Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe
Resource
win7-20231129-en
General
-
Target
b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe
-
Size
4.0MB
-
MD5
c3cafe552c05806b82a04351a605e461
-
SHA1
e1ea22d087fa96397a2fd464c75373f5e543c521
-
SHA256
b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28
-
SHA512
9eab74b15d74a6d7fb992abf342b45dffbca1fffc0e80f5276986910d56d8f6c341c3539621dfb924346881aed70be2e0f9392f75cbed803ca14410631364c18
-
SSDEEP
98304:WGdVyVT9nOgmhnU/o/atXpuzeaXCY2Ohkgk:FWT9nO7yAJv28V
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/60-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/60-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/60-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2568-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4408-32-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4408-41-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4408-42-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4408-47-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2568-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2568-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2568-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/60-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/60-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/60-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2568-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4408-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat C:\Windows\SysWOW64\240599359.txt family_gh0strat behavioral2/memory/4408-41-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4408-42-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4408-47-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2568-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2568-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2568-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
svchos.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240599359.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation HD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe -
Executes dropped EXE 6 IoCs
Processes:
svchost.exeTXPlatforn.exesvchos.exeTXPlatforn.exeHD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exepid process 60 svchost.exe 2568 TXPlatforn.exe 3616 svchos.exe 4408 TXPlatforn.exe 3628 HD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe 1292 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Loads dropped DLL 3 IoCs
Processes:
svchos.exesvchost.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exepid process 3616 svchos.exe 1504 svchost.exe 1292 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Processes:
resource yara_rule behavioral2/memory/60-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/60-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/60-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/60-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2568-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4408-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4408-41-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4408-42-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4408-47-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2568-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2568-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2568-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2568-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
Processes:
svchost.exesvchos.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240599359.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe -
Drops file in Program Files directory 5 IoCs
Processes:
b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exedescription ioc process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423468642" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004f8caa1c9f4cba428e26b677a31a634000000000020000000000106600000001000020000000e28c2ac65781062c37a716a89fd99be2ac903c60f674f6ada4b708a6447beac4000000000e800000000200002000000005615d4c891a191db5a336e810ce50d4ec207c14b5f8958f3c3311036c1b5e28200000006e85e8bca981edf67ba459e65cd1be032e1649fe7d38b6720117dc6ac621d73340000000a2e885b8dda79022311a4c36a5fca34a2f26ece1c9012a8fce1955f171b6b426938820187102b559e571c277d934ad97774e0c80b8894fc2b778e8f3e8833bf0 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31108915" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31108915" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31108915" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0aec43033afda01 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "452264809" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "451170820" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004f8caa1c9f4cba428e26b677a31a634000000000020000000000106600000001000020000000121b91a30fc4eff1a6b4025e52d18ca19ab7c126a253860dfdd6de9280e82f10000000000e800000000200002000000068dbd9974ef5746af862af7cd590f5ff80ed38be73b1c4f3f9f0f2479722f7f8200000006f98074308e40a0cce36f6cfbfaac1f51243d6d3cfa240f654f9ce6e1fe7cbb1400000004f4cc21844220a3b16baa2210980b3e20bf7056c6162a7e5a71b8b1cea9b9785ccb6df59037afcff0082e66226ce05899d503bf68289b6db8b270339005c28d9 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31108915" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "452264809" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e056b63033afda01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{46713D79-1B26-11EF-A2D1-4ADE6ABEB422} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "451170820" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exepid process 728 b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe 728 b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid process 4408 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exeTXPlatforn.exedescription pid process Token: SeIncBasePriorityPrivilege 60 svchost.exe Token: SeLoadDriverPrivilege 4408 TXPlatforn.exe Token: 33 4408 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4408 TXPlatforn.exe Token: 33 4408 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4408 TXPlatforn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 1488 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exeIEXPLORE.EXEIEXPLORE.EXEpid process 728 b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe 728 b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 3928 IEXPLORE.EXE 3928 IEXPLORE.EXE 3928 IEXPLORE.EXE 3928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exesvchost.exeTXPlatforn.execmd.exesvchost.exeHD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exeiexplore.exeIEXPLORE.EXEdescription pid process target process PID 728 wrote to memory of 60 728 b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe svchost.exe PID 728 wrote to memory of 60 728 b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe svchost.exe PID 728 wrote to memory of 60 728 b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe svchost.exe PID 60 wrote to memory of 5040 60 svchost.exe cmd.exe PID 60 wrote to memory of 5040 60 svchost.exe cmd.exe PID 60 wrote to memory of 5040 60 svchost.exe cmd.exe PID 728 wrote to memory of 3616 728 b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe svchos.exe PID 728 wrote to memory of 3616 728 b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe svchos.exe PID 728 wrote to memory of 3616 728 b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe svchos.exe PID 2568 wrote to memory of 4408 2568 TXPlatforn.exe TXPlatforn.exe PID 2568 wrote to memory of 4408 2568 TXPlatforn.exe TXPlatforn.exe PID 2568 wrote to memory of 4408 2568 TXPlatforn.exe TXPlatforn.exe PID 728 wrote to memory of 3628 728 b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe HD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe PID 728 wrote to memory of 3628 728 b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe HD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe PID 728 wrote to memory of 3628 728 b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe HD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe PID 5040 wrote to memory of 2224 5040 cmd.exe PING.EXE PID 5040 wrote to memory of 2224 5040 cmd.exe PING.EXE PID 5040 wrote to memory of 2224 5040 cmd.exe PING.EXE PID 1504 wrote to memory of 1292 1504 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 1504 wrote to memory of 1292 1504 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 1504 wrote to memory of 1292 1504 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 3628 wrote to memory of 4100 3628 HD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe iexplore.exe PID 3628 wrote to memory of 4100 3628 HD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe iexplore.exe PID 3628 wrote to memory of 4100 3628 HD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe iexplore.exe PID 4100 wrote to memory of 1488 4100 iexplore.exe IEXPLORE.EXE PID 4100 wrote to memory of 1488 4100 iexplore.exe IEXPLORE.EXE PID 1488 wrote to memory of 3928 1488 IEXPLORE.EXE IEXPLORE.EXE PID 1488 wrote to memory of 3928 1488 IEXPLORE.EXE IEXPLORE.EXE PID 1488 wrote to memory of 3928 1488 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe"C:\Users\Admin\AppData\Local\Temp\b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\HD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exeC:\Users\Admin\AppData\Local\Temp\HD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://se.360.cn/3⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://se.360.cn/4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3928
-
-
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:4784
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240599359.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5c41ab5352ba79baac9ac093dd7eb2500
SHA11ffb0e70f86845daba211aeda43cad539d34ffd3
SHA256558e13bb7aa293569457e9703d2db37e8365e2ab670b2c3484ada9336ed24895
SHA512ccebe3f11039e14d39d4102652669fd372d179778bf73fae0659dd01da569bbf850b273cd3a4e13dc77b3fd4fb4d84d01525ac3a0dcb23b297c733da10bc2ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5f6ce4994e3b24a3ec8517c94838c94f7
SHA17158131910f65a6bce4f109da9f2b2f926a407d4
SHA256bf3adb28b10e5aafd39562ff6f7bc4dbff8540f1b93a8dead0051540d92dc9d6
SHA5128047a11b0dec94f8989f70941e1168d679a9105dc51a397974b9b31b1e4f785abc9136668ca2e1b8aeb400d428a645e9c6c30d592e31bf43a07a918116931bc2
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
1.2MB
MD5eca2e581b367ad0d68df3a91612192dc
SHA1c0657067fed8ea82c35d3ba085c57f98c4f40940
SHA256c66ccea293aa25c5a24134e45801f8162b330e5c1b2d68c68e1449dd314fb4b4
SHA512552755526af444265a7049063bef856d5c061723806dc3ab91026deb102b6bc35da2831a40c8abe9145423718b3a1aee1f230a627da708d75849570a1a2edc57
-
C:\Users\Admin\AppData\Local\Temp\HD_b2bc2ab840a7d71c763e39e47afcd0d78869494dfd0c20a482f53c5a07059f28.exe
Filesize2.8MB
MD521e47fdc2151c0e89f1767c0b617ab2f
SHA1e62bc0cbb7781e740bdff43f9b10114a0310ca90
SHA256ee0d5895e7d806eb91be1ca194f7c86b2c52660242efe1f22bce94afbba4981a
SHA512f453076c466faef8fbf0624501078dd6e5c7e6fed9e42cf2d21f1a4a88dbfe8fe23c79c9751fd759fdb11dd0597f3e5f15d1c54789e0efe775acb1b9d5fce610
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD5c65eb886b43d6d652ec72efdb7b01057
SHA137234001561da3e2af7dd179a917816a6e6240dd
SHA256c8a039455fe7f81c4a10e2faf5e7211f388e9ca4608da41843d94e44beb93639
SHA51200f0047151215a9ac03960b37921ec06f09cf68ad4c2077761d7daa05e2bb0a9bca024b2e6f68a76cf09e6432b39cf76c6d0becb0bf44c1d841411db36e9deed
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641