2183f01f7a029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5736cc039ee265dbfa5f36044862a9a74
SHA1eff4f1d18d87ababd7a08f64ca3bba148c801e55
SHA256f1e73bd4ef67fe48af056dde8e432d8170af5a4f0341a1fe720feb23e20dc827
SHA512860d41a5d9470aff30be661cafee44576aa5d0cfcd9c02f097e33eb0d03f6876c36cb40ff83ec3ab295f9e8dfc903d9567d70ad07a0c3d1594820237f17dd57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5470d041b54175f9fc736278673411f1c
SHA14aabde9ac3e872ab5ce4ebcb1954d5920e5adefe
SHA2560954bc2a5c20461173137e1134542330bccd5ee4ef32c00a35fabb8a1424d450
SHA5125fcadb57e08361ca72ebeb1d55d5b8a95f4c2bc65d6809afc91236a3fb2efe54d88c4c5a686fa813f3657617840fdf7d81552b65da2f6a7477c57516a634f84c
-
Filesize
1KB
MD5347cc23069799580c62024faf3023c61
SHA1d5c559b8b63d4bab4306187b7b5e099abdc20506
SHA256907f5eaad776283987b0b3dbc8872f1fe7333044aef4d1525eeaa1d3f0c95965
SHA5120c787dc6f89bc3cc826dda6e6376e99ceb92834001d70fcc2912e2b4e5d8be26db8cbbedf19fa674ad2a86a431d04801cb986c69fc5a24acdf917ed721abfd3e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HVBRC7A9\favicon[1].ico
Filesize1KB
MD57ef1f0a0093460fe46bb691578c07c95
SHA12da3ffbbf4737ce4dae9488359de34034d1ebfbd
SHA2564c62eef22174220b8655590a77b27957f3518b4c3b7352d0b64263b80e728f2c
SHA51268da2c2f6f7a88ae364a4cf776d2c42e50150501ccf9b740a2247885fb21d1becbe9ee0ba61e965dd21d8ee01be2b364a29a7f9032fc6b5cdfb28cc6b42f4793
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
1.1MB
MD53b1e9c6da6f17560ec3af9c2f4d9172b
SHA1ab2282aa1ecdf5bda6cc81cba85b211c32bf33f1
SHA25683f1ce56201166af21cba3adfc4ad8fd6fc92e558905fd771c9878549bd394f2
SHA51203e2cfa1c001f4457d96f6121bec692c97804d2c0ccc6c531d68174486bc6b783b5f9d1f74cae74aefd40e3173a88b6f1920a290d4ce76ce3e0838d2033e198c
-
Filesize
977KB
MD5c637cbc25e5c395cbfff771adbb17d66
SHA15d33f738879fef839c405e3529fec6208db70f18
SHA25621afa56150a022741b4b256200a7f081514f8f591400b58e8f3243374881f5a3
SHA5129517c1951e70b2a19760a705b35998e7d8d67185b2b1f0753768e6bca10c0e150d31fe6e8b88885841bf276b6159d7b3105851182ca10fefd44072574de1028c
-
Filesize
53B
MD523962a245f75fe25510051582203aff1
SHA120832a3a1179bb2730194d2f7738d41d5d669a43
SHA2561abcea214b9b2bd76cc04be07ae2d4d70371e6ca443d99f4f1327afe7a5fc647
SHA512dc36b64f2dbb710652900a31295c148760b0c44eae13515aa29613916c9dffe3d8e55ba61568f7c27b43bf0c341f7dcd4b9c721f81627fc6bb915b15c358fe80
-
Filesize
660B
MD5c40ea8f677b3f48bfb7f4cfc6d3f03ab
SHA110b94afd8e6ea98a3c8a955304f9ce660b0c380a
SHA256b1a31a74cc88d0f8e39aaebf58a724b89391dc3fbac733953790edf8ded8172c
SHA512409b8a45576bf08e185446b13a512c115df7483ff8ec30ea51ee93ee1ac8153ae3b615650ff69a5d1e41fa0cd57fcdc4c5d03b4b4453431114ac018f48e194d9
-
Filesize
3KB
MD5b7c5e3b416b1d1b5541ef44662e1a764
SHA18bff7ea2be2f3cf29f2381d8007198b5991ca3ae
SHA256f1a2f9fdebb3cac24756e53fa5e1628b2bd1cc130480c1878e3b3bc880575cd1
SHA51265dbd6a7a7cf6fec00e6b0f1d7d5655769e6087ad09cad74c91c5a3395e675ac8f9df5c7185327e6f8dd03ddb60504400f54237d9e4b53c8b08e7e3d41ee61fc
-
Filesize
492B
MD534c14b8530e1094e792527f7a474fe77
SHA1f71c4e9091140256b34c18220d1dd1efab1f301d
SHA256fe0dfb3458bfe2a3632d365e00765fa10f14d62e7dfa8b70a055c7eb9fdb6713
SHA51225bb09b526e1e9f5c6052f1f7c36b37c956c1b5649936af8df3abfcf120c931f3d2603e17a061cb99d8c8074bfb1973a5423cce89762fca53cd46aeb3e8944a2
-
Filesize
3KB
MD56b78cb8ced798ca5df5612dd62ce0965
SHA15a9c299393b96b0bf8f6770e3c7b0318a9e2e0cf
SHA25681f64f42edfac2863a55db8fabd528c4eefc67f7e658cad6a57eeec862e444e3
SHA512b387ba10021f3284d1406d520a2c8b3ba0c87922d67c79394c1aa50c631194519ac6bb5b898956533f040d48e1c7b202734e0075f8fc8c8bfab82c8ef359b28e
-
Filesize
247B
MD5ca436f6f187bc049f9271ecdcbf348fa
SHA1bf8a548071cfc150f7affb802538edf03d281106
SHA2566cdfa9b7f0e1e4ee16bc8ce5d7448d47ea8866c1f55f3e56be5c2a4d183ca534
SHA512d19e20aabddad6b0284f8c1d473e9180f30b49d4d8b54f26e7c8630228e16b1f6ba04023c5e8b1993d8a10d97adcfff683b216f79b9981bf16181641aebdd591
-
Filesize
3.3MB
MD5c522263efac5134aa0f2a2aabe7ef27b
SHA1a7b6d9b9ce074c1c6e8dc1e740ed79fc41cca048
SHA256822ec47d8f147291a515a38ddeeae0eba466f45af6b29f4cae4fb81a0df87a0c
SHA5126b3a176c5b7dfbfd3af6c597c20424b7f642a6d757bc2e393836a6b82929532e445225ebfda17d76546d7319ad01c721ab516486168aff95d6e6f8cadd5a5c7b
-
Filesize
942KB
MD56bdc4ac7e3d24113c5032baf2fe9a32d
SHA11efa504c7555498d647d94a82cd2ed75cb97507f
SHA256d4fd4145113b3bcd10ace9f2e63bcea10aef9ba8b0942f79d4a805a457f61cc6
SHA512fb09a3dc09731d3e14add2f29ef4e5d4f7a4783249e864709802f0f40801c47153a2860677f9f7b26e3f17dfd3a3954f93419fb343b80761dd2492bf5cb11109
-
Filesize
1.2MB
MD58827e1794e7bd967999144f69cb7fbdc
SHA1e8cf6f4f6b0e07b586e29ac0792c083d54d5441c
SHA256bd7b96064270e183a884b24b8927c4939d1def1052032d3616851f18691104f7
SHA512719e1accb43d5bc7dce18569f74752924db7615ff3812b650dca85f8ff59369c8619e0c066559f3a864545e472988fbae9620c6fb6cddb03cf37a950027df900