Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe
Resource
win10v2004-20240419-en
General
-
Target
53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe
-
Size
5.5MB
-
MD5
4d40c8a9062a9c898b75b032783ce470
-
SHA1
bdb03f2940bb74143248dc6ab5c23e470c3d95e0
-
SHA256
53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b
-
SHA512
dbf358549c0e9a6242ce2d9889f72e03e0256da44e9fa83d2af9edbe2658c033814c8efa19bc62d4c91afe21607c4991527c1d023ff6a6059c7d6b9ab4b916ce
-
SSDEEP
98304:oseHlHdc5b9dXLVi2xIb7S1fw7pXyZ7oz0R5uz0rbJagkW7kOLIx1qxz8hjFrZBr:Bem17h10XvwPhagz7q2wNPQ00M
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe\debugger = "ntsd -d" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\debugger = "ntsd -d" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\debugger = "ntsd -d" reg.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe " cmd.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\jabswitch.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\keytool.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\joticon.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\javaws.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Internet Explorer\iexplore.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jar.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\java-rmi.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\pack200.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pj11icon.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\appletviewer.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmadminicon.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\wordicon.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\ssvagent.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\7-Zip\Uninstall.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\kinit.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\jjs.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\ktab.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\serialver.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\ohub32.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jconsole.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\7-Zip\7zFM.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\wsgen.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\javaws.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\orbd.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\IEContentService.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Google\Chrome\Application\123.0.6312.106\notification_helper.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\chrmstp.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\ktab.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ink\mip.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jps.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\CompareUndo.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\jp2launcher.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\7-Zip\7z.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\excelcnv.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe File opened for modification \??\c:\Program Files\Internet Explorer\ielowutil.exe 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe " cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe " cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.txt cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe " cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.txt \ = " exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open\Command cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open\Command cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe " cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3784 wrote to memory of 2336 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 86 PID 3784 wrote to memory of 2336 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 86 PID 3784 wrote to memory of 2336 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 86 PID 3784 wrote to memory of 380 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 89 PID 3784 wrote to memory of 380 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 89 PID 3784 wrote to memory of 380 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 89 PID 3784 wrote to memory of 2948 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 90 PID 3784 wrote to memory of 2948 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 90 PID 3784 wrote to memory of 2948 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 90 PID 3784 wrote to memory of 224 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 91 PID 3784 wrote to memory of 224 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 91 PID 3784 wrote to memory of 224 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 91 PID 3784 wrote to memory of 4684 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 92 PID 3784 wrote to memory of 4684 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 92 PID 3784 wrote to memory of 4684 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 92 PID 3784 wrote to memory of 3008 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 95 PID 3784 wrote to memory of 3008 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 95 PID 3784 wrote to memory of 3008 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 95 PID 3784 wrote to memory of 1952 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 96 PID 3784 wrote to memory of 1952 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 96 PID 3784 wrote to memory of 1952 3784 53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe 96 PID 380 wrote to memory of 932 380 cmd.exe 101 PID 380 wrote to memory of 932 380 cmd.exe 101 PID 380 wrote to memory of 932 380 cmd.exe 101 PID 380 wrote to memory of 4580 380 cmd.exe 102 PID 380 wrote to memory of 4580 380 cmd.exe 102 PID 380 wrote to memory of 4580 380 cmd.exe 102 PID 380 wrote to memory of 1372 380 cmd.exe 103 PID 380 wrote to memory of 1372 380 cmd.exe 103 PID 380 wrote to memory of 1372 380 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe"C:\Users\Admin\AppData\Local\Temp\53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵PID:2336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\123.bat2⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\ZhuDongFangYu.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Sets file execution options in registry
PID:932
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\360tray.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Sets file execution options in registry
PID:4580
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\taskmgr.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Sets file execution options in registry
PID:1372
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c assoc .txt = exefile2⤵
- Modifies registry class
PID:2948
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype comfile=C:\Users\Admin\AppData\Local\Temp\53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe2⤵
- Modifies system executable filetype association
- Modifies registry class
PID:224
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype zipfile=C:\Users\Admin\AppData\Local\Temp\53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe2⤵
- Modifies registry class
PID:4684
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype jpgfile=C:\Users\Admin\AppData\Local\Temp\53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe2⤵
- Modifies registry class
PID:3008
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype txtfile=C:\Users\Admin\AppData\Local\Temp\53718543d44ab893cb34ddd54af305beadcabf1d3e96b3fb143c4dc059d8e08b.exe2⤵
- Modifies registry class
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443B
MD570170ba16a737a438223b88279dc6c85
SHA1cc066efa0fca9bc9f44013660dea6b28ddfd6a24
SHA256d3674f4b34a8ca8167160519aa5c66b6024eb09f4cb0c9278bc44370b0efec6a
SHA51237cc8c954544374d0a1ca4d012c9bd0b47781bc9bb8d0c15a8a95b9934893db3bedee867b984c20edabe54c39574abf7250de433aade6c0d544b8dd2c972c6da
-
Filesize
5.5MB
MD5eb29d6349782c2babc7873bb6cd779bf
SHA1bd3f0d926a6a091e295f6aa619660b54e9db8b8a
SHA2567c5c90471267664b128c1455d10edadaa6d747683064c2ff0960e731c5dcb26c
SHA512ff190703684f97c51242ccbf5cb3f5c58a9bde0e7d6a474b1d96c07d848f514fcaf5ec914bafb7486ab310a0f0d8ff1f79de5b60e84c8d27c3c7cbd3e3141b9c