Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe
-
Size
124KB
-
MD5
9b18ee1f93b12de35440b806738193a0
-
SHA1
470b58fb145e263f3f24486c1bb6e5b0b07c8e8b
-
SHA256
185ec1f78c7e749381597701565ece7cd923bdc00cc26251af51832e5c97e53a
-
SHA512
22d986ddc1d1a2b4bc9dd6914e2bfec7a26cba78f723ec74fec92d2a5f3999f9f21c443932956d505363a427b01d17c58069397dddc4adf011451820632cff36
-
SSDEEP
3072:31i/NU8bOMYcYYcmy5cU+gTn6HOjDhWrzvvQwlgOts5YmMOMYcYY51i/NU8:Fi/NjO5YBgegD0PHzSW3Oai/N
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe File created C:\WINDOWS\SysWOW64\qx.bat 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe File opened for modification C:\WINDOWS\windows.exe 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1867756978" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0461e700ba8da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31107083" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007bd2b5d2c6d91e4f8f2c8e8b7d41a41500000000020000000000106600000001000020000000fcd423d4ab0908374118c6a78a9ab35a836d99160c965a048d814a711858e6dc000000000e800000000200002000000029b0f259b88c73749ee2f162a563281b74ec4cf576d099b0e619ed51be8febd820000000998c47305303da06959d4ba66310e5cfd6cba0bd0638b7f31fbd7c25fe00dd14400000003d1573a117cc5682439ed6e19632dfaf0f3c90990c89bb9757bcf83207483bfe6a05b39c81ba4f2aa51e1bbb7f7753c606f8e783646d84a6fc017b32376b4331 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001b17700ba8da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31107083" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31107083" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422681946" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1867756978" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9AEEEF6D-13FE-11EF-BCA5-527CD1CC5F27} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1870413337" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007bd2b5d2c6d91e4f8f2c8e8b7d41a41500000000020000000000106600000001000020000000cf661ec4327c3bbc629b63db8b5084e522d0192d0c24f8f5f66b7073c02d8fc9000000000e80000000020000200000002fb3591d8060ea4ac91a45b5003d126bf908808a72f861ac7ba2032d1a9e8c9f20000000199fb7e3c84206fc2628bff11c0cc8a162503c983a47fce281003bce73be9fc1400000001a42e8f44e25b7f55afef397a8bd6c8229e4e0a21e8df91a3dadeee7fe65acaa8200f4855b1c1ca8c5b4891b91439d8ec1cf27604660a3f6213fc157699056f1 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3268 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 3268 IEXPLORE.EXE 3268 IEXPLORE.EXE 3252 IEXPLORE.EXE 3252 IEXPLORE.EXE 3252 IEXPLORE.EXE 3252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1428 wrote to memory of 3268 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 83 PID 1428 wrote to memory of 3268 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 83 PID 3268 wrote to memory of 3252 3268 IEXPLORE.EXE 84 PID 3268 wrote to memory of 3252 3268 IEXPLORE.EXE 84 PID 3268 wrote to memory of 3252 3268 IEXPLORE.EXE 84 PID 1428 wrote to memory of 1372 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 85 PID 1428 wrote to memory of 1372 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 85 PID 1428 wrote to memory of 1528 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 86 PID 1428 wrote to memory of 1528 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 86 PID 1428 wrote to memory of 1528 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 86 PID 1528 wrote to memory of 3008 1528 cmd.exe 88 PID 1528 wrote to memory of 3008 1528 cmd.exe 88 PID 1528 wrote to memory of 3008 1528 cmd.exe 88 PID 1428 wrote to memory of 2248 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 89 PID 1428 wrote to memory of 2248 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 89 PID 1428 wrote to memory of 2248 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 89 PID 2248 wrote to memory of 2528 2248 cmd.exe 91 PID 2248 wrote to memory of 2528 2248 cmd.exe 91 PID 2248 wrote to memory of 2528 2248 cmd.exe 91 PID 1428 wrote to memory of 5048 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 92 PID 1428 wrote to memory of 5048 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 92 PID 1428 wrote to memory of 5048 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 92 PID 5048 wrote to memory of 4824 5048 cmd.exe 94 PID 5048 wrote to memory of 4824 5048 cmd.exe 94 PID 5048 wrote to memory of 4824 5048 cmd.exe 94 PID 1428 wrote to memory of 5016 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 95 PID 1428 wrote to memory of 5016 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 95 PID 1428 wrote to memory of 5016 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 95 PID 5016 wrote to memory of 4640 5016 cmd.exe 97 PID 5016 wrote to memory of 4640 5016 cmd.exe 97 PID 5016 wrote to memory of 4640 5016 cmd.exe 97 PID 1428 wrote to memory of 5044 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 98 PID 1428 wrote to memory of 5044 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 98 PID 1428 wrote to memory of 5044 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 98 PID 5044 wrote to memory of 1056 5044 cmd.exe 100 PID 5044 wrote to memory of 1056 5044 cmd.exe 100 PID 5044 wrote to memory of 1056 5044 cmd.exe 100 PID 1428 wrote to memory of 2064 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 101 PID 1428 wrote to memory of 2064 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 101 PID 1428 wrote to memory of 2064 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 101 PID 2064 wrote to memory of 4500 2064 cmd.exe 103 PID 2064 wrote to memory of 4500 2064 cmd.exe 103 PID 2064 wrote to memory of 4500 2064 cmd.exe 103 PID 1428 wrote to memory of 1304 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 104 PID 1428 wrote to memory of 1304 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 104 PID 1428 wrote to memory of 1304 1428 9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe 104 PID 1304 wrote to memory of 2512 1304 cmd.exe 106 PID 1304 wrote to memory of 2512 1304 cmd.exe 106 PID 1304 wrote to memory of 2512 1304 cmd.exe 106 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 4824 attrib.exe 4640 attrib.exe 1056 attrib.exe 4500 attrib.exe 2512 attrib.exe 3008 attrib.exe 2528 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9b18ee1f93b12de35440b806738193a0_NeikiAnalytics.exe"1⤵
- Modifies Installed Components in the registry
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3268 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3252
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
PID:1372
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- Views/modifies file attributes
PID:4824
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:4640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:4500
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- Views/modifies file attributes
PID:2512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5ce22da433e34e64a164222adedda2dde
SHA1795bb029c6f283235b514cb458e2cb2cfdf4aff5
SHA2568019321a2ebf954425959493d26ce513e591c83ac0b989305e2791a23fac60f6
SHA512fa60949fec765d3fa4e4f6498073ec53e341d8ebd4edce9fa3f4af975cac709fdf39df78007db06ff5ff5762b166f07b515d3528e217dbfd9b37b67fc34a1458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5bfd1fc0b1b2a7b04f9478527049e842b
SHA138fd870a412426285f094bc24e6bf95bb2833892
SHA256af66570ad0d564328f19c1e8a2ae9f4253701546f9dd706d8ec5431a5100521d
SHA51216c30d75e601eb60960b8b96fa102d2eefc7818b883c1f0c4ce0030d112625a283c8b480632a258f8c6b8bd04560c401b4dc7b183791ec912901e2fed6b33e4c
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
124KB
MD544ff36480ce6c78cc0274441a59e5513
SHA12fbea23519781a3cdc340d52f546eed4598438a0
SHA256a76ff91355d9236470492b188e6d0fff7837ed1be4fd165f478394f747542ae2
SHA512f714813fbfd553d0e2348424a2c90fd7189654e7f702292be0a5b7781bc8b8dcad2b23d2d0e05e913539e5cf7296460ad09f958a6140b9db24ae07332a155169
-
Filesize
124KB
MD5d6c26bfbd45bf2a9764deab6753a47fa
SHA1c3c76fb1ade3f0ea75e1c643eada6b09cd9a3213
SHA2566617d5318e104cf1bc9659fc439acebd292da88f9289df2c3eddbb1b168eb65b
SHA512fe22b871954ac9c468bf58271acb2c0bc7268a81c2a0e31edc3180ab65246004bff4529a7b115d88de4f8b0e0477ee19d2460ac688e1825b8ba3a39afe518bb7