Analysis
-
max time kernel
96s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 16:46
Behavioral task
behavioral1
Sample
bbb2811b32a9624bf4dc55f19e8eb4a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bbb2811b32a9624bf4dc55f19e8eb4a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
bbb2811b32a9624bf4dc55f19e8eb4a0N.exe
-
Size
232KB
-
MD5
bbb2811b32a9624bf4dc55f19e8eb4a0
-
SHA1
0f06476c8bd62f75b84f96c811cfb51a6c75f29a
-
SHA256
18259678ef431a836b00a935c650ab8e46d5e2353270a8e39e3d6e40f807d437
-
SHA512
fe8bfb22d085c58a43b651febde3b65751591d7a0a4970fbfd77899128721799c74b053c3f69c08137061569e5c70c79928bd315a52ac7c004aafc8ef8bb1d14
-
SSDEEP
3072:w1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1VOz1i/NU82OMYcYU:ei/NjO5xbg/CSUFLTwMjs6oi/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" bbb2811b32a9624bf4dc55f19e8eb4a0N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} bbb2811b32a9624bf4dc55f19e8eb4a0N.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation bbb2811b32a9624bf4dc55f19e8eb4a0N.exe -
resource yara_rule behavioral2/memory/2644-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00080000000234d9-15.dat upx behavioral2/files/0x00080000000234dc-16.dat upx behavioral2/memory/2644-17-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat bbb2811b32a9624bf4dc55f19e8eb4a0N.exe File created C:\WINDOWS\SysWOW64\qx.bat bbb2811b32a9624bf4dc55f19e8eb4a0N.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 4880 cmd.exe 4884 cmd.exe 4100 cmd.exe 2292 cmd.exe 3340 cmd.exe 1028 cmd.exe 4940 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\windows.exe bbb2811b32a9624bf4dc55f19e8eb4a0N.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe File created C:\WINDOWS\windows.exe bbb2811b32a9624bf4dc55f19e8eb4a0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbb2811b32a9624bf4dc55f19e8eb4a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31122683" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000262c84e5c2a8b24db398d3ff1cc735700000000002000000000010660000000100002000000061c6ee8b2698fcd7467a0e1257a91be3eef3751e2d7d61ab2f3c45d74f5f74cc000000000e80000000020000200000009e111e0bd6a1b3a6521534f42cd661adf0a2407d20035e732cbcbc964d26b26d20000000cfc968c9f9764fdb5a03cb34235810ad57c4b74b1f79444c3afa39482e437e4240000000ce7103f30d31e732ca0712153f8762df9c70669a9add07ccede4efa1eeb6eb1d36d799d8fa087834f474d5612a570244fbabbe4595e94bdc7188f7b628a9fdb8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08dfca4fbe4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31122683" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2772397616" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main bbb2811b32a9624bf4dc55f19e8eb4a0N.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000262c84e5c2a8b24db398d3ff1cc735700000000002000000000010660000000100002000000020c378ba5558c2344358829d6d3de7170a83255c894ad32260f265cf0ce0dc3d000000000e80000000020000200000008cd41c0bf9e5b99d553fcf99cf480cee71da5395b61115c91f5296c1f4fabc9a200000005cc3a4325f75fcd4386d210b62a8444044061e68dbc27c25072b13e4bc0b17b2400000009f7578455c32443d89e01848623b4cb599f41b81dcedf9b60a3f43cee68ffe80cf1643f5113d275e03e3ce33092b9916aa0be41d9aaaae0449ac74aba3386707 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2768960166" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31122683" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429382184" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D00D9D38-50EE-11EF-8D5B-5ED96FC588C3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0044faa4fbe4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2772397616" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31122683" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2768960166" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" bbb2811b32a9624bf4dc55f19e8eb4a0N.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4088 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 4088 iexplore.exe 4088 iexplore.exe 3168 IEXPLORE.EXE 3168 IEXPLORE.EXE 3168 IEXPLORE.EXE 3168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2644 wrote to memory of 4088 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 82 PID 2644 wrote to memory of 4088 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 82 PID 4088 wrote to memory of 3168 4088 iexplore.exe 83 PID 4088 wrote to memory of 3168 4088 iexplore.exe 83 PID 4088 wrote to memory of 3168 4088 iexplore.exe 83 PID 2644 wrote to memory of 2292 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 84 PID 2644 wrote to memory of 2292 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 84 PID 2644 wrote to memory of 2292 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 84 PID 2292 wrote to memory of 1380 2292 cmd.exe 86 PID 2292 wrote to memory of 1380 2292 cmd.exe 86 PID 2292 wrote to memory of 1380 2292 cmd.exe 86 PID 2644 wrote to memory of 3340 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 88 PID 2644 wrote to memory of 3340 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 88 PID 2644 wrote to memory of 3340 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 88 PID 3340 wrote to memory of 4544 3340 cmd.exe 90 PID 3340 wrote to memory of 4544 3340 cmd.exe 90 PID 3340 wrote to memory of 4544 3340 cmd.exe 90 PID 2644 wrote to memory of 1028 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 91 PID 2644 wrote to memory of 1028 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 91 PID 2644 wrote to memory of 1028 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 91 PID 1028 wrote to memory of 3284 1028 cmd.exe 93 PID 1028 wrote to memory of 3284 1028 cmd.exe 93 PID 1028 wrote to memory of 3284 1028 cmd.exe 93 PID 2644 wrote to memory of 4940 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 94 PID 2644 wrote to memory of 4940 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 94 PID 2644 wrote to memory of 4940 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 94 PID 4940 wrote to memory of 4932 4940 cmd.exe 96 PID 4940 wrote to memory of 4932 4940 cmd.exe 96 PID 4940 wrote to memory of 4932 4940 cmd.exe 96 PID 2644 wrote to memory of 4880 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 97 PID 2644 wrote to memory of 4880 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 97 PID 2644 wrote to memory of 4880 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 97 PID 4880 wrote to memory of 920 4880 cmd.exe 99 PID 4880 wrote to memory of 920 4880 cmd.exe 99 PID 4880 wrote to memory of 920 4880 cmd.exe 99 PID 2644 wrote to memory of 4884 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 101 PID 2644 wrote to memory of 4884 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 101 PID 2644 wrote to memory of 4884 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 101 PID 4884 wrote to memory of 1908 4884 cmd.exe 103 PID 4884 wrote to memory of 1908 4884 cmd.exe 103 PID 4884 wrote to memory of 1908 4884 cmd.exe 103 PID 2644 wrote to memory of 4100 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 104 PID 2644 wrote to memory of 4100 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 104 PID 2644 wrote to memory of 4100 2644 bbb2811b32a9624bf4dc55f19e8eb4a0N.exe 104 PID 4100 wrote to memory of 3268 4100 cmd.exe 106 PID 4100 wrote to memory of 3268 4100 cmd.exe 106 PID 4100 wrote to memory of 3268 4100 cmd.exe 106 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 4544 attrib.exe 3284 attrib.exe 4932 attrib.exe 920 attrib.exe 1908 attrib.exe 3268 attrib.exe 1380 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbb2811b32a9624bf4dc55f19e8eb4a0N.exe"C:\Users\Admin\AppData\Local\Temp\bbb2811b32a9624bf4dc55f19e8eb4a0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4088 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3168
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1380
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3284
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4932
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:920
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1908
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
232KB
MD5b1741677616a1bbe1535562b9d1710e0
SHA1241726d899daeca80a002fe216e53420fcae116b
SHA2565c06cbead1c259c4988c1f63c48e6e0d0d2cd4cb9beba7248fdc555625be1448
SHA51219c9af52cb6e47c1bfb37dd0df985d2dc94949f835c46279e2116a3fd2399f9f21cab1c761b4a2a815aedf1b4bd0ff7f4802f7ca8803f076778434fa8e951fa6
-
Filesize
232KB
MD5b0c59f981f7eb0dcc8635bfbff44da9c
SHA192a2d2f415b3346b3299827d08fcccd32a487804
SHA256d1ca5749f4df49d989505aebddb023b35b66469377c72385058d3d86dc91c1c0
SHA5121df16a0f19cba844762e6d4b1bcbd8c55a0aeb9e16ab7efbbc0ba8d790ba575efd8af706a969081e23aa87afb4d3a618cf48787807c446afcc9055909f3c3a6e