Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 05:53
Behavioral task
behavioral1
Sample
379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe
-
Size
232KB
-
MD5
a820ce94b607ab36c7b039bafe047610
-
SHA1
dd55eb9e729433d661a9e0f8c78df1648f8d7bc9
-
SHA256
379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907
-
SHA512
60cdaf8158e0a587af87d6e0b17aa6ecdead795a1bda9d5710cec030431b437735816beefd5ab4563c544f56ff5c733552469bbb5429dd0b72c47f5a6ee2f122
-
SSDEEP
3072:p1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1Vne1i/NU82OMYcYU:ri/NjO5xbg/CSUFLTwMjs6wi/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/1976-1-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x00370000000164a9-10.dat upx behavioral1/files/0x0007000000016abb-11.dat upx behavioral1/memory/1976-12-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe File created C:\WINDOWS\SysWOW64\qx.bat 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 2500 cmd.exe 2468 cmd.exe 2908 cmd.exe 1928 cmd.exe 2128 cmd.exe 2696 cmd.exe 2640 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe File opened for modification C:\WINDOWS\windows.exe 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00150d1cc4c6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3674F7F1-32B7-11EF-B27B-DA219DA76A91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425456684" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000003b50e793d44ab582eddd37b999981e665d6f8420b84781cdbf80e34a055a0274000000000e80000000020000200000007e46d1b8c7c96306595793a8ff07fa27e3e0edaf1d8ef44450f32cb127de1c7d200000006f822c311bee59b1dd2e21e0b00052b0235fb531322c86fc7b3e7f02b12f5811400000000aa8a198fe624efbc11f27df8fa6efce0e93d0bf4030b2cc234621fe8d8586369cfb218725aa548806f559de3acec88f0ebd4aa39be4ac51e87cfbf388c2b3c5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2828 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 2828 iexplore.exe 2828 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2828 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 28 PID 1976 wrote to memory of 2828 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 28 PID 1976 wrote to memory of 2828 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 28 PID 1976 wrote to memory of 2828 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 28 PID 2828 wrote to memory of 2840 2828 iexplore.exe 29 PID 2828 wrote to memory of 2840 2828 iexplore.exe 29 PID 2828 wrote to memory of 2840 2828 iexplore.exe 29 PID 2828 wrote to memory of 2840 2828 iexplore.exe 29 PID 1976 wrote to memory of 2696 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 30 PID 1976 wrote to memory of 2696 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 30 PID 1976 wrote to memory of 2696 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 30 PID 1976 wrote to memory of 2696 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 30 PID 2696 wrote to memory of 2568 2696 cmd.exe 32 PID 2696 wrote to memory of 2568 2696 cmd.exe 32 PID 2696 wrote to memory of 2568 2696 cmd.exe 32 PID 2696 wrote to memory of 2568 2696 cmd.exe 32 PID 1976 wrote to memory of 2640 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 33 PID 1976 wrote to memory of 2640 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 33 PID 1976 wrote to memory of 2640 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 33 PID 1976 wrote to memory of 2640 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 33 PID 2640 wrote to memory of 2588 2640 cmd.exe 35 PID 2640 wrote to memory of 2588 2640 cmd.exe 35 PID 2640 wrote to memory of 2588 2640 cmd.exe 35 PID 2640 wrote to memory of 2588 2640 cmd.exe 35 PID 1976 wrote to memory of 2500 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 36 PID 1976 wrote to memory of 2500 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 36 PID 1976 wrote to memory of 2500 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 36 PID 1976 wrote to memory of 2500 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 36 PID 2500 wrote to memory of 2456 2500 cmd.exe 38 PID 2500 wrote to memory of 2456 2500 cmd.exe 38 PID 2500 wrote to memory of 2456 2500 cmd.exe 38 PID 2500 wrote to memory of 2456 2500 cmd.exe 38 PID 1976 wrote to memory of 2468 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 39 PID 1976 wrote to memory of 2468 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 39 PID 1976 wrote to memory of 2468 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 39 PID 1976 wrote to memory of 2468 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 39 PID 2468 wrote to memory of 2524 2468 cmd.exe 41 PID 2468 wrote to memory of 2524 2468 cmd.exe 41 PID 2468 wrote to memory of 2524 2468 cmd.exe 41 PID 2468 wrote to memory of 2524 2468 cmd.exe 41 PID 1976 wrote to memory of 2908 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 42 PID 1976 wrote to memory of 2908 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 42 PID 1976 wrote to memory of 2908 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 42 PID 1976 wrote to memory of 2908 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 42 PID 2908 wrote to memory of 2040 2908 cmd.exe 44 PID 2908 wrote to memory of 2040 2908 cmd.exe 44 PID 2908 wrote to memory of 2040 2908 cmd.exe 44 PID 2908 wrote to memory of 2040 2908 cmd.exe 44 PID 1976 wrote to memory of 1928 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 45 PID 1976 wrote to memory of 1928 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 45 PID 1976 wrote to memory of 1928 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 45 PID 1976 wrote to memory of 1928 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 45 PID 1928 wrote to memory of 2344 1928 cmd.exe 47 PID 1928 wrote to memory of 2344 1928 cmd.exe 47 PID 1928 wrote to memory of 2344 1928 cmd.exe 47 PID 1928 wrote to memory of 2344 1928 cmd.exe 47 PID 1976 wrote to memory of 2128 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 48 PID 1976 wrote to memory of 2128 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 48 PID 1976 wrote to memory of 2128 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 48 PID 1976 wrote to memory of 2128 1976 379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe 48 PID 2128 wrote to memory of 752 2128 cmd.exe 50 PID 2128 wrote to memory of 752 2128 cmd.exe 50 PID 2128 wrote to memory of 752 2128 cmd.exe 50 PID 2128 wrote to memory of 752 2128 cmd.exe 50 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 2568 attrib.exe 2588 attrib.exe 2456 attrib.exe 2524 attrib.exe 2040 attrib.exe 2344 attrib.exe 752 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\379788dfe178bdecc5ff7159ed8729eae34b5183f19a045bc7b265d572f89907_NeikiAnalytics.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:2568
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:2588
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- Views/modifies file attributes
PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:2524
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:2040
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- Views/modifies file attributes
PID:752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5f7fa6bc122889a1ea3135c079bb8bd3c
SHA1c12d5e293ef977504bca8694c3c34ebcc1fdb182
SHA25685dffce236aeea6baeb9ef86b62f8e9440573cd9508cd3a83cb8d79821a1a8b6
SHA512cefe64cb6d27e43196def683fe87b099a0f157206095ba92f193ba46f310cdc9c985f3a8c38f92e1cd23b3d7e68e4885a78b3d466d475e3ede6ae52de92831d9
-
Filesize
232KB
MD5a30b09be2f702817eb005b16ee45329f
SHA1e6e03159cadcc80844eb9801a2d29ec8505dd006
SHA256ba49b2d2b056c70f0db8c065a33ea059406ef8d09c359cbeda804c791d29fcd6
SHA512a4e387688008371b8a7d8e323c6b66fa47e28cc63879583027c612f1ebe0c9672f3ee5576647acad0871b24bfc41d7f142d0be695d62d72ece772c38194d7e11