Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 23:25
Behavioral task
behavioral1
Sample
5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe
-
Size
232KB
-
MD5
5b40eb52a80d2054cb2906d13deb7c40
-
SHA1
d0ee190b6a132b1324b6a2b52e429814227c26f5
-
SHA256
62cef54800b9c993c670651f26030708baed0f9dd9abfbcb32c8b2b3d8c6abb1
-
SHA512
d849c71d66f07e17d99b7e8198ba9c0c40cb4ad3c2965547a7d0c6ea9b74ce5dd823243d79b3b1d6f5003f32b0b5d200bb035772e11dd5cf1397e70caf7fad68
-
SSDEEP
3072:91i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1VOz1i/NU82OMYcYU:fi/NjO5xbg/CSUFLTwMjs6oi/N+O7
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe -
resource yara_rule behavioral2/memory/4416-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00080000000235b2-17.dat upx behavioral2/files/0x00070000000235b6-21.dat upx behavioral2/memory/4416-161-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe File created C:\WINDOWS\SysWOW64\qx.bat 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\windows.exe 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe File created C:\WINDOWS\windows.exe 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3726784437" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\Main 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c184f543aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31107651" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3726784437" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b2e58ab8bf361247b7301f68e304ddb200000000020000000000106600000001000020000000a3eb75fa85d99538e364550ea3d6f926ea2d8d86731beddc5c4938d17dbeb2d5000000000e80000000020000200000001a02995c3a89ceca6f6972f90d017b6af9361f634641c4c79cc0169861f1352220000000759c77c883055f9c9f74746aa42e8417ba11d2dfff2fee2bc0c140599b2c25c5400000001fa7798cf1f7c38a574608d6cb37053d947a3aa7b0da81ab3f77a2b50ab33e642831e9f8accc6b145b0789c37522f7340cc19e6dc39640543b2e504058745208 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{09BD720B-1637-11EF-B8C0-D6AA8B0874BD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422926086" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31107651" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b2e58ab8bf361247b7301f68e304ddb2000000000200000000001066000000010000200000007b98e246d77112e3b7367ec0a7acc10529c813a2c6e511b44107fbbaf4f0e9a0000000000e8000000002000020000000e0a3ef6de3b7a994bef2f66ce12596c1a6ff39e99303befb590cbaa08002ed6a20000000f96ffa6daf0d283e056692915b6d6d1aada708c55a9dd828e2c7c00a17236aa2400000006c039baa40deb0f65bac6f27613c2d371570561766ca52af4c1fc4efccc6ff2ec6946cc27f5bae8a7d22d94c897d8fd1119b1dfcb981f7d02ff6fe6388d205b8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00bd7df543aada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31107651" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3730222340" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5088 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 5088 iexplore.exe 5088 iexplore.exe 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4416 wrote to memory of 5088 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 90 PID 4416 wrote to memory of 5088 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 90 PID 5088 wrote to memory of 1536 5088 iexplore.exe 91 PID 5088 wrote to memory of 1536 5088 iexplore.exe 91 PID 5088 wrote to memory of 1536 5088 iexplore.exe 91 PID 4416 wrote to memory of 2384 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 92 PID 4416 wrote to memory of 2384 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 92 PID 4416 wrote to memory of 2384 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 92 PID 2384 wrote to memory of 1396 2384 cmd.exe 94 PID 2384 wrote to memory of 1396 2384 cmd.exe 94 PID 2384 wrote to memory of 1396 2384 cmd.exe 94 PID 4416 wrote to memory of 3316 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 95 PID 4416 wrote to memory of 3316 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 95 PID 4416 wrote to memory of 3316 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 95 PID 3316 wrote to memory of 1356 3316 cmd.exe 97 PID 3316 wrote to memory of 1356 3316 cmd.exe 97 PID 3316 wrote to memory of 1356 3316 cmd.exe 97 PID 4416 wrote to memory of 4860 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 98 PID 4416 wrote to memory of 4860 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 98 PID 4416 wrote to memory of 4860 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 98 PID 4860 wrote to memory of 3300 4860 cmd.exe 100 PID 4860 wrote to memory of 3300 4860 cmd.exe 100 PID 4860 wrote to memory of 3300 4860 cmd.exe 100 PID 4416 wrote to memory of 1020 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 101 PID 4416 wrote to memory of 1020 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 101 PID 4416 wrote to memory of 1020 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 101 PID 1020 wrote to memory of 4364 1020 cmd.exe 103 PID 1020 wrote to memory of 4364 1020 cmd.exe 103 PID 1020 wrote to memory of 4364 1020 cmd.exe 103 PID 4416 wrote to memory of 3604 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 104 PID 4416 wrote to memory of 3604 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 104 PID 4416 wrote to memory of 3604 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 104 PID 3604 wrote to memory of 1816 3604 cmd.exe 106 PID 3604 wrote to memory of 1816 3604 cmd.exe 106 PID 3604 wrote to memory of 1816 3604 cmd.exe 106 PID 4416 wrote to memory of 3712 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 107 PID 4416 wrote to memory of 3712 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 107 PID 4416 wrote to memory of 3712 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 107 PID 3712 wrote to memory of 3620 3712 cmd.exe 109 PID 3712 wrote to memory of 3620 3712 cmd.exe 109 PID 3712 wrote to memory of 3620 3712 cmd.exe 109 PID 4416 wrote to memory of 3772 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 110 PID 4416 wrote to memory of 3772 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 110 PID 4416 wrote to memory of 3772 4416 5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe 110 PID 3772 wrote to memory of 1828 3772 cmd.exe 112 PID 3772 wrote to memory of 1828 3772 cmd.exe 112 PID 3772 wrote to memory of 1828 3772 cmd.exe 112 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 4364 attrib.exe 1816 attrib.exe 3620 attrib.exe 1828 attrib.exe 1396 attrib.exe 1356 attrib.exe 3300 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5b40eb52a80d2054cb2906d13deb7c40_NeikiAnalytics.exe"1⤵
- Modifies Installed Components in the registry
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5088 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1536
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:1396
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:1356
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- Views/modifies file attributes
PID:3300
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:4364
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:3620
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- Views/modifies file attributes
PID:1828
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4016,i,6593821857742176458,13646536021844995125,262144 --variations-seed-version --mojo-platform-channel-handle=1716 /prefetch:81⤵PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD550beaeb29c1828aa58b55057a8017095
SHA1307492f413ef87df41277ca164eea78626e75381
SHA25618d22ed4722a234c4d0213522c955b6e447564401621c1ba843f2a91ce4a3492
SHA5129ef69f048bcdfa7b18c192977d15ec6477748cc697bbed97ab5ae1a3b1871d7d06613011b310eecd2bc32512d80214cb0784a1d9b6f9dd766367ef593fedaccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD57d0b81afe753d771aa722023f6dce83c
SHA1340724903a619cc24225076f3b5b4709a8747bed
SHA2568752bce2aa1b244411ec3e498559328a200bdc01bb8adf64c7c551d7fa1064d9
SHA512cd4e8b089183a81c2149c5ea3a463a9c75c4c53507e176a18d373ac7b6e49d115a792b81801e39c62f33790d6e19a9e209bb9a87a12f7346818a0dc776f6955a
-
Filesize
33KB
MD524bb520e9517f2ed3ed987b46aeaf723
SHA1846723563d7dd2bff3954f93633b11af0103adc8
SHA256d1f1bfe698f2ffb7b3e7a885a301d58f9554d45df0a31c3e8b53c84b33c80d27
SHA51231afbcd2ee87c84cc3e56355da8ddc741a69d918c2687984265745d8046deb18c494cbca6aaf8d4eae6b035e888e6f7cf9b0d59a255f2714963d7b3edbb3c87f
-
Filesize
776B
MD50542ad8156f4dfca7ddcfcb62a6cb452
SHA1485282ba12fc0daf6f6aed96f1ababb8f91a6324
SHA256c90cdefdb6d7ad5a9a132e0d3b74ecdb5b0d5b442da482129ba67925a2f47e8f
SHA5120b41affa129277bf4b17d3e103dc4c241bc2ac338858cc17c22e172ec2ac65539b63e802246efb462cd134d99907d9c5ed9bc03937cadcca3155b703ac6e3195
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
232KB
MD565daed10392422fcc31c183f18d6265c
SHA14513cc4c9b9fab2e355b39b797223354ab019e5d
SHA256872d3b86e0801a1302a5ed7ad2b9d3fa5aafea8a0462501f2b0f01ae78d361b9
SHA512b27fb94f9137bf076e3468c00efbf6401a4b3aa6fbffe77030c856dfbbe1948f72800490805918913a7fed3d064e0047f4a1fa2a40bde3bc0c953f25f8deef3d
-
Filesize
232KB
MD571ba5b63529233ae5d4b295906fa8358
SHA1b655a97f4a956399894f599971a18a9144ec42ea
SHA256226e1c1ede5344418d7278fa623d57ab173553f8256bf202878fcf4049e8d360
SHA512c755e886f27fbbb6643367cff9bf1730ef7f9ac5632c8841d44acf897ae8ef97c758dec6cce4157b76a6a0ab50596d6a42ffa3256691525cd4fd84f40940fc52