Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:00
Behavioral task
behavioral1
Sample
213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe
Resource
win10v2004-20240730-en
General
-
Target
213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe
-
Size
232KB
-
MD5
84f464203450725af1589106d18a9aba
-
SHA1
20315f5e0d837425938881de6651c41869371d86
-
SHA256
213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044
-
SHA512
0620d98592b48fe641a62fd0026cc8aee2f9c1fc35400e9f5575f243543c2757ef3c0075ffa3616a0bffd16230e39adb271734f38db7d6dfa1cb02040aaefaf0
-
SSDEEP
3072:p1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1VOz1i/NU82OMYcYU:ri/NjO5xbg/CSUFLTwMjs6oi/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe -
resource yara_rule behavioral1/memory/2552-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x000900000001722f-10.dat upx behavioral1/files/0x00070000000174d0-11.dat upx behavioral1/memory/2552-444-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe File created C:\WINDOWS\SysWOW64\qx.bat 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 2744 cmd.exe 2792 cmd.exe 2692 cmd.exe 1368 cmd.exe 2488 cmd.exe 3008 cmd.exe 2760 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\windows.exe 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe File created C:\WINDOWS\windows.exe 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{197EECF1-5049-11EF-BB68-FA57F1690589} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07968f155e4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428707906" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000097175a0f07265518a2cf1f01ea1a08bbcbe779a3b2d4a94e72013c25cb0eb43c000000000e80000000020000200000009ef21345ed7ec661dab3e0ac4cd8a6c30ed8fe91ca806988b7ce03ef4aff97c320000000e876d643afb7c3784b44cdec6793d30561402b97fb7e2cd7c6a63d390a86d9f9400000002b0d872935948e35791f5237ee1918038d606a1fc554958d1f26a4b4ee9493aef0462710619e83847ea52a69900d643f5f4b220ebb0815eb6175b89e18518f82 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2592 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 2592 iexplore.exe 2592 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2592 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 29 PID 2552 wrote to memory of 2592 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 29 PID 2552 wrote to memory of 2592 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 29 PID 2552 wrote to memory of 2592 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 29 PID 2592 wrote to memory of 2992 2592 iexplore.exe 30 PID 2592 wrote to memory of 2992 2592 iexplore.exe 30 PID 2592 wrote to memory of 2992 2592 iexplore.exe 30 PID 2592 wrote to memory of 2992 2592 iexplore.exe 30 PID 2552 wrote to memory of 3008 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 31 PID 2552 wrote to memory of 3008 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 31 PID 2552 wrote to memory of 3008 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 31 PID 2552 wrote to memory of 3008 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 31 PID 3008 wrote to memory of 2860 3008 cmd.exe 33 PID 3008 wrote to memory of 2860 3008 cmd.exe 33 PID 3008 wrote to memory of 2860 3008 cmd.exe 33 PID 3008 wrote to memory of 2860 3008 cmd.exe 33 PID 2552 wrote to memory of 2760 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 34 PID 2552 wrote to memory of 2760 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 34 PID 2552 wrote to memory of 2760 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 34 PID 2552 wrote to memory of 2760 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 34 PID 2760 wrote to memory of 2892 2760 cmd.exe 36 PID 2760 wrote to memory of 2892 2760 cmd.exe 36 PID 2760 wrote to memory of 2892 2760 cmd.exe 36 PID 2760 wrote to memory of 2892 2760 cmd.exe 36 PID 2552 wrote to memory of 2744 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 37 PID 2552 wrote to memory of 2744 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 37 PID 2552 wrote to memory of 2744 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 37 PID 2552 wrote to memory of 2744 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 37 PID 2744 wrote to memory of 2112 2744 cmd.exe 39 PID 2744 wrote to memory of 2112 2744 cmd.exe 39 PID 2744 wrote to memory of 2112 2744 cmd.exe 39 PID 2744 wrote to memory of 2112 2744 cmd.exe 39 PID 2552 wrote to memory of 2792 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 40 PID 2552 wrote to memory of 2792 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 40 PID 2552 wrote to memory of 2792 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 40 PID 2552 wrote to memory of 2792 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 40 PID 2792 wrote to memory of 2688 2792 cmd.exe 42 PID 2792 wrote to memory of 2688 2792 cmd.exe 42 PID 2792 wrote to memory of 2688 2792 cmd.exe 42 PID 2792 wrote to memory of 2688 2792 cmd.exe 42 PID 2552 wrote to memory of 2692 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 43 PID 2552 wrote to memory of 2692 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 43 PID 2552 wrote to memory of 2692 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 43 PID 2552 wrote to memory of 2692 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 43 PID 2692 wrote to memory of 2684 2692 cmd.exe 45 PID 2692 wrote to memory of 2684 2692 cmd.exe 45 PID 2692 wrote to memory of 2684 2692 cmd.exe 45 PID 2692 wrote to memory of 2684 2692 cmd.exe 45 PID 2552 wrote to memory of 1368 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 46 PID 2552 wrote to memory of 1368 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 46 PID 2552 wrote to memory of 1368 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 46 PID 2552 wrote to memory of 1368 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 46 PID 1368 wrote to memory of 1716 1368 cmd.exe 48 PID 1368 wrote to memory of 1716 1368 cmd.exe 48 PID 1368 wrote to memory of 1716 1368 cmd.exe 48 PID 1368 wrote to memory of 1716 1368 cmd.exe 48 PID 2552 wrote to memory of 2488 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 49 PID 2552 wrote to memory of 2488 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 49 PID 2552 wrote to memory of 2488 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 49 PID 2552 wrote to memory of 2488 2552 213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe 49 PID 2488 wrote to memory of 2608 2488 cmd.exe 51 PID 2488 wrote to memory of 2608 2488 cmd.exe 51 PID 2488 wrote to memory of 2608 2488 cmd.exe 51 PID 2488 wrote to memory of 2608 2488 cmd.exe 51 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 2608 attrib.exe 2860 attrib.exe 2892 attrib.exe 2112 attrib.exe 2688 attrib.exe 2684 attrib.exe 1716 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe"C:\Users\Admin\AppData\Local\Temp\213da063c5a5f22d0c18497ba8cca63d1f0ca7509e763b8e6855f87316f56044.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2592 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2860
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2112
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58214d9ce5ba79503c8fe4d123c502ccf
SHA1dc82e9d35b00034e201e1d55ff1a985b8b5f385c
SHA256ccafd9f52471b0d0840db2e2ac54a2eed01ad0d3ec27c96e60db2c7e60e14998
SHA5125f09dc99b6ddbdd75af60d04a55c56f9643a33a57f0dd7b36b2aa2c3400cc72fbf3be7a99ab6e7d609b5b88dea5bf004b12c1ceaebf8846b426dfed569e8bb47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22428f5da9031c0d4e501b96712fe23
SHA19356086bb98e447121083e1a7a15b0d393236e39
SHA2568e2b774b497e36fa3ab674f57120fe329e6775c6e2d8f941d6d9cd263c957ae6
SHA512321a741e4a75f6ae3c297b1596e29cbcd2257d1ed8f0c4c56ef1b9d91c169f8e2ab0265b640bfea11dddbb96a31da85c6aaf1a099baf28d4fe8c6ba2c8870f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d7207163628198a75f551810638f750
SHA1ca934befe97b513a43ce52ee9439bb62f0b45fc9
SHA256e5977dd12a84202f474d5f16f291775a2ce8e2b32ddbaa88b1d67e8ee9d7f6ae
SHA51249493fb59fb5d17f86a15ee120d65f5fff36aa5f3e0a306482cd955d6c5b49707283302ab7269086fea9a49a83dac9d55e0744d2b926909b5f4a715332a4b8bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b55f0c2772f6b397b3f0cf99842826e3
SHA110fa82ee4029c330c9ea0056176c7369cf340046
SHA2567a22e660c5f379a1e3ae1402377949e9ee93f6d9597e124cacdbb0764532a1e4
SHA51232e2d42585fadb6fed30da98164c6c04613a6056be423510141a0c9c0205784a513c97e8cf4bf9defa429361347787e33364f9f9f05c0d2fc2e4dd29a433348e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa075f237bf5e53ad49c4ffdd77f2d83
SHA189089f502f241bc9a8416fe977f46bd104b62280
SHA256999740b8ea82f14c39f3223253e3388e01d5f9b3cad6978142af8d182ab9bfc1
SHA512ab4b80bb7d245e2274a41f7c36dfbc978daf0d7141551f9798b9725e9f908437ad20701081b043981d96d7156999a434db76b53ecbfb35e4335da26ba095718c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff415faef6e71584be0c976d37250d36
SHA15e2e509ebaf49d43fa079c67ca50c3ef6d6d8b81
SHA256804d5763d5c399c5426794705c33aacf447f8cc779581f1baa460599044f16be
SHA51249537cf988836611f55ce76a5cea69ed6b12eb724003d4679175a75e7cdae77aa7987ed7e119ce73c1aeee79042f708b822ecba672363452dbd2112f740cdc01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e6122c2f18c44acbd0d913a8fa3ec3
SHA1af4a828b477b945d7046a1aaaee1346bf3eb286c
SHA256cbf4f2f33486c0641dd037c720454f9085f9e9e0f2607e55f07e235911265a0d
SHA512c86f75a7d244f460d8ae7bdc69bcc741ebfa4579eb1c8d35a664d9fcf8dd96872e25899ae51a79a20c6e3ef0f93b28ecd58233ffd8dd5178f28e30a7d3602da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0d6c0593ccc8c3fe254ee163d2763f
SHA1957fd1dc36c3febd3d673ba3734fda41f2c47ce8
SHA25653bbd35e2db13fc2ec82b5c153e510ea025aa6ab66d0b26620a6c59c35c6ffba
SHA5123ed152272969e6d91cbbb4cc31c2db12a32d282ce71b9c29c11a28e24c64ba3c5ebde5947455debf49a6b5f780edb7eedfbfd4e6b768f3c226f3665f2272235f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5865713be27da90684425159d28a83265
SHA15070c8f40ce68a828ef37c1cfa9de985a7f798fc
SHA2569f53f21f14bdd616711ddf2a02165239c293d7d4f57e2fa81397e19c21b37265
SHA5124cbdc1228071ccb3ea87d80a4c0d323ab965d4664d69475039518d59e4f1d2b7f3a17000fa2e39982f2c847c1bfb1af4939d047ed25df89d62c3e6423ac573c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149b61bd9584d7a795e03951c25ffb41
SHA1672140e59ab06708c1be6a7760cc7c74ab094b62
SHA256da16d338fb6da8ae3b98652d5319bf4235d4988514d2ab601aeae0fd2613fe75
SHA512bf51d19082b741feda092c1ee3802ae255cbce92ff95a9e315a84d190fd07172191d5a5f54a1143f901d2a014a8a867cdff0e0722e16788b79aed4a9bc157302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b9b018022e36d657bbbf1f30feebd9
SHA103deb0aff5a232a405842a8b2126331dfa1b31ea
SHA2562e033721a02771ce96944339a1563b3dd3e92ac6c2eee4334008e96291add700
SHA5123850e51c5e855472422c596d2e72b6444f27d7ce70a9685b30f7946baf5b8bb16437273f3a21705698f3495b81b6b7221b8df38a451c92e805a932133473b110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a8102a44cced56e5cbb51490d8606d
SHA1a5c7e0186a99211ae2998666469f2dc0ed1ed291
SHA25609fcc88f50c374029ca41287b690fe165a2f5c098598b5a7590a27ed2031c998
SHA51225d1d993647bad147c31ee761350997ec2dfade0b18cb1542cfa3f51b6c656ee4d7da41e2e304eb295ffc8ab2c78514718510076cfb389f10ba42f5f495d7c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5307e44dfec5bd6e086fd02513ffa5ca5
SHA1b68c7eefc0e54534392fb855e5670ae0d9ab3b1f
SHA25667c861ce4c63babb89a4beea0341f1f717a2432e99b0b9f5fa2dd0e34cda8f04
SHA512f5215b51e4fd91d9af49b03fe0b42b772058a688aac008d97fd80bff390ac46203506f5d2e612b4c6118a0b2ea575fffaa1ef22f0eb756d84c7343a629103c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51645aeef877082f22ec38f508f0eb3ae
SHA1fe88a1cc4ec6db0b82541f231ffa21e205c0d250
SHA25662ebb3e6ae84437e87dd2942da82dcb8f3583bcf73802190b869f9957365f9e1
SHA51207af5e1a69868ba0d984ca1c3b41371ec8e4d247f268513d30b41661d47340b7284b33e36c5eee60ac992c30edde66b5b8e6ed6754f076f532278b355207c41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc7ad36181c1ae6329010a507d9493f1
SHA15a31d88b023178e76204839f537973ced9c0d04f
SHA2560876f34c96f1327df4633230de288deb2f8953436c2d38be8a6faa84279dc1ef
SHA512c91e95664be2e799f8b34462bd19c3fe9f3aa694a84b797409fd40650d53ad18b308488b9535dcbc5a52205a754547a477a1f7f77db650502311e2680dd3749a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad5b999fc4543a0d9d3e171be58358e
SHA111eb7acd38df1f1fb726c0bdbd8e4001ffc0d739
SHA256110f26f5333f74d555703e99d74e8fb17c93217c8c6f82066acf03eaccad4735
SHA51276e307e14bb94ef5dc9b50c688a92039041296c7e2ccce6b9e6ff9c511f9d1ff6681c3d27e2689303c18b0b5e8b197f700787227ddbc002e671e4cb728df57e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e81751ace5ea80e3c5f01c59259f585
SHA1dbfb77975a15797d03baefd943af8e12297cb544
SHA256eb7a62af80e8a6c9f6322c59ae99b45d21d98eaec6ad88cf0710e3a92b694b13
SHA5126ff5463c3584d63fe641f26b54370740d5d09544ef2d50abcf806840446a40f50146888a16a26a7c5db37fc4c31576a5f0a3210f997cdb04a91215dd7e17ae45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c4684540831523f02d06d40ebd7661
SHA13ee3ac5a496caaa7baad83438280349823bc2ca8
SHA256f2347e807ae737243ed9229a16a5aa0f53d309b05445aa981c5a62bd7f9e26c3
SHA5124c5f267382701997aa0443b4f655fb0ff4a2e4e30e79ea0e7c6ff35f02b97660d0cada8800995a0f3b184c752a80bcfdf4d8dee1c84f1a3c0538003775b350b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9251511c06584f8eb9afad562e9b0e3
SHA13e80609359ab7db4b2700efc5818b4cf7b81aae3
SHA25685bdaf91c5d94656470c78804f15764608fbcd2e6b2b2c5664cd94fe836bd586
SHA5129be0108ca0450492b6ef75c3bf9cfa9601f1b64c6376987566a6e33b220b0b6142e8c1d618ba1418521088115d7fb737b28f2b7e8294ff8d37af5338a985d65e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
232KB
MD55dba2b541d42dc9b7898a620452a48d8
SHA107e0a20f542302923dac7fcca5c4d66671c34dd5
SHA2564a215c8d2b238ae570841649e0c9d62c1d291e9e0c2f7897500f669898a1525c
SHA512d42f49fb20dcd32b73bf1ec2085f54cffc9c6afe2deceaaeae5406291e8c8264dda3269dc5d3539e458bddbe28efa41fa7e9670bb363a94703fc948ce1e82ad6
-
Filesize
232KB
MD55f9a6241572df94185d61434d1d77dab
SHA1fdd8de55827c68411e6391b6cc5236b523a191c6
SHA256973a097525b5e2423ecfd80361ecd5c2436500044139aeb752102a3d53a100eb
SHA512d9a43fb67d17a33293575616493a0ace3350a710a5d7216b348db6a429e03daddfca2124069edbe902e60bf7907aa391ed8a646f231d0ce73ba01a98c3c474e1