Analysis
-
max time kernel
157s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 18:09
Behavioral task
behavioral1
Sample
079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe
-
Size
60KB
-
MD5
079e9f46ceea31fe9f8d274fd31d8ff0
-
SHA1
7b66ae48e8df5d2f12b1f8ff2e58058905c73ef2
-
SHA256
56f4f3e34af6bcc7529f86762f918910a1a60ce06edaedeb229e547d9d95a7f9
-
SHA512
7d4929a5cd2b5112dedcf09800ca240a7d567e72a5bb2cd72cadfd8dc0531888ca9d9be7655cba09510fbc2f4bf8f2717340afc0e8016c246147150bef2d3ff9
-
SSDEEP
1536:FuGkxchM9tt/qU1i/gcU8eVTOK/YqjYYamvbtbWb3vV:kFxQM9/z1i/NU82OMYcYYamv5bAt
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe -
resource yara_rule behavioral2/memory/2992-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2992-1-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2992-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2992-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/files/0x0007000000023272-14.dat upx behavioral2/files/0x0007000000023273-15.dat upx behavioral2/memory/2992-16-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe File created C:\WINDOWS\SysWOW64\qx.bat 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe File opened for modification C:\WINDOWS\windows.exe 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31106602" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3BFD841E-121D-11EF-B9F7-DA5F53B51256} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31106602" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "291127054" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422475212" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a022393e2aa6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "291127054" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e15d6e14f38454ea63b5f1bfd95170200000000020000000000106600000001000020000000866dc6b1a0475622a999168e5b40fc4c4a08e83133b07361c3d332180e346108000000000e800000000200002000000053ebf8f47083c37b9e53245748a93da5881b98634652e22b0c66c8a163c2ace3200000006bf04fd6cecc964eac1ee09dfdcae95f6b17ed61736380a237b2734ed0a2461940000000a04bc3cc463826391bcc21ae475b3cf4ca175dea4185cc4f04dd2f025627a84680166268371b0478f3d43ca5b9fc06fd8b913c4962d6d090eb52b7533f91ab8f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31106602" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e15d6e14f38454ea63b5f1bfd95170200000000020000000000106600000001000020000000d479fea87c748fd4ee64bc154b16654db099d307f699af30348b4dfcb2eb02b5000000000e80000000020000200000003180e0bb6a1bbd9b74669e9b7d90f7aca76a276fbaa1aae1ebec663bc46e4fc320000000ed2e3e3b5c507430258508e20209e784031c89cdfbfe9898be13c17dd410171b40000000c78e2f39a52a203eaa777d499e9392ab3b4010b2fe01dcb0b04aa8c1881b13684b068941f60609a49bb0b5fed609e2ec6e54a9cc159147857e3258af845f4d6f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c5233e2aa6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "409251321" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2828 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 2828 iexplore.exe 2828 iexplore.exe 3888 IEXPLORE.EXE 3888 IEXPLORE.EXE 3888 IEXPLORE.EXE 3888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2828 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 93 PID 2992 wrote to memory of 2828 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 93 PID 2828 wrote to memory of 3888 2828 iexplore.exe 95 PID 2828 wrote to memory of 3888 2828 iexplore.exe 95 PID 2828 wrote to memory of 3888 2828 iexplore.exe 95 PID 2992 wrote to memory of 1736 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 96 PID 2992 wrote to memory of 1736 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 96 PID 2992 wrote to memory of 1736 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 96 PID 1736 wrote to memory of 4176 1736 cmd.exe 98 PID 1736 wrote to memory of 4176 1736 cmd.exe 98 PID 1736 wrote to memory of 4176 1736 cmd.exe 98 PID 2992 wrote to memory of 404 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 99 PID 2992 wrote to memory of 404 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 99 PID 2992 wrote to memory of 404 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 99 PID 404 wrote to memory of 1496 404 cmd.exe 101 PID 404 wrote to memory of 1496 404 cmd.exe 101 PID 404 wrote to memory of 1496 404 cmd.exe 101 PID 2992 wrote to memory of 1944 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 102 PID 2992 wrote to memory of 1944 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 102 PID 2992 wrote to memory of 1944 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 102 PID 1944 wrote to memory of 1516 1944 cmd.exe 104 PID 1944 wrote to memory of 1516 1944 cmd.exe 104 PID 1944 wrote to memory of 1516 1944 cmd.exe 104 PID 2992 wrote to memory of 2468 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 105 PID 2992 wrote to memory of 2468 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 105 PID 2992 wrote to memory of 2468 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 105 PID 2468 wrote to memory of 4036 2468 cmd.exe 107 PID 2468 wrote to memory of 4036 2468 cmd.exe 107 PID 2468 wrote to memory of 4036 2468 cmd.exe 107 PID 2992 wrote to memory of 3164 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 108 PID 2992 wrote to memory of 3164 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 108 PID 2992 wrote to memory of 3164 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 108 PID 3164 wrote to memory of 3328 3164 cmd.exe 110 PID 3164 wrote to memory of 3328 3164 cmd.exe 110 PID 3164 wrote to memory of 3328 3164 cmd.exe 110 PID 2992 wrote to memory of 3232 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 111 PID 2992 wrote to memory of 3232 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 111 PID 2992 wrote to memory of 3232 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 111 PID 3232 wrote to memory of 1936 3232 cmd.exe 113 PID 3232 wrote to memory of 1936 3232 cmd.exe 113 PID 3232 wrote to memory of 1936 3232 cmd.exe 113 PID 2992 wrote to memory of 4920 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 114 PID 2992 wrote to memory of 4920 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 114 PID 2992 wrote to memory of 4920 2992 079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe 114 PID 4920 wrote to memory of 628 4920 cmd.exe 116 PID 4920 wrote to memory of 628 4920 cmd.exe 116 PID 4920 wrote to memory of 628 4920 cmd.exe 116 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 1936 attrib.exe 628 attrib.exe 4176 attrib.exe 1496 attrib.exe 1516 attrib.exe 4036 attrib.exe 3328 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\079e9f46ceea31fe9f8d274fd31d8ff0_NeikiAnalytics.exe"1⤵
- Modifies Installed Components in the registry
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3888
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:4176
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:1496
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- Views/modifies file attributes
PID:1516
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:4036
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:3328
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- Views/modifies file attributes
PID:628
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD56ca93196138f9fee6ec4897c1b19c0d8
SHA1b2ce0d576c0991c2a03f8fa356dc78503fe2250b
SHA2562e28e2efaf25dd0c3f57c072bcbd843d2cf6c77302794618f158f342f1df0559
SHA512152ca8fdabaf5c705170db3777e57a75efada0c89fd473fa042471281a34742c92c3a74592c20c5ae25399f1ffe7197a13a629d81d0a8cb7531e2d1134616a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5b3fca13306c0994e98e8a2a8a4318c7e
SHA1aa50cb32f571d8729a0eeae43a4d4a9e69443c23
SHA2561c2099f5d887311067fd8f3b081f7eebdbfb008e111210b574008fcaf142fc9d
SHA5127407d3a64389e465fd1072f5cd88191db4f453974bef7471afb27c770307c000e7334354fcdbdc67074092f051ccfa9b52753851708a39633a2ec83c69258323
-
Filesize
776B
MD50542ad8156f4dfca7ddcfcb62a6cb452
SHA1485282ba12fc0daf6f6aed96f1ababb8f91a6324
SHA256c90cdefdb6d7ad5a9a132e0d3b74ecdb5b0d5b442da482129ba67925a2f47e8f
SHA5120b41affa129277bf4b17d3e103dc4c241bc2ac338858cc17c22e172ec2ac65539b63e802246efb462cd134d99907d9c5ed9bc03937cadcca3155b703ac6e3195
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
33KB
MD524bb520e9517f2ed3ed987b46aeaf723
SHA1846723563d7dd2bff3954f93633b11af0103adc8
SHA256d1f1bfe698f2ffb7b3e7a885a301d58f9554d45df0a31c3e8b53c84b33c80d27
SHA51231afbcd2ee87c84cc3e56355da8ddc741a69d918c2687984265745d8046deb18c494cbca6aaf8d4eae6b035e888e6f7cf9b0d59a255f2714963d7b3edbb3c87f
-
Filesize
60KB
MD5bd0106627b53cfff5787e7835c48fd7b
SHA1e684498df83f9db6c7dece6558fb7575e7532978
SHA256d27aee0f20d03c2b3becca70776ee5abe9af3f4f6268b1b531d7f06ebd074ec6
SHA512e1f1a8d887031cae66c4e58b668ef1d9308d6912f3a3442fd79d3a71f2eb177e38213348d9574b9d2abf0dedca0ca6e472e1b819b8d44a085edf403258a0a729
-
Filesize
60KB
MD548b65f2b08207c3e0437fb674b564d86
SHA134bed73674acd5559b1741510dde909683008bac
SHA25661d2c1951f0c0e246c113df0cd9f2c5b7509b11ee5e2576464f4e80be363a1aa
SHA512f160e5bd5f59bfc5d8a91b0c4903b95aab124c6f9a252c80396ff200a27216227626287fc592b611091672fdf3b12034b1b311fd2c6c994b877da36c423ff94e