Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe
Resource
win10v2004-20240419-en
General
-
Target
06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe
-
Size
671KB
-
MD5
9a4b501dc55c2ec1bd279aacf873a71a
-
SHA1
4c2dcd8487d2c4c6c8f01631992067f1913d0f45
-
SHA256
06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd
-
SHA512
437b42db772013ce5753f13a95ec38bcdc01eba6ffc18c7e8d486b3483b5a96316826805db0062e2f1112b971ff3de7f8231ed341de28e17c1153d22ee0919fb
-
SSDEEP
6144:tVfjmNNYEMF2LJ65kzLpKhlD24mqPrUeXivA29PRqYw:L7+NYEtLJ65kzLpA1VPrkJOT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2132 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1784 Logo1_.exe 2628 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe 1200 Explorer.EXE -
Loads dropped DLL 1 IoCs
pid Process 2132 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Desert\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe File created C:\Windows\Logo1_.exe 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300a67aba39cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000002bba4ee898b9a9e1c36f30a04e326a0cb0a77c4d0b262166b3798c5ce93fa67d000000000e8000000002000020000000a494b660a5ecac5a8cc0f3d9152a8f4a6e9451da81f592f16fb7c22fda61397620000000afe74ad6f2d90a03e69ec0c4004eae60d829fae514b7a5b465b8f8b1de79020340000000d7cbb0c780195c7d5ea68dd8996d4cdadb41b6d672b9b1873423821c6027ce6fee02258431a3e6d313909e2ee63640f642898268f3901b5bf990adc12398b5cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D50C4351-0896-11EF-B826-EA483E0BCDAF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420824806" iexplore.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2132 2968 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe 28 PID 2968 wrote to memory of 2132 2968 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe 28 PID 2968 wrote to memory of 2132 2968 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe 28 PID 2968 wrote to memory of 2132 2968 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe 28 PID 2968 wrote to memory of 1784 2968 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe 29 PID 2968 wrote to memory of 1784 2968 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe 29 PID 2968 wrote to memory of 1784 2968 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe 29 PID 2968 wrote to memory of 1784 2968 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe 29 PID 1784 wrote to memory of 2096 1784 Logo1_.exe 30 PID 1784 wrote to memory of 2096 1784 Logo1_.exe 30 PID 1784 wrote to memory of 2096 1784 Logo1_.exe 30 PID 1784 wrote to memory of 2096 1784 Logo1_.exe 30 PID 2096 wrote to memory of 2704 2096 net.exe 33 PID 2096 wrote to memory of 2704 2096 net.exe 33 PID 2096 wrote to memory of 2704 2096 net.exe 33 PID 2096 wrote to memory of 2704 2096 net.exe 33 PID 2132 wrote to memory of 2628 2132 cmd.exe 34 PID 2132 wrote to memory of 2628 2132 cmd.exe 34 PID 2132 wrote to memory of 2628 2132 cmd.exe 34 PID 2132 wrote to memory of 2628 2132 cmd.exe 34 PID 1784 wrote to memory of 1200 1784 Logo1_.exe 21 PID 1784 wrote to memory of 1200 1784 Logo1_.exe 21 PID 2628 wrote to memory of 2760 2628 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe 35 PID 2628 wrote to memory of 2760 2628 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe 35 PID 2628 wrote to memory of 2760 2628 06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe 35 PID 2760 wrote to memory of 2484 2760 iexplore.exe 37 PID 2760 wrote to memory of 2484 2760 iexplore.exe 37 PID 2760 wrote to memory of 2484 2760 iexplore.exe 37 PID 2760 wrote to memory of 2484 2760 iexplore.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe"C:\Users\Admin\AppData\Local\Temp\06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1F92.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe"C:\Users\Admin\AppData\Local\Temp\06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://pc.weixin.qq.com/5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2704
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD53677fb5e9764d62d39914c5b6a75045b
SHA198bc3b462658b1d9d193a09e75e51fc4a11cae4c
SHA256674c630f291d1ce65a6bdfd48a2c14aecdf7cbfb796cd7b7d66644521796fb7e
SHA512bbf1c14a2b7f72e8b92a68199b93dc3e4937f74dc2b99ff768d7ad1e5791b6a201bd7b3873e3389c7ec6951884f73b9977b5b6c8af9db09b735a11f3744a318a
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_9B8670363F58B4643EB28A4A03EE9887
Filesize471B
MD57e332fffd4859179f8afc43534dc417c
SHA1b4de5e93557e2e30dcaa670dcffea28ef26e7779
SHA25606814f9295436b1a9e6fe8b3f7ca9bac39c8806397c098c6e88aab895a44a1db
SHA512b3c76a98dc8330f1a4642e4ac1c0062cf43521192adf853ac83e3850fb2ac4ed0dfe3e6491b2743162716c5926350b3e02217f6c0a3031d18914933cf765fe95
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5bf707ffc3eeab88c246bbc70fc9a67d1
SHA1d5460a6467f8b9bba5f929e0fb6e5b8ea2eef2f1
SHA25650aeb11751245e19d9746efb4dc19ac33497633cdacb0c5fea53975ec0a364a3
SHA512683ddc5d8d64b9727420734df3755c91a450f6c512b3eed73c8aef4844ca5fad8ae4176e71ca6193de5ed9f9757a405b9b7ba7d364a983912481109f50e73895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1d955766f53c6f9852bfaab88f59df5
SHA113cc8b479e058f25f4eb378577782e50053bdedc
SHA256e87edca58c6e4853d25adb042383e2e94b258168b562eec91640d43726b452d7
SHA512642a2cc0c7cdeb704956f5eecba0e83018373757cae77a43e11f505b53774254c107816bde363e159c7921a5034192e49e488175715901c4cf73a40facbb029b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc3326321f8cedd2f606a0623076355d
SHA171794855ab4a4c39c9078a0590e03a2ce21a2462
SHA256a95a9072706eea9f6f916870ac03002be96a5055a9637f20f57cc65b0f048c36
SHA51251d95f06e3392e4b06ab9397e6328c8a016966f113a03d449e54678d55aee817d4c9e03b4e9d6d565093e81ab6d58ec764ecc26c955edde817c599639bdcdbff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5ccba6c9c241fbd23ff05516d436928
SHA129fd316b01462759f11820e390866495dfbe46fc
SHA256b6edfdc11f6cdaa3ab66c822e7edbd9096adf62a5688fd6da86ad0d8418a1161
SHA512ff1a42bed13a7189c3824b1aa50e9ee59cf7ccd22a6bf9038a6a8632cf7e65168200156c95be237ea5c07007790ad6ff2740ed8e3096cfb053c398ea86cbfbd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57160e2b9701a5e796c4ecc073e9829fc
SHA1d7a6786ab939e4ea96502073279a421b68c566f8
SHA2561a1171060d98d12833561b2233c0e070be28ac6c6ddde23b08d5a29be590b4d2
SHA512c4702e0768202cbf67bd3ff3a961a122babb9dae5b116c3006411721c6c6e2f90099d69f01403bf1e96036f7dfe03aa0695ced4064d8da4662c4b785d13fdf40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5276dae776ca5d0bca9907a29ecba6890
SHA14f9d9f6643130e44ea44a55231c29a40f059d30b
SHA2568eeb2341a1aa801cef5625fddd9e6e4911cfd021043dd57be5f1653c0c9547c1
SHA51296a7c3333075a5cd88050c40ccd7576d8d2dfc9a98b22f68b8d7302d708180be6d1ea9fbeda9c1257dfd4446ab237ec156e88d87bd1afbaf6cbf28d3addb3201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522ce9a4ad97100e32e8f734abf79a220
SHA1295f0559b5af0763b76d1d3d90aa925cfb18f32c
SHA2566a21c090eac2e64ad6ec4d3c8ea88d86b3439f4b879ec271e09b12ac5aee2a44
SHA5125a89a4f0c6c2172df8c0ba10512a03a0ac9a8a82b0ed8da4a7def2993f45a7ac291636f9a77606666d735323201878303b8ec13db2dc2ff510eb68d382c6c8a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0a1a22538fc85cb56e9cbf7d2a98f71
SHA15dd553ddef37b0abb8d126f829a9e7a4a3f883e9
SHA2567cfdbc2e7e9cae07a0a657a33ee9a346cd78c1ed9c768073ba378bf0df5536ee
SHA512959d7c275248c1cfa7d4ca693654ea057f0067ff842c0c6f650b9f616bbca1cbbfd3c683dffbb5f8aa46bf0eb3329260faa0cde3138c5ff97e9857f2381b09f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b260b647d939564298342f37bdb98746
SHA1c06c8f4422cf256d6f7f82d8f25683a3d320b21b
SHA256487540644ba285782a323dd16c97b673c820079d4a06ce476c4649be4888eb90
SHA51205702640c26437607698261428fd2e6205fee220e3c31a9b33eea1e42cc1560ed5e64d6955f07f74650a7185289d2b8fc0164f79204d60e5fbac2a0ae741dfea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59db264e32a0d1bfda78bb3df252cb84d
SHA1d98d8df0d012611b2bdb08885fbd15a798a4322c
SHA25602646448534bce69c9eb597e4c084f10461a821219edae013fcb9076c8402468
SHA512445aa0175c80d792ede0d725d8a94506241b54d963cfb34834f23b153e70596968ebe35728d830ac22fde5fc39a4b8c2134e0cc9343a33428ed6589ea26ca706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a36f47fe19648f920e4ef215e9b2f989
SHA1d648f417ee58b09b94683ad43f8ad758d2646bc5
SHA256ea41c55efe7f38efbea183ed213221ff7c66dbcf9a6eaddcabe161dd706b7708
SHA5123880aac7f6672812113c63d3e682c92f33c9250650e52bea519b56f374e5f814ba8e7fc58bc093e35c64cfd0b6f33699d0a24011a2100bbcdc9bc0208373cff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d27fa404aea5926f424640374c73635
SHA158fe11314a38b2f22910bfbfaeea36055c5957d6
SHA2569fe36d4499ca26ea1257c8c493321ebfc56837f2eb297a95093dfcf362557cc9
SHA5120ce9cf0527e5e6fdf323b14372b1f29da7834fea70f0bbd9712ec589154ebdbc049b2a31633c9aa8d1c31a1fc269844ec95fab59bbdef0b3bbf993c1dfaf22e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52617887e88a13b1afc6ae492abd08485
SHA1f4c854f34d2925f4577c000b1a2a01606b651eaf
SHA256f4a64713357cd9a94f0bc51fb9a1c9903871201da1ab92e5d5524f073691f7b7
SHA51281064c2b14516a4f28abdb46758692e729027a1a12ec996e02644707a0dbf24b4fa86fcb65b6ed1924d9ff531271f33d6092899bc7215a9247608c55322047c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b642e15abedcc02d3d95df846852c60f
SHA140e2d80df7cdff52f2db755a94ea0bc362a09f5f
SHA256507d0184feff3fc7ac0c17c9e67beb8a6fada46878947a174ecc8765ac1a2636
SHA512ba6c54cf05b6443ce08498221a1358c5b65d83bec20d52749c4f34c332213c3c481dc6f7cb71a2cfe68bd325cf56314a3927ef3a8d0a4387ff90ad967cab1a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c73b9a1a5282ed68ef5db95cbf99e8b5
SHA1b3f5b89dd8edaddf1662cfec9612316466f48f3b
SHA256320b6a1ac30ea5732253a550a6f0e8d6bfb34ef2dc9ad29f4deccf8cce12209a
SHA5120a637ae747a85bef48b2d189cf32a3a0e818b45164533877fa6ed15e9162f00d5b91187765fd2422ccccaff5cc846c0ba902bcbec8665e2f237befcec63986b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572d81d7805e24dc4d7fa9058f8eeb026
SHA1b48e912c5611393dffd146006e83ea1519f8a624
SHA2566b027bad35adcd2cf950d9e72ea4f053c084c5ffaa9112c7bbbc454d3e7dfd86
SHA512e79b5d8e7bbb0595e4ee9294bd9b1755bbb17c7fa5d4f12fd1d4d5f352082a6f72ce10a82d82b7043a1aef4ad011c7b3d7cc8a1599810f277b8c01dc4fb0f76f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555d093d21cc24e868d19cbcd287badda
SHA14b5e403e180498a21f1a2ae3db51553a36ba29a6
SHA25609aaddc8d3b44b71e495bf25c6ac4102667f1c660521e886ca817cde09903c85
SHA5127027c35f44261a4ac018890599b31ce6b3b968d44d2db851d56c600fe3657b1ba16fcbc64bccf5ab94b0273120ce30502109dd9b514217ea9a9ce60e4bd71173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5607649db300927c0d77e02764994c300
SHA1288bad73329926d9c47122b6afdd7060158eea11
SHA256c2e8cdf50477990588ba45f92883813ab237cd4e786abbec527df2d8082ce659
SHA512ebbee006a8072d0dcd777fdbfde76bfad42b40a28c0772ce86896f24e596cbb15d855e8dfb467022906be980e2b63993810bc486a00342c9db4e701ce50e53a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d352001ac7b5fd85aba05ed689417220
SHA149e59c6980d9b5d7269090a54d30739197989bdc
SHA2563804314db30f9ba3b5018cb1d77a98e1ad680338794069eda210cd63de087e48
SHA5126ad572da437e6f059d5ddbb55b1a942824fa59832f2362043fdf3215c369150a3293e801564bab05246e1f7c1bfe177abd7f0c49e865892bbabaf441fc7272fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD540f252fb0de1db8636e36d835ea42921
SHA143c15f5efcd3e559b1d885c655d47730d0c5bb51
SHA2569677204b87f267b3582bb9b076e5d01bae1e2d0c5dffa754564c8c167e758cda
SHA512c7af72f02b09c5f8c1a51374751ca1077a92512aec58cc5b461220a428d4e2952094422c359abbf89d061999394190c72175dfe2dbaf0e0de84f4a4c6862460d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD580627708d8fcff285ad5e77fad52144e
SHA1fdb89210c7dba5041e5154aa682cf758d476411d
SHA256b972e5da9bdcf7ed9685776c03a6f782f6aa57eb4829c029023c287597d65d57
SHA51292f89651838a39935a3390b06fa29dc4d1c7169cfdebfc44e0eb70a65cbc50fea9b13e5fc5147a4b50a5d47b3d1daec262a65caded5658805f18d1c115591a77
-
Filesize
722B
MD522f043cfde7e8563fda1d80c9d004591
SHA1f94493dc5fef355f67913a2ce860d6898df5a0f2
SHA2568dca7b0317e21848a15709e325bd4fb0dffc957ff67b9ae83b66f7e241c2937e
SHA5121cae77f6580a0c673f2272063c7671f2873ccdda729b873a3bc98b550359b51bb32638005fb3d1cfed162bdc22dee1b6f5f823ce78bd4d28470ba21733170862
-
C:\Users\Admin\AppData\Local\Temp\06cee795e6b1e47b965a1eab36d3cea63da2b14858f91af550b41ad171938edd.exe.exe
Filesize644KB
MD56058d1bda0b3ebda6777191add4a05e8
SHA192e534bbd284b8df9754cc5db4bc35cc63b3143d
SHA2561df8ce11a144020023a8137af8152648e55347b5a2f5c4460e383b2cfa4bf6fb
SHA5126d30c12a2d79d04f0535703532f79f0b4ccc6667c9fbdf2273b53f81d0b2ca0fc21db3ae3dd32cbd34d7467a500ca4ab852f754301703b4764395cf3e5ecad41
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
26KB
MD5825216c8a1bed70ba85f7f96f4bb9ea4
SHA1e887911354ec4a872c135e85c9b4af1192108992
SHA25688e784f545599929f6ee64aa5ac1b8bf13f8e3bdd9f0292593fba818514b561c
SHA512abec1f87177e85ee4dc1b2de576cda63d18e608cb300c85cb34768454c24ec9097950dc1d3d51dbddaf169db8c5d9be214a9c2d736f616bfc7f869c3e5d50128
-
Filesize
8B
MD54b4dbd7e2fe4189c8136069a10e1698a
SHA1e4e6e1e80d1fe41d20456173c522d8e7affc4579
SHA256f00f66ba8f3341c7ae8e3c7741a1ff31e522c75580afa9793dcaee17488ccf5b
SHA5122be5b324ef5d951c5e66d692c26f813e0fdd76cb4ef01a9abf38e5f7837f649e0194f7f5c55b1cfd79a9d253031ace5b270fc50f6c11f1885e85f9a874380d8c