Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 00:57
Behavioral task
behavioral1
Sample
7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe
-
Size
232KB
-
MD5
7667691009c6571cee92de84a0a7e350
-
SHA1
c7fab2a46f836a735196e02208358b496f5ede89
-
SHA256
08952fec93d3fc25e668156742f8110d52ec5765c41f104375aaeb25c55951e0
-
SHA512
0421042672fe858b85d294ec1bffc93ad07f97b124140a1c4fbd64b850f9f06fd3d20ebf7abc80e7b5fcdcbdbfb25668a486958f6bca18c2c7555ae44825e4d6
-
SSDEEP
3072:H1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1Vne1i/NU82OMYcYU:Vi/NjO5xbg/CSUFLTwMjs6wi/N+O7
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe -
resource yara_rule behavioral2/memory/3492-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x000900000002340b-11.dat upx behavioral2/files/0x0007000000023415-18.dat upx behavioral2/memory/3492-168-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe File created C:\WINDOWS\SysWOW64\qx.bat 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\windows.exe attrib.exe File created C:\WINDOWS\windows.exe 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe File opened for modification C:\WINDOWS\windows.exe 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3092661396" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31107664" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422931606" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3094380593" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3092661396" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000150dfb3d7d297149b53fa5015b24f84400000000020000000000106600000001000020000000e2f1abb670fa10b8755a0a7417ff94968e2c4b6dcb8a0dd4994a3ff3dcaad73e000000000e80000000020000200000006bea4e9fee5039eb318e12cf7b28d4398b807ab03461480498ec1174c157c4252000000046d562ebda2935ee6949e4982aa115494da73589871e83b74895d632092d257c40000000410db98518b400e8673945580d7d0a25a6453c16bfd83accfbb6fa8ce0392f9ab71804881b28c93c95fbee7a279799d235e084c38b919c0c7a4b68f3b23e5eae iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31107664" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407184cf50aada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E3E0CDCF-1643-11EF-B865-DA40134A5F51} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31107664" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3094380593" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31107664" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000150dfb3d7d297149b53fa5015b24f84400000000020000000000106600000001000020000000c6c7204ea24707b3c41c523846430141a19a64bb1c812265d21ef1382a1f83e7000000000e80000000020000200000001e6c322414b426797f7d58df11328bca91892e6bc26ae1edd7e5639016b8110c200000001ccdb6174fea8b7e05a45a8f4c7fc77b306000f9dfcc6f6b2c039d0044632194400000009f12e3ed0b42ba3bb6a3788c4227757b3fb41e1e4788501a6f037869d30432efdca275e31a31da1e7418c99423cc257a55e7a42ae010f5d5bc2195962bcd6235 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b67fcf50aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4308 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 4308 iexplore.exe 4308 iexplore.exe 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3492 wrote to memory of 4308 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 82 PID 3492 wrote to memory of 4308 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 82 PID 4308 wrote to memory of 1696 4308 iexplore.exe 83 PID 4308 wrote to memory of 1696 4308 iexplore.exe 83 PID 4308 wrote to memory of 1696 4308 iexplore.exe 83 PID 3492 wrote to memory of 1248 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 84 PID 3492 wrote to memory of 1248 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 84 PID 3492 wrote to memory of 1248 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 84 PID 1248 wrote to memory of 3208 1248 cmd.exe 86 PID 1248 wrote to memory of 3208 1248 cmd.exe 86 PID 1248 wrote to memory of 3208 1248 cmd.exe 86 PID 3492 wrote to memory of 4816 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 87 PID 3492 wrote to memory of 4816 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 87 PID 3492 wrote to memory of 4816 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 87 PID 4816 wrote to memory of 2132 4816 cmd.exe 89 PID 4816 wrote to memory of 2132 4816 cmd.exe 89 PID 4816 wrote to memory of 2132 4816 cmd.exe 89 PID 3492 wrote to memory of 4804 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 90 PID 3492 wrote to memory of 4804 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 90 PID 3492 wrote to memory of 4804 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 90 PID 4804 wrote to memory of 1216 4804 cmd.exe 92 PID 4804 wrote to memory of 1216 4804 cmd.exe 92 PID 4804 wrote to memory of 1216 4804 cmd.exe 92 PID 3492 wrote to memory of 4912 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 93 PID 3492 wrote to memory of 4912 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 93 PID 3492 wrote to memory of 4912 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 93 PID 4912 wrote to memory of 2472 4912 cmd.exe 95 PID 4912 wrote to memory of 2472 4912 cmd.exe 95 PID 4912 wrote to memory of 2472 4912 cmd.exe 95 PID 3492 wrote to memory of 5044 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 97 PID 3492 wrote to memory of 5044 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 97 PID 3492 wrote to memory of 5044 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 97 PID 5044 wrote to memory of 3904 5044 cmd.exe 99 PID 5044 wrote to memory of 3904 5044 cmd.exe 99 PID 5044 wrote to memory of 3904 5044 cmd.exe 99 PID 3492 wrote to memory of 3132 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 100 PID 3492 wrote to memory of 3132 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 100 PID 3492 wrote to memory of 3132 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 100 PID 3132 wrote to memory of 2864 3132 cmd.exe 103 PID 3132 wrote to memory of 2864 3132 cmd.exe 103 PID 3132 wrote to memory of 2864 3132 cmd.exe 103 PID 3492 wrote to memory of 4760 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 104 PID 3492 wrote to memory of 4760 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 104 PID 3492 wrote to memory of 4760 3492 7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe 104 PID 4760 wrote to memory of 4920 4760 cmd.exe 106 PID 4760 wrote to memory of 4920 4760 cmd.exe 106 PID 4760 wrote to memory of 4920 4760 cmd.exe 106 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 2132 attrib.exe 1216 attrib.exe 2472 attrib.exe 3904 attrib.exe 2864 attrib.exe 4920 attrib.exe 3208 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7667691009c6571cee92de84a0a7e350_NeikiAnalytics.exe"1⤵
- Modifies Installed Components in the registry
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4308 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:3208
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:2132
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- Views/modifies file attributes
PID:1216
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:3904
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- Views/modifies file attributes
PID:4920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD550beaeb29c1828aa58b55057a8017095
SHA1307492f413ef87df41277ca164eea78626e75381
SHA25618d22ed4722a234c4d0213522c955b6e447564401621c1ba843f2a91ce4a3492
SHA5129ef69f048bcdfa7b18c192977d15ec6477748cc697bbed97ab5ae1a3b1871d7d06613011b310eecd2bc32512d80214cb0784a1d9b6f9dd766367ef593fedaccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD55257c605cb56cd626113c2ee05a8c2af
SHA1547b0d4f89713e433aeb662a2b906d1231a2869a
SHA2564251e1967b2a65ff55a6190676bdeafe2cb1a801e0d0e9a8fee054e935e7042d
SHA512702eaf7014d0f03a9e10dcaef497ec39c1ddd603118128930537bcbbca49b85153e313742d55918669a74c82464ec49697bea2a91efc2fbe4507f9450369b428
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
33KB
MD524bb520e9517f2ed3ed987b46aeaf723
SHA1846723563d7dd2bff3954f93633b11af0103adc8
SHA256d1f1bfe698f2ffb7b3e7a885a301d58f9554d45df0a31c3e8b53c84b33c80d27
SHA51231afbcd2ee87c84cc3e56355da8ddc741a69d918c2687984265745d8046deb18c494cbca6aaf8d4eae6b035e888e6f7cf9b0d59a255f2714963d7b3edbb3c87f
-
Filesize
776B
MD50542ad8156f4dfca7ddcfcb62a6cb452
SHA1485282ba12fc0daf6f6aed96f1ababb8f91a6324
SHA256c90cdefdb6d7ad5a9a132e0d3b74ecdb5b0d5b442da482129ba67925a2f47e8f
SHA5120b41affa129277bf4b17d3e103dc4c241bc2ac338858cc17c22e172ec2ac65539b63e802246efb462cd134d99907d9c5ed9bc03937cadcca3155b703ac6e3195
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
232KB
MD50623cae126f035140b2d1f8faf154fca
SHA118e157491084a223afd512bbd091542b92505844
SHA2566c98d6c1137460fc4b405f9d02bd16896e0678b5f3fd5da978a8ebe887793414
SHA51298981def2240fe8fcfe180065502cb984c91fda81cfc840e8767163120b86273d5e1c36418ed588df6771681fdacdff7f5d44469e62f17411769643c1749b5d0
-
Filesize
232KB
MD52ad1a160878aebc326d8ca99af80c396
SHA196e35037acc5c0bb9d216e041a8918b39a423515
SHA256d296877c2e83883653fe3544edd06e9241b04110f994a038755f7891b1a6f787
SHA512113e6644d63a2ed54675c8c4d9a6e090b63da1e0c9ee619be1813293ef108322bd1a997e8894405a0e5d1156416d8ec5bc71b9ff8b4bc465a496fb9ebd79c565