Analysis
-
max time kernel
78s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 00:09
Behavioral task
behavioral1
Sample
856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe
Resource
win10v2004-20240426-en
General
-
Target
856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe
-
Size
232KB
-
MD5
c5d47b7478befcb228693f79a4edff26
-
SHA1
033cffbee60f52791e54a3d8e186da19421f123b
-
SHA256
856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172
-
SHA512
3adb37955f88ba6d351215f7519394f5c8c750cbe34504d19ce8b9c22c54fa5120ab340a3ec10201fd42d7d8d91b7db9a9d5b3e0982e1d470322e1eed0d33038
-
SSDEEP
3072:P1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1VOz1i/NU82OMYcYU:ti/NjO5xbg/CSUFLTwMjs6oi/N+O7
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/memory/2272-0-0x0000000000400000-0x000000000043A000-memory.dmp UPX behavioral2/files/0x000700000002344b-17.dat UPX behavioral2/files/0x000700000002344c-21.dat UPX behavioral2/memory/2272-311-0x0000000000400000-0x000000000043A000-memory.dmp UPX -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe -
resource yara_rule behavioral2/memory/2272-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x000700000002344b-17.dat upx behavioral2/files/0x000700000002344c-21.dat upx behavioral2/memory/2272-311-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe File created C:\WINDOWS\SysWOW64\qx.bat 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe File opened for modification C:\WINDOWS\windows.exe 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31112083" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31112083" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000150dfb3d7d297149b53fa5015b24f84400000000020000000000106600000001000020000000501d271014fbf505f2a86a5ffcd3819b3b24d32add0595e4c0acfea2f4678cb0000000000e80000000020000200000009a6590da43594763320a9c5dbe4025ab067c2b3c9b4d44e5c5a4182a073ff5262000000072b9ed5424056999966e114c60b78e8df7f21e497acaaed052b229cbe65efe72400000004bd7c1cf26144d02f4109a41f503e063a6e7ad96b95889be4611db78fc9634226f76bcf097a81905fecbd85a4198e9c4e70ff4539382d1cb411bb414f6b6855c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3012293287" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424829544" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000150dfb3d7d297149b53fa5015b24f844000000000200000000001066000000010000200000003112c36fefaf752edf78f7032bb72c42f01c1d20ffd33819022712a56fbe75b8000000000e8000000002000020000000de08f82a36a9d4ef4f181efc66b9801d267fa0194fe8d005ba3735c04951ca1920000000dae85997fdb7ceb9ddb20901c6c9b9dfd52409d4c02ff0be8ab2190c1317acd440000000263efb15a556131d695ac5e146b9bc51a6196c7e4197b38442d7b2a7a900ffb284156ccccc3c75ce939965f37f8c732e5c1694e2ae7d7691477c0a9128129fe6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f404ca93bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0af09ca93bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3014324332" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3012293287" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31112083" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{DF167AE1-2786-11EF-B865-42B5B583A19B} = "0" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 1732 iexplore.exe 1732 iexplore.exe 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1732 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 83 PID 2272 wrote to memory of 1732 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 83 PID 1732 wrote to memory of 1192 1732 iexplore.exe 84 PID 1732 wrote to memory of 1192 1732 iexplore.exe 84 PID 1732 wrote to memory of 1192 1732 iexplore.exe 84 PID 2272 wrote to memory of 116 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 85 PID 2272 wrote to memory of 116 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 85 PID 2272 wrote to memory of 116 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 85 PID 116 wrote to memory of 1436 116 cmd.exe 87 PID 116 wrote to memory of 1436 116 cmd.exe 87 PID 116 wrote to memory of 1436 116 cmd.exe 87 PID 2272 wrote to memory of 4072 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 88 PID 2272 wrote to memory of 4072 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 88 PID 2272 wrote to memory of 4072 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 88 PID 4072 wrote to memory of 2020 4072 cmd.exe 90 PID 4072 wrote to memory of 2020 4072 cmd.exe 90 PID 4072 wrote to memory of 2020 4072 cmd.exe 90 PID 2272 wrote to memory of 4876 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 91 PID 2272 wrote to memory of 4876 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 91 PID 2272 wrote to memory of 4876 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 91 PID 4876 wrote to memory of 3572 4876 cmd.exe 93 PID 4876 wrote to memory of 3572 4876 cmd.exe 93 PID 4876 wrote to memory of 3572 4876 cmd.exe 93 PID 2272 wrote to memory of 5032 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 94 PID 2272 wrote to memory of 5032 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 94 PID 2272 wrote to memory of 5032 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 94 PID 5032 wrote to memory of 4640 5032 cmd.exe 96 PID 5032 wrote to memory of 4640 5032 cmd.exe 96 PID 5032 wrote to memory of 4640 5032 cmd.exe 96 PID 2272 wrote to memory of 3548 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 97 PID 2272 wrote to memory of 3548 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 97 PID 2272 wrote to memory of 3548 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 97 PID 3548 wrote to memory of 720 3548 cmd.exe 99 PID 3548 wrote to memory of 720 3548 cmd.exe 99 PID 3548 wrote to memory of 720 3548 cmd.exe 99 PID 2272 wrote to memory of 448 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 100 PID 2272 wrote to memory of 448 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 100 PID 2272 wrote to memory of 448 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 100 PID 448 wrote to memory of 3868 448 cmd.exe 102 PID 448 wrote to memory of 3868 448 cmd.exe 102 PID 448 wrote to memory of 3868 448 cmd.exe 102 PID 2272 wrote to memory of 4580 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 103 PID 2272 wrote to memory of 4580 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 103 PID 2272 wrote to memory of 4580 2272 856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe 103 PID 4580 wrote to memory of 2356 4580 cmd.exe 105 PID 4580 wrote to memory of 2356 4580 cmd.exe 105 PID 4580 wrote to memory of 2356 4580 cmd.exe 105 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 720 attrib.exe 3868 attrib.exe 2356 attrib.exe 1436 attrib.exe 2020 attrib.exe 3572 attrib.exe 4640 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe"C:\Users\Admin\AppData\Local\Temp\856d4cd820bb9a30746d153b9bc00b99f7f14edd0f279d36fba199298428c172.exe"1⤵
- Modifies Installed Components in the registry
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:1436
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- Views/modifies file attributes
PID:3572
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:4640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:720
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:3868
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- Views/modifies file attributes
PID:2356
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5ba5c07e84aaf8703c7f383a82d696ce7
SHA1f51fbe8032555f84974ed041a09cc6211d8ee0af
SHA256088079d3c0c9b9117e2427529a2e6ddd19bd694d1180dabf72cb80dfad1fbad3
SHA512987db2bb8c1a95f754c724f5921152a3e1f6a4ca7b7c79f7b927eca93e9251e73eb91d8a972c094061a8dbfb6ad82e5133ed64ffb7d9c9de946b705f4081d31f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD525330b0d189f83cb857a6a01b5c710d4
SHA1c4af9a9b2b62ca5b5daf17ef1091035abdbb957e
SHA2564c0472ac352782b311e6afa31b246e25c506db44e67c5700dbae7b42bc49e463
SHA512a620d90b7dcd5fd3a5239edb030285405035715f4ef490ee39274473bf2b6dc0cd7cfc5f65a4318e4b953f3e6772002f0a0427ed4029c1e0975ecae10591fd00
-
Filesize
776B
MD50542ad8156f4dfca7ddcfcb62a6cb452
SHA1485282ba12fc0daf6f6aed96f1ababb8f91a6324
SHA256c90cdefdb6d7ad5a9a132e0d3b74ecdb5b0d5b442da482129ba67925a2f47e8f
SHA5120b41affa129277bf4b17d3e103dc4c241bc2ac338858cc17c22e172ec2ac65539b63e802246efb462cd134d99907d9c5ed9bc03937cadcca3155b703ac6e3195
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
33KB
MD524bb520e9517f2ed3ed987b46aeaf723
SHA1846723563d7dd2bff3954f93633b11af0103adc8
SHA256d1f1bfe698f2ffb7b3e7a885a301d58f9554d45df0a31c3e8b53c84b33c80d27
SHA51231afbcd2ee87c84cc3e56355da8ddc741a69d918c2687984265745d8046deb18c494cbca6aaf8d4eae6b035e888e6f7cf9b0d59a255f2714963d7b3edbb3c87f
-
Filesize
232KB
MD51a4f614c69c7f700034332454e726172
SHA181cf9d465546552ad895d7d52465da4fa2fc8e74
SHA256431fcabcc4ff50be729308171056e64ef66c76203afbea9130306ec3fb6adcd4
SHA512d4a683a9df3d355e4d21f9d0e08a3f5523f83afce23ff1a6eeae942e2a11744635eb6b6d689729cb886799bec9b952b67e3b1328141ae6177d4e61c9c0d58614
-
Filesize
232KB
MD53166db2b79c7e4443dcd78f168c60575
SHA1528ffa0e666a965db604b2bf7c8363a7c008de76
SHA256b654de9906b35bc030a4fcddb39a9a6c11c73f6b08fa83cffcd06229640ceb17
SHA51254695ebc982c69436d3df7540b1f7963f1cc69df63c97257a04a7bab2e9f47d176a9d6bdaa77cf20c16982066da44243fea8d943a0c02b86feceeaeae2298c5b