Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 20:27
Static task
static1
Behavioral task
behavioral1
Sample
0029d4cef8c491684ffcc733edf41560N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0029d4cef8c491684ffcc733edf41560N.exe
Resource
win10v2004-20240802-en
General
-
Target
0029d4cef8c491684ffcc733edf41560N.exe
-
Size
90KB
-
MD5
0029d4cef8c491684ffcc733edf41560
-
SHA1
71e9340b66c324a128f1b32df20a67766f5da299
-
SHA256
4f42d57faf56efc851bdf84f4c50786b431be91d7ba8422ab67807e0a66737f0
-
SHA512
15f8217a955e872e2b9e7503ab5853b2c406903488048142ff275bd390022f1e6cf5fb6f83a4c53b5f98a9ecb00a499bc8ab01640befa1fc51b2ebf6d6de6fec
-
SSDEEP
1536:wQWLl4DvFqc0kBTC92u3P4de9HjZA625DmgfKRvfDhdP:+JoQc0mu/3PTH1AbDmgfKDh1
Malware Config
Signatures
-
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\iedw.ico cmd.exe File created C:\Program Files\winrar\QQ.exe cmd.exe File opened for modification C:\Program Files\winrar\QQ.exe cmd.exe File created C:\Program Files\Internet Explorer\iedw.ico cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0029d4cef8c491684ffcc733edf41560N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 38 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\ = "╠╘▒ª-╣║╬∩(&H)" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\╠╘▒ª-╣║╬∩(&H)\MUIVerb = "┐¬╩╝╣║╬∩" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\╠╘▒ª-╣║╬∩(&H)\Command reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder\HideFolderVerbs reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\iedw.ico" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\InProcServer32\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\InProcServer32\ = "%systemRoot%\\SysWow64\\shdocvw.dll" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\╠╘▒ª-╣║╬∩(&H)\Command\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\InProcServer32 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\╠╘▒ª-╣║╬∩(&H)\Command\ = "C:\\progra~1\\Intern~1\\iexplore.exe http://taobao.taohee.com/?1" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\InfoTip = "╠╘▒ª╣║╬∩╠╪╝█╙┼╗▌╟°" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\╠╘▒ª-╣║╬∩(&H) reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder\HideOnDesktopPerUser reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder\WantsParsDisplayName reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\╠╘▒ª-╣║╬∩(&H)\Command reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder\Attributes = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba} reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\LocalizedString = "╠╘▒ª-╣║╬∩" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\╠╘▒ª-╣║╬∩(&H)\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\╠╘▒ª-╣║╬∩(&H) reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba} reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\DefaultIcon\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\InProcServer32\ThreadingModel = "Apartment" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\InProcServer32 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\InProcServer32 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder reg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2444 2120 0029d4cef8c491684ffcc733edf41560N.exe 31 PID 2120 wrote to memory of 2444 2120 0029d4cef8c491684ffcc733edf41560N.exe 31 PID 2120 wrote to memory of 2444 2120 0029d4cef8c491684ffcc733edf41560N.exe 31 PID 2120 wrote to memory of 2444 2120 0029d4cef8c491684ffcc733edf41560N.exe 31 PID 2444 wrote to memory of 2304 2444 cmd.exe 33 PID 2444 wrote to memory of 2304 2444 cmd.exe 33 PID 2444 wrote to memory of 2304 2444 cmd.exe 33 PID 2444 wrote to memory of 2304 2444 cmd.exe 33 PID 2444 wrote to memory of 2140 2444 cmd.exe 34 PID 2444 wrote to memory of 2140 2444 cmd.exe 34 PID 2444 wrote to memory of 2140 2444 cmd.exe 34 PID 2444 wrote to memory of 2140 2444 cmd.exe 34 PID 2444 wrote to memory of 2036 2444 cmd.exe 35 PID 2444 wrote to memory of 2036 2444 cmd.exe 35 PID 2444 wrote to memory of 2036 2444 cmd.exe 35 PID 2444 wrote to memory of 2036 2444 cmd.exe 35 PID 2444 wrote to memory of 2092 2444 cmd.exe 36 PID 2444 wrote to memory of 2092 2444 cmd.exe 36 PID 2444 wrote to memory of 2092 2444 cmd.exe 36 PID 2444 wrote to memory of 2092 2444 cmd.exe 36 PID 2444 wrote to memory of 2656 2444 cmd.exe 37 PID 2444 wrote to memory of 2656 2444 cmd.exe 37 PID 2444 wrote to memory of 2656 2444 cmd.exe 37 PID 2444 wrote to memory of 2656 2444 cmd.exe 37 PID 2444 wrote to memory of 2156 2444 cmd.exe 38 PID 2444 wrote to memory of 2156 2444 cmd.exe 38 PID 2444 wrote to memory of 2156 2444 cmd.exe 38 PID 2444 wrote to memory of 2156 2444 cmd.exe 38 PID 2444 wrote to memory of 2680 2444 cmd.exe 39 PID 2444 wrote to memory of 2680 2444 cmd.exe 39 PID 2444 wrote to memory of 2680 2444 cmd.exe 39 PID 2444 wrote to memory of 2680 2444 cmd.exe 39 PID 2444 wrote to memory of 2728 2444 cmd.exe 40 PID 2444 wrote to memory of 2728 2444 cmd.exe 40 PID 2444 wrote to memory of 2728 2444 cmd.exe 40 PID 2444 wrote to memory of 2728 2444 cmd.exe 40 PID 2444 wrote to memory of 2744 2444 cmd.exe 41 PID 2444 wrote to memory of 2744 2444 cmd.exe 41 PID 2444 wrote to memory of 2744 2444 cmd.exe 41 PID 2444 wrote to memory of 2744 2444 cmd.exe 41 PID 2444 wrote to memory of 2748 2444 cmd.exe 42 PID 2444 wrote to memory of 2748 2444 cmd.exe 42 PID 2444 wrote to memory of 2748 2444 cmd.exe 42 PID 2444 wrote to memory of 2748 2444 cmd.exe 42 PID 2444 wrote to memory of 2768 2444 cmd.exe 43 PID 2444 wrote to memory of 2768 2444 cmd.exe 43 PID 2444 wrote to memory of 2768 2444 cmd.exe 43 PID 2444 wrote to memory of 2768 2444 cmd.exe 43 PID 2444 wrote to memory of 2764 2444 cmd.exe 44 PID 2444 wrote to memory of 2764 2444 cmd.exe 44 PID 2444 wrote to memory of 2764 2444 cmd.exe 44 PID 2444 wrote to memory of 2764 2444 cmd.exe 44 PID 2444 wrote to memory of 2732 2444 cmd.exe 45 PID 2444 wrote to memory of 2732 2444 cmd.exe 45 PID 2444 wrote to memory of 2732 2444 cmd.exe 45 PID 2444 wrote to memory of 2732 2444 cmd.exe 45 PID 2444 wrote to memory of 2668 2444 cmd.exe 46 PID 2444 wrote to memory of 2668 2444 cmd.exe 46 PID 2444 wrote to memory of 2668 2444 cmd.exe 46 PID 2444 wrote to memory of 2668 2444 cmd.exe 46 PID 2444 wrote to memory of 2896 2444 cmd.exe 47 PID 2444 wrote to memory of 2896 2444 cmd.exe 47 PID 2444 wrote to memory of 2896 2444 cmd.exe 47 PID 2444 wrote to memory of 2896 2444 cmd.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\0029d4cef8c491684ffcc733edf41560N.exe"C:\Users\Admin\AppData\Local\Temp\0029d4cef8c491684ffcc733edf41560N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\~F7A8.bat "C:\Users\Admin\AppData\Local\Temp\0029d4cef8c491684ffcc733edf41560N.exe"2⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2304
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}" /v "InfoTip" /t REG_SZ /d "╠╘▒ª╣║╬∩╠╪╝█╙┼╗▌╟°" /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2140
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}" /v "LocalizedString" /t REG_SZ /d "╠╘▒ª-╣║╬∩" /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2036
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\DefaultIcon"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2092
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\DefaultIcon" /ve /t REG_EXPAND_SZ /d "C:\Program Files\Internet Explorer\iedw.ico" /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2656
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\InProcServer32"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2156
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\InProcServer32" /ve /t REG_SZ /d "%systemRoot%\system32\shdocvw.dll" /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2680
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\InProcServer32" /v "ThreadingModel" /t REG_SZ /d "Apartment" /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2728
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2744
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell" /ve /t REG_SZ /d "╠╘▒ª-╣║╬∩(&H)" /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2748
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\╠╘▒ª-╣║╬∩(&H)"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2768
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\╠╘▒ª-╣║╬∩(&H)" /v "MUIVerb" /t REG_SZ /d "┐¬╩╝╣║╬∩" /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2764
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\╠╘▒ª-╣║╬∩(&H)\Command"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2732
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\╠╘▒ª-╣║╬∩(&H)\Command" /ve /t REG_SZ /d "C:\progra~1\Intern~1\iexplore.exe http://taobao.taohee.com/?1" /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2668
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2896
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder" /v "Attributes" /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2532
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder" /v "HideFolderVerbs" /t REG_SZ /d "" /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3060
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder" /v "HideOnDesktopPerUser" /t REG_SZ /d "" /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2664
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder" /v "WantsParsDisplayName" /t REG_SZ /d "" /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2492
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636B
MD57408b1be46f0598d4e1f21d1a5d6252c
SHA1aed5f86bf363521c910bbfd0614e8fb658600509
SHA256128674b55407f9925bff787a97370f1bd8b0d29add8146056f810e06703e9214
SHA512c9f8c46a13dd0e4ca2bd8946533b6dffdaa88239e9011e201c0d1dc6177fb09cbe913a38651eb1bfee69e1ae3dd0deca42e5a774fd909503a3113850b3d85615
-
Filesize
2KB
MD57009a7eef740e60e8a82ed95f73533ca
SHA1152824f5a0782d9cdd13346c77e02f1803bc31ae
SHA256c75b7f6dbb633d810de7ebfac3be615f66c712d54423e2ba097fa22b0439b1ff
SHA512e6e3d9b84db4ab651fea7376fd4957f2daf6be87c38cfc463881d035a770be590c7639480c658bcaa4fa0beaddd49b8bd0bb8d64ae151bc224bd1dcf6fad734d
-
Filesize
14KB
MD5468fada123f5548ac87e57bae81f6782
SHA1edb8f012c25906e6afd8bf335b495e16c440243d
SHA256091c882bb307d57f2c7c42309e7ba8740130fef8c3ed772b0bc5e5505e37034d
SHA512635ec26c88c2394dd4f2a81b9aea8f429a91adfeb37ae34e51b03f3cf8e503c123c3685938f40cea07d6146e0c7113aadbe62fa528f1f6d8b995e617fd68a4aa