Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 18:38
Behavioral task
behavioral1
Sample
0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe
Resource
win10v2004-20240508-en
General
-
Target
0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe
-
Size
232KB
-
MD5
9dd5defc0073a58af3e9f300c0f0e050
-
SHA1
4b880958676c854114a7a8408a1b69d53ddc9ece
-
SHA256
0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c
-
SHA512
d07c9c1bf9832ee0761a1040d35e612ac92e83155ace309be3fe1e99fdc183c9f6b2055de4b2c745600ace8ebf27900ef46a467c1e00bb0adfe2c5ed0e366b81
-
SSDEEP
3072:y1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1VOz1i/NU82OMYcYU:si/NjO5xbg/CSUFLTwMjs6oi/N+O7
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/memory/3340-0-0x0000000000400000-0x000000000043A000-memory.dmp UPX behavioral2/files/0x0008000000023416-10.dat UPX behavioral2/files/0x000700000002341a-11.dat UPX behavioral2/memory/3340-12-0x0000000000400000-0x000000000043A000-memory.dmp UPX -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe -
resource yara_rule behavioral2/memory/3340-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0008000000023416-10.dat upx behavioral2/files/0x000700000002341a-11.dat upx behavioral2/memory/3340-12-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe File created C:\WINDOWS\SysWOW64\qx.bat 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 2304 cmd.exe 1892 cmd.exe 1860 cmd.exe 1448 cmd.exe 1664 cmd.exe 2288 cmd.exe 980 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe File opened for modification C:\WINDOWS\windows.exe 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5A75D89C-2F34-11EF-92F1-E659512317F8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Internet Explorer\Main 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c93b3d41c3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009e387b9b7780e241bd4d2d5013251a2f00000000020000000000106600000001000020000000261a337088cf281cb6af3b2409001249a6d551c4bace49487903543cfb70eef3000000000e8000000002000020000000892a1c294bee6592c42ca880e8fefe119f97a36f9649d16056c620ce58cf021520000000aab5befd8bccaa9ad3eab1737f85fa6faccb393929058f400cc5ec20ee17888d40000000bdb520e3b0c22ef53596fa83e89bf606046baf5ddb9ced5d85b04ed8a7794956a8a76edc36e8eaf8f0ff57ad64b8137d14aad4b39ed6d5ba44b15fc8429591df iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009e387b9b7780e241bd4d2d5013251a2f00000000020000000000106600000001000020000000087f98adb4e419fb7636ee51cb556466c2fc9697b676b99a4360d056b4bf4bc1000000000e800000000200002000000034640fa07b693abde4478bdfa7416209049a94b88018fd46a2d9f94c6cd830662000000037354b80b578799aa469d7b4849e2260d6899ca7111e4c846eedbfa7a463a8d340000000ad980d793d17c987cad62d4d5e20a483a1a56e9ff6be0347379c8ceb9e6dfc895146ebad0891cce68bdfd3fccb6777d9e1c493377c3b86bd01afe842cf2f5375 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e084403d41c3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425070615" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3212 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 3212 iexplore.exe 3212 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3340 wrote to memory of 3212 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 81 PID 3340 wrote to memory of 3212 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 81 PID 3212 wrote to memory of 2276 3212 iexplore.exe 83 PID 3212 wrote to memory of 2276 3212 iexplore.exe 83 PID 3212 wrote to memory of 2276 3212 iexplore.exe 83 PID 3340 wrote to memory of 1664 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 84 PID 3340 wrote to memory of 1664 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 84 PID 3340 wrote to memory of 1664 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 84 PID 1664 wrote to memory of 1832 1664 cmd.exe 86 PID 1664 wrote to memory of 1832 1664 cmd.exe 86 PID 1664 wrote to memory of 1832 1664 cmd.exe 86 PID 3340 wrote to memory of 2288 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 87 PID 3340 wrote to memory of 2288 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 87 PID 3340 wrote to memory of 2288 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 87 PID 2288 wrote to memory of 3624 2288 cmd.exe 89 PID 2288 wrote to memory of 3624 2288 cmd.exe 89 PID 2288 wrote to memory of 3624 2288 cmd.exe 89 PID 3340 wrote to memory of 980 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 90 PID 3340 wrote to memory of 980 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 90 PID 3340 wrote to memory of 980 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 90 PID 980 wrote to memory of 4716 980 cmd.exe 92 PID 980 wrote to memory of 4716 980 cmd.exe 92 PID 980 wrote to memory of 4716 980 cmd.exe 92 PID 3340 wrote to memory of 2304 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 93 PID 3340 wrote to memory of 2304 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 93 PID 3340 wrote to memory of 2304 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 93 PID 2304 wrote to memory of 1772 2304 cmd.exe 96 PID 2304 wrote to memory of 1772 2304 cmd.exe 96 PID 2304 wrote to memory of 1772 2304 cmd.exe 96 PID 3340 wrote to memory of 1892 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 97 PID 3340 wrote to memory of 1892 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 97 PID 3340 wrote to memory of 1892 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 97 PID 1892 wrote to memory of 3308 1892 cmd.exe 99 PID 1892 wrote to memory of 3308 1892 cmd.exe 99 PID 1892 wrote to memory of 3308 1892 cmd.exe 99 PID 3340 wrote to memory of 1860 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 101 PID 3340 wrote to memory of 1860 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 101 PID 3340 wrote to memory of 1860 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 101 PID 1860 wrote to memory of 2596 1860 cmd.exe 103 PID 1860 wrote to memory of 2596 1860 cmd.exe 103 PID 1860 wrote to memory of 2596 1860 cmd.exe 103 PID 3340 wrote to memory of 1448 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 104 PID 3340 wrote to memory of 1448 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 104 PID 3340 wrote to memory of 1448 3340 0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe 104 PID 1448 wrote to memory of 3756 1448 cmd.exe 106 PID 1448 wrote to memory of 3756 1448 cmd.exe 106 PID 1448 wrote to memory of 3756 1448 cmd.exe 106 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 4716 attrib.exe 1772 attrib.exe 3308 attrib.exe 2596 attrib.exe 3756 attrib.exe 1832 attrib.exe 3624 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe"C:\Users\Admin\AppData\Local\Temp\0980cd1bf05cdbcf892a5e482b1cb2b767bc91331547c9f00c369e8cf7bcd37c.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3212 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:1832
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:3624
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- Views/modifies file attributes
PID:4716
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:1772
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:3308
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- Views/modifies file attributes
PID:3756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD504506e2e0f7b3130d6573c0af9cb3098
SHA1b5300954166b568276766b7f0ae07b4231c619ae
SHA256b5d1a872f4c6b04e9a0175fa6138dcf384efcc609edaa9b88ba358e9ae985e90
SHA51252efa231d933d45273ef68faee776aa5ae2f8e4ab9f15779613cd72252fdab57540eb4c5b27ee66620d4df08dea48847cfda12f0fd39f3ccd51b0d2133a5192c
-
Filesize
232KB
MD51f2addc9c665c1bb2a8179571632bd56
SHA18053253a915be9283a404f5d7c3c01f93fdd5f83
SHA2568a211958d471096209aae8d9ecd5370ff6b7e5dad55747fad4b44d449322edc0
SHA5127aa7a2a11fc7f70dfdf66241aefc7f441364b3af16cb937caa7110e33adb78e21d402e666b6cba9afaa8ab5ca6d91dff0413da5d9242b39136cd95674eafb8df