Analysis
-
max time kernel
71s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 16:46
Behavioral task
behavioral1
Sample
bbb2811b32a9624bf4dc55f19e8eb4a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bbb2811b32a9624bf4dc55f19e8eb4a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
bbb2811b32a9624bf4dc55f19e8eb4a0N.exe
-
Size
232KB
-
MD5
bbb2811b32a9624bf4dc55f19e8eb4a0
-
SHA1
0f06476c8bd62f75b84f96c811cfb51a6c75f29a
-
SHA256
18259678ef431a836b00a935c650ab8e46d5e2353270a8e39e3d6e40f807d437
-
SHA512
fe8bfb22d085c58a43b651febde3b65751591d7a0a4970fbfd77899128721799c74b053c3f69c08137061569e5c70c79928bd315a52ac7c004aafc8ef8bb1d14
-
SSDEEP
3072:w1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1VOz1i/NU82OMYcYU:ei/NjO5xbg/CSUFLTwMjs6oi/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} bbb2811b32a9624bf4dc55f19e8eb4a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" bbb2811b32a9624bf4dc55f19e8eb4a0N.exe -
resource yara_rule behavioral1/memory/2368-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x0008000000015fe0-10.dat upx behavioral1/files/0x00080000000161fb-11.dat upx behavioral1/memory/2368-444-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat bbb2811b32a9624bf4dc55f19e8eb4a0N.exe File created C:\WINDOWS\SysWOW64\qx.bat bbb2811b32a9624bf4dc55f19e8eb4a0N.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 2864 cmd.exe 2596 cmd.exe 2172 cmd.exe 2812 cmd.exe 2752 cmd.exe 2716 cmd.exe 2912 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe bbb2811b32a9624bf4dc55f19e8eb4a0N.exe File opened for modification C:\WINDOWS\windows.exe bbb2811b32a9624bf4dc55f19e8eb4a0N.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbb2811b32a9624bf4dc55f19e8eb4a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main bbb2811b32a9624bf4dc55f19e8eb4a0N.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428779080" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000006335dc100b5c45780e4895cdd8a94f558975d3c1a5508534795fec45a5dd32be000000000e800000000200002000000089c899aa677130285efef535c160b9ce067aa0a1961d66d5476f19812d0ae27520000000b80380451a724a7781e5a43326eb1884c03b1b10787a4123dad3a714f0c6134340000000d7a67175ea3a0d2e57b3fe8aa32534935a75c9aa1b58acecbd129f15909b65f88fd62e4e513c597875f8ba91636af0843a2168ce47bebb9a07b4008f5ff8deb8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bb6fa8fbe4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF69E1A1-50EE-11EF-B467-D2C9064578DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" bbb2811b32a9624bf4dc55f19e8eb4a0N.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1616 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 1616 iexplore.exe 1616 iexplore.exe 872 IEXPLORE.EXE 872 IEXPLORE.EXE 872 IEXPLORE.EXE 872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1616 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 30 PID 2368 wrote to memory of 1616 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 30 PID 2368 wrote to memory of 1616 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 30 PID 2368 wrote to memory of 1616 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 30 PID 1616 wrote to memory of 872 1616 iexplore.exe 31 PID 1616 wrote to memory of 872 1616 iexplore.exe 31 PID 1616 wrote to memory of 872 1616 iexplore.exe 31 PID 1616 wrote to memory of 872 1616 iexplore.exe 31 PID 2368 wrote to memory of 2172 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 32 PID 2368 wrote to memory of 2172 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 32 PID 2368 wrote to memory of 2172 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 32 PID 2368 wrote to memory of 2172 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 32 PID 2172 wrote to memory of 2756 2172 cmd.exe 34 PID 2172 wrote to memory of 2756 2172 cmd.exe 34 PID 2172 wrote to memory of 2756 2172 cmd.exe 34 PID 2172 wrote to memory of 2756 2172 cmd.exe 34 PID 2368 wrote to memory of 2812 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 35 PID 2368 wrote to memory of 2812 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 35 PID 2368 wrote to memory of 2812 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 35 PID 2368 wrote to memory of 2812 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 35 PID 2812 wrote to memory of 2836 2812 cmd.exe 37 PID 2812 wrote to memory of 2836 2812 cmd.exe 37 PID 2812 wrote to memory of 2836 2812 cmd.exe 37 PID 2812 wrote to memory of 2836 2812 cmd.exe 37 PID 2368 wrote to memory of 2752 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 38 PID 2368 wrote to memory of 2752 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 38 PID 2368 wrote to memory of 2752 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 38 PID 2368 wrote to memory of 2752 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 38 PID 2752 wrote to memory of 2868 2752 cmd.exe 40 PID 2752 wrote to memory of 2868 2752 cmd.exe 40 PID 2752 wrote to memory of 2868 2752 cmd.exe 40 PID 2752 wrote to memory of 2868 2752 cmd.exe 40 PID 2368 wrote to memory of 2716 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 41 PID 2368 wrote to memory of 2716 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 41 PID 2368 wrote to memory of 2716 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 41 PID 2368 wrote to memory of 2716 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 41 PID 2716 wrote to memory of 2904 2716 cmd.exe 43 PID 2716 wrote to memory of 2904 2716 cmd.exe 43 PID 2716 wrote to memory of 2904 2716 cmd.exe 43 PID 2716 wrote to memory of 2904 2716 cmd.exe 43 PID 2368 wrote to memory of 2912 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 44 PID 2368 wrote to memory of 2912 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 44 PID 2368 wrote to memory of 2912 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 44 PID 2368 wrote to memory of 2912 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 44 PID 2912 wrote to memory of 772 2912 cmd.exe 46 PID 2912 wrote to memory of 772 2912 cmd.exe 46 PID 2912 wrote to memory of 772 2912 cmd.exe 46 PID 2912 wrote to memory of 772 2912 cmd.exe 46 PID 2368 wrote to memory of 2864 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 47 PID 2368 wrote to memory of 2864 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 47 PID 2368 wrote to memory of 2864 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 47 PID 2368 wrote to memory of 2864 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 47 PID 2864 wrote to memory of 1564 2864 cmd.exe 49 PID 2864 wrote to memory of 1564 2864 cmd.exe 49 PID 2864 wrote to memory of 1564 2864 cmd.exe 49 PID 2864 wrote to memory of 1564 2864 cmd.exe 49 PID 2368 wrote to memory of 2596 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 50 PID 2368 wrote to memory of 2596 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 50 PID 2368 wrote to memory of 2596 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 50 PID 2368 wrote to memory of 2596 2368 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 50 PID 2596 wrote to memory of 2664 2596 cmd.exe 52 PID 2596 wrote to memory of 2664 2596 cmd.exe 52 PID 2596 wrote to memory of 2664 2596 cmd.exe 52 PID 2596 wrote to memory of 2664 2596 cmd.exe 52 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 2904 attrib.exe 772 attrib.exe 1564 attrib.exe 2664 attrib.exe 2756 attrib.exe 2836 attrib.exe 2868 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbb2811b32a9624bf4dc55f19e8eb4a0N.exe"C:\Users\Admin\AppData\Local\Temp\bbb2811b32a9624bf4dc55f19e8eb4a0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:872
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:772
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa0ff4df5a99142c05a19257fafe866
SHA1f062490d5a8d08c0275b46c94d8f93edf5d5b1d3
SHA256c8698f31c270dc19e521d9abc0553610b5eafb3ff36edccd8cfb3d1f6b049201
SHA51282a5a4d79fc850db5cd22e242f5a1b94eaa157e9c6d0a7850a9080b71cd66b1bb7e2f360b47796385c70c5ef0936abfdc02f15843ecc1acfedffb750f021b586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a1c2abfaf31defe6c378e0ac949cfc
SHA1045927364007e259dfd927883c51f326c1aa651a
SHA2568c0ebab60dba0a2a0a6694d21dfb1a4c285f690de6ac2e459cece377494fe040
SHA51288567f2a3e3407c429269569ea8fac21edff3dcecd677bc3efcc565164f96730d0c57d33a6cc0c99a1389a21a871456a7623b1331d0811a68b19d1a87e9a82e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da28e68d4585da0763b710768aea72a
SHA182cb419a41dca25c7ebef58cd9ea8d237c0b8f8e
SHA25669bad7d082c35c13f16ad9bc4beb4644a1f0755d18d7c71d338b5b0df1a37002
SHA512e23e9beda4e9b25033e0f3bf9555353aa3971dd7e6b79812b53da5eab1063315f708b648714f12f2eef3a86ce4713d59884b9b763186b6d87feabe1457b03e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57997cff41857f3d91b69f2f0537c1664
SHA12115573e0f71fc3f0e897b302a1d4a6696f2801b
SHA2567f8d4e0074c336cae29889660b865cc82c5fb21f8625c48f792b6a06ad3526bf
SHA5120bc5990723f8c007bcb53583422b842a4038087803c8b78803a323a176f1ddcac2bfce196ced73ec5f86c5b961f818d75e0d551f2a0bfd05daa220764c33d8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009192cbee5bdc257ff3959153d9acdc
SHA141189b3b9647ed19aa13393af85ddad9d4d177e7
SHA256f2fd0337dfaa28ad5bfae89a8f8a4ab33e23e683c1e1b79ce51e845967f38715
SHA51296e4c4255a5a18f06e16cfd345e29ede83f72b363132add6f9e95a233dffbe290fe62c50c09068fb916f60cb73f152942c9c83a66ae421974fc5b097d1292f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c7565c6cda9d4bad321789584843d97
SHA1106bfca9f6fd79bd041760cea7885a2e67bb08e8
SHA2566a0da50f927fbbeea2944a02e89695480b3bfd501bff5167b8ad7a5a37ba1df5
SHA512c98ec98ff1140e4031a073cfad85041f1375266d486ac777ef60501ffab44e514364afe4a19e9a06d6f67f9f589f0b3b034fbd66ad5315dc7b796c7f5f1b618e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f45d9c1107e5af0d78df779986384340
SHA1d02c6fc0adf6741cd61c61757d53732d9685d555
SHA256ab1832715b05b79ac430d3879c72cdcec00a9b6da89a77cef0e14586904a7ad0
SHA512b52f7477df0de81b7d5cce2aee179eda4e9f7ce0dc9763805fb2f3def39652054f571cebe291f68b3876130eef3e396fb75053fc588633838e5b71c6405600ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141b9fcebe18c820930e1d6178499031
SHA14726161387904f4fc6926de2d4ef654377f6f637
SHA2569fe0db8f06355c86307ee017d9b43d11b74ba0c3a29c37db11f5fda12a4243a6
SHA5124c62d9fcedbee8f9adf9951d37d88cef4d78b23fdb4f3a5a8a57d8f7ed5e3d5b8b858926518bc5c84b307a9b0ca0776c1d5c7fa5ada138e28c5ae7d3a0afe3c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe84936bc9b46e761ffd2cb5ac2be9c7
SHA1c7f376e40fdf2a90405fa2d454c79f22da637d7c
SHA2564e439721ef4ebfb73960a0831f13d7921e482889f59708385feb19f835bcf532
SHA5120b1e8d5e0069b01f8e6e093ac69e08a74c7f86e819881953c2abcde9f4d06d65fc423c744f51cafd1dae975749a8eecc20f1d812d7c6feef4209ac2a18890084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ee69e43287bf79608da962f503f342
SHA1adda5e8d9fa56d5bb801dd3dd78c6b379c7ddb07
SHA256a2991a052c5e44d8375bc88a34e2b80de48807bc4453705194748254f4b4429d
SHA5120cf41465dbc744dd29c49e6e66d522044d694d290c516bb0f67d68fd43dc10703a724b62b7662c4f0754de42cbc1f9e5fea5d73ebb26d717217dd1c1cbb42fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922a62f5e7654ba420b457360b5a2d84
SHA1ab8f4530fe584e48830e3668c4431ca1f5f90a65
SHA256994249e18e9dfe49d0f6eb43eb08f6653d7aa162bdef9f09a1e6b33ede398912
SHA5121000c823bc70d34ec7a1c23c4d4bcc39827828c67ed459a5a8c6923b1e677ed49a389e19d1039dd9023222dd23ab0b85ebc1d12769a413fc413c1098243a3e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7a63b20e79effa9e099004339a2cecc
SHA10dfd49e803a648f444a41fff1d7aaa683e6d92de
SHA25606d675a71e7232d1707e842a384e55e36eeb00e6a29f9edcc1e74dcd3fd243ac
SHA512161f9330f20aec4361d3ae6bbc8abeaad13f2fae3fc16986171494565e48a667d924b38b0adee4c4dac7899e73942d85c39cf80ff35ccd5646e1352dc9174515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d107df7a6713a103509da6244abf96f8
SHA12f41fee881a89f2f1bbae2a13a0b396b40af35e9
SHA256b7ced9f0496e54bc25803eae5e8bb91ad859bc165b38db7b1099d328ebdc7b04
SHA51213bf9c9e638a124c6c9b035771f181e805a86aa1d0f4889e7fb5d6e0afe01be73f1e512455f510644bf11716b8be580705934be56ee6036c322c2f9dc269962a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59368c4c779bf728864b0a337250d0b50
SHA1348fd1b6f28250331e3baeeee06d290317e03c31
SHA2562eff3f642582981ca6174c468adfdf71593aa8afa36d7148a3a5183045b99544
SHA5120170d17d5c0051ef6bb748ff5feb18580a285892b649a278e0b6460682e6979320e484fa9c02ae99b721bad5a8c85bae9a009d906df54ddd46094aaff5337349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041327ba20b2338a00f4e3544c546583
SHA1db6d34243f2d0a28fe072af2eaf9798d1ef2ed21
SHA256ce646ce0fca21221bc5cf2fbf6de07e3e3a3de749908a5881f8cc54b23f5381c
SHA5127bb4a5b33d79f1783469dcb06cd11b1633cd3fedbf89d971e9f1e6fae3f9fc71a1ce6de2663d72417ae6206af49badd7128b03a54ff0772fbf5437e600965699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a7d562a59aeb9497853b6d761fbaea
SHA17c2387e3d9e1615d9d32872ff92473cfbd39d6c4
SHA256607c030beee120ea991953246b38b3d69869ab5bd68640e626958f570930fe0c
SHA5125a190ac85ca91ead55db614fda3e2ca1b0678f970f3927f24ed0937e620be5d67ff754e19caab4cfc3ad1db8e11225fcd8f77b8b4892deee1305b54a7184e359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e72cee991b1d65f4d9ede6cbc1f43988
SHA1a217268af629a3f319ef770d4cd5408ba037c36b
SHA256b4ffd3cfbc13b3987085df7ae634d41a26c36ba0190eb51692330135e6725e66
SHA5121aaed33ef783cb3463a010510130d800b205106d5871a9901690b09f98db3fa8892230d1942b7028f6f4c098169ad9c40c9b36145916555b5891a3ccff51cc75
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
232KB
MD5ae24fc52a6ab6fdbd547cf0af8cc66a5
SHA104471f3984af3e703ff7aaa75f9286bb523791d9
SHA25653818f3cd4f16717364d9a5d77a9c62cc1313153c69c6e210f2c9bfd73992ded
SHA512432a30028e5a84ab98b224f02b4d951d8f24585597a50690297212be704e191dbc494dad2dc025c928e8ab454b4f5e1937cd01a0d3ba1419844179f98857e344
-
Filesize
232KB
MD51781819f40ef47f72eb7d76b14f880fb
SHA1da3f56010825b554f3e3b15837854533f67b29ff
SHA2567f45268019ec671a536270ab7129d94d84225333fd636b1c8e6cbe767b446187
SHA5121c9c2cc09bafc517d9ac28dcb0d96da06c7a770cbc69edb4f9defb5519f024ed5a21e292c7c222d13b9cb5b6e40c88e425481fb5fe1e6d47e85860d7dfef612c