Analysis
-
max time kernel
92s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe
Resource
win10v2004-20240508-en
General
-
Target
46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe
-
Size
5.5MB
-
MD5
235c5171209f986f8d8fdf07f5ad6e9e
-
SHA1
cfb985e39b49364e3ba2915d390dca107624dffa
-
SHA256
46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef
-
SHA512
cc7a42f750f5a03172dcc4ebbbae52b0e208b5c03f1d94aefc6fb52280e5fd18fbcb62fcacd8fe2801f449dd19f3229686cffa3ebf442e0997680c298afa8643
-
SSDEEP
98304:oseHlHdc5b9dXLVi2xIb7S1fw7pXyZ7oz0R5uz0rbJagkW7kOLIx1qxz8hjFrZB5:Bem17h10XvwPhagz7q2wNPQ00W
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 6 IoCs
Processes:
reg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\debugger = "ntsd -d" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe\debugger = "ntsd -d" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\debugger = "ntsd -d" reg.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
cmd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe " cmd.exe -
Drops file in Program Files directory 64 IoCs
Processes:
46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exedescription ioc process File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Google\Chrome\Application\chrome_proxy.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\keytool.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\native2ascii.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\orbd.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\javap.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\accicons.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\sscicons.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jcmd.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\tnameserv.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0409-1000-0000000FF1CE}\misc.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\javaw.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\ssvagent.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\msoia.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jhat.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\klist.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\javapackager.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\java.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\msoasb.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\policytool.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\msotd.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\7-Zip\7z.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jmap.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\msouc.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\dotnet\dotnet.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\extcheck.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0C0A-1000-0000000FF1CE}\misc.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Internet Explorer\ExtExport.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\wsgen.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Client\AppVLP.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\7-Zip\Uninstall.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pubs.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\rmic.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmclienticon.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\java.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe -
Modifies registry class 14 IoCs
Processes:
cmd.execmd.execmd.execmd.execmd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe " cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open\Command cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe " cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open\Command cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe " cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.txt cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.txt \ = " exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe " cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exepid process 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exepid process 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exepid process 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.execmd.exedescription pid process target process PID 4268 wrote to memory of 1600 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 1600 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 1600 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 3688 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 3688 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 3688 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 3676 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 3676 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 3676 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 556 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 556 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 556 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 4836 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 4836 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 4836 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 544 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 544 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 544 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 2632 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 2632 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 4268 wrote to memory of 2632 4268 46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe cmd.exe PID 3688 wrote to memory of 3472 3688 cmd.exe reg.exe PID 3688 wrote to memory of 3472 3688 cmd.exe reg.exe PID 3688 wrote to memory of 3472 3688 cmd.exe reg.exe PID 3688 wrote to memory of 2220 3688 cmd.exe reg.exe PID 3688 wrote to memory of 2220 3688 cmd.exe reg.exe PID 3688 wrote to memory of 2220 3688 cmd.exe reg.exe PID 3688 wrote to memory of 1060 3688 cmd.exe reg.exe PID 3688 wrote to memory of 1060 3688 cmd.exe reg.exe PID 3688 wrote to memory of 1060 3688 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe"C:\Users\Admin\AppData\Local\Temp\46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵PID:1600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\123.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\ZhuDongFangYu.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Sets file execution options in registry
PID:3472
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\360tray.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Sets file execution options in registry
PID:2220
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\taskmgr.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Sets file execution options in registry
PID:1060
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c assoc .txt = exefile2⤵
- Modifies registry class
PID:3676
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype comfile=C:\Users\Admin\AppData\Local\Temp\46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe2⤵
- Modifies system executable filetype association
- Modifies registry class
PID:556
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype zipfile=C:\Users\Admin\AppData\Local\Temp\46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe2⤵
- Modifies registry class
PID:4836
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype jpgfile=C:\Users\Admin\AppData\Local\Temp\46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe2⤵
- Modifies registry class
PID:544
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype txtfile=C:\Users\Admin\AppData\Local\Temp\46e848e8f62887004de2c754dc3338a976fbcfe7aa66822ba0a4bac0980eebef.exe2⤵
- Modifies registry class
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443B
MD570170ba16a737a438223b88279dc6c85
SHA1cc066efa0fca9bc9f44013660dea6b28ddfd6a24
SHA256d3674f4b34a8ca8167160519aa5c66b6024eb09f4cb0c9278bc44370b0efec6a
SHA51237cc8c954544374d0a1ca4d012c9bd0b47781bc9bb8d0c15a8a95b9934893db3bedee867b984c20edabe54c39574abf7250de433aade6c0d544b8dd2c972c6da
-
Filesize
5.5MB
MD508cd6feadac6cb8e2f86d043f0056d3f
SHA115b45e3b12a621d18f88674503e9dc3f328e62a8
SHA256d91b19694265d2284934d38d6458dac2d64c76cbd1d509d817dfa76a7acd1b0d
SHA5125b1ebbf5074522e90afcf7a62406a8f089e674d227c323e82180da95bf4237e68a373e97092cebdae24298a03066ff12350fe03c6d58b07ca42c304f7f3374ec