Analysis
-
max time kernel
95s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 05:42
Behavioral task
behavioral1
Sample
611c69111c159fb3f5f30ecb9dae03a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
611c69111c159fb3f5f30ecb9dae03a0N.exe
Resource
win10v2004-20240730-en
General
-
Target
611c69111c159fb3f5f30ecb9dae03a0N.exe
-
Size
232KB
-
MD5
611c69111c159fb3f5f30ecb9dae03a0
-
SHA1
fe60151feb5cf19f725ee20640987134b4345191
-
SHA256
1f7bf9df9b0ad3779c9d91448fea26db82cc6b06709c114c953bc6d512b32577
-
SHA512
2f411f85c1c3b4b11a8f6750d8b885ea74b047d689366e6fa70e5d537081022799459a75d390c0af976643a3d6f6cee78cd90916f52e1335e91c8bf03a176a70
-
SSDEEP
3072:Q1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1VOz1i/NU82OMYcYU:+i/NjO5xbg/CSUFLTwMjs6oi/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 611c69111c159fb3f5f30ecb9dae03a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 611c69111c159fb3f5f30ecb9dae03a0N.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Control Panel\International\Geo\Nation 611c69111c159fb3f5f30ecb9dae03a0N.exe -
resource yara_rule behavioral2/memory/2696-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x000800000002345c-15.dat upx behavioral2/files/0x000700000002345d-16.dat upx behavioral2/memory/2696-17-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 611c69111c159fb3f5f30ecb9dae03a0N.exe File created C:\WINDOWS\SysWOW64\qx.bat 611c69111c159fb3f5f30ecb9dae03a0N.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 3500 cmd.exe 1452 cmd.exe 3316 cmd.exe 1564 cmd.exe 3712 cmd.exe 3964 cmd.exe 5108 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe 611c69111c159fb3f5f30ecb9dae03a0N.exe File opened for modification C:\WINDOWS\windows.exe 611c69111c159fb3f5f30ecb9dae03a0N.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 611c69111c159fb3f5f30ecb9dae03a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905b84df9ee4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{0A8E474A-5092-11EF-BD30-662DAA9DA741} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ceaa83762b6f344aa4f621e91b1e442400000000020000000000106600000001000020000000e88a482294a380fc84454a52b87401eeace1f8cc00a99f09bc088b1fa5c4c428000000000e8000000002000020000000ab0235c2d3385e5fdb2511686b346f478e905cea8267018db53509909956a0c7200000001fafdce2c2a233f212114bc81541069d4fef18a4837cdfcd7d6ff7006ca677674000000076ea5ae7d7aa41fcac8ca13f874289ac360d1a2c98937cd1d8d582c339909cc88e0072d661f2457d7d102ab61dafb2c26e13c50d52742e4375f8198c0beeedd9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Software\Microsoft\Internet Explorer\Main 611c69111c159fb3f5f30ecb9dae03a0N.exe Set value (int) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3739533071" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31122590" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31122590" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31122590" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ceaa83762b6f344aa4f621e91b1e4424000000000200000000001066000000010000200000007dcbcb4a01f74472a4f72221f35bae389afc6e639c3998ae5e94871651332d92000000000e80000000020000200000007ee2b6e3826bb35ad08b8f402e44af7b6b944d25215bbe18937a382c6177be5820000000c9d0a4ba934b363d53bf26c6d7e29fc390e4b5541b094c15199c97fc9fd357e440000000996796761431b1ebfdad690a4aa3a128a63175fd04145b3ef84578660943706f0b7463a38cf39e1de1adc946a6c54924f58eb14fc548f3e6f58ffc4b915df5a0 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3739376951" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429342339" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3743908320" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a07fdf9ee4da01 iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 611c69111c159fb3f5f30ecb9dae03a0N.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5028 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 5028 iexplore.exe 5028 iexplore.exe 4892 IEXPLORE.EXE 4892 IEXPLORE.EXE 4892 IEXPLORE.EXE 4892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2696 wrote to memory of 5028 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 83 PID 2696 wrote to memory of 5028 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 83 PID 5028 wrote to memory of 4892 5028 iexplore.exe 84 PID 5028 wrote to memory of 4892 5028 iexplore.exe 84 PID 5028 wrote to memory of 4892 5028 iexplore.exe 84 PID 2696 wrote to memory of 1564 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 85 PID 2696 wrote to memory of 1564 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 85 PID 2696 wrote to memory of 1564 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 85 PID 1564 wrote to memory of 1780 1564 cmd.exe 87 PID 1564 wrote to memory of 1780 1564 cmd.exe 87 PID 1564 wrote to memory of 1780 1564 cmd.exe 87 PID 2696 wrote to memory of 3712 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 88 PID 2696 wrote to memory of 3712 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 88 PID 2696 wrote to memory of 3712 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 88 PID 3712 wrote to memory of 1068 3712 cmd.exe 90 PID 3712 wrote to memory of 1068 3712 cmd.exe 90 PID 3712 wrote to memory of 1068 3712 cmd.exe 90 PID 2696 wrote to memory of 3964 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 92 PID 2696 wrote to memory of 3964 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 92 PID 2696 wrote to memory of 3964 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 92 PID 3964 wrote to memory of 3204 3964 cmd.exe 94 PID 3964 wrote to memory of 3204 3964 cmd.exe 94 PID 3964 wrote to memory of 3204 3964 cmd.exe 94 PID 2696 wrote to memory of 5108 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 95 PID 2696 wrote to memory of 5108 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 95 PID 2696 wrote to memory of 5108 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 95 PID 5108 wrote to memory of 2984 5108 cmd.exe 97 PID 5108 wrote to memory of 2984 5108 cmd.exe 97 PID 5108 wrote to memory of 2984 5108 cmd.exe 97 PID 2696 wrote to memory of 3500 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 98 PID 2696 wrote to memory of 3500 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 98 PID 2696 wrote to memory of 3500 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 98 PID 3500 wrote to memory of 2928 3500 cmd.exe 100 PID 3500 wrote to memory of 2928 3500 cmd.exe 100 PID 3500 wrote to memory of 2928 3500 cmd.exe 100 PID 2696 wrote to memory of 1452 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 101 PID 2696 wrote to memory of 1452 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 101 PID 2696 wrote to memory of 1452 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 101 PID 1452 wrote to memory of 4604 1452 cmd.exe 104 PID 1452 wrote to memory of 4604 1452 cmd.exe 104 PID 1452 wrote to memory of 4604 1452 cmd.exe 104 PID 2696 wrote to memory of 3316 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 105 PID 2696 wrote to memory of 3316 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 105 PID 2696 wrote to memory of 3316 2696 611c69111c159fb3f5f30ecb9dae03a0N.exe 105 PID 3316 wrote to memory of 3140 3316 cmd.exe 107 PID 3316 wrote to memory of 3140 3316 cmd.exe 107 PID 3316 wrote to memory of 3140 3316 cmd.exe 107 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 1780 attrib.exe 1068 attrib.exe 3204 attrib.exe 2984 attrib.exe 2928 attrib.exe 4604 attrib.exe 3140 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\611c69111c159fb3f5f30ecb9dae03a0N.exe"C:\Users\Admin\AppData\Local\Temp\611c69111c159fb3f5f30ecb9dae03a0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5028 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4892
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3204
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4604
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3140
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
232KB
MD56e0ae71f39cbd1b22a7198a44d3f6688
SHA1f22e09da16769a870d4de4cc472ad2b6185e9f2a
SHA2564de73f873a78318d1f5d5f410b8572c8f3cb09d97e3f7ac22636ff4e5cc89063
SHA5125685b35ea48b6fe1fac21aaba977f8f7550a9d652aec42aa2b21f3d46796be11efa8c1ee443e17011953996097d7cf7249f7cc61c7d33d39d394a436d2306bb0
-
Filesize
232KB
MD5ed30cdd6ac945966b22dc6a36c509523
SHA10f7654973190e507db535e94a01e5a71f8ae7110
SHA2567bacb6b2e301da9269abd45953ce77eda66e3654d97814f4891cd6c7105f711d
SHA512e9aa67afd3546fc770c8fe1a4105bc1913739bb00abaa0017669d43da64a9eca75d08ac29507fb24a3108302ea8e3f56c898601576c91e1ff2ac432cae892d41