Analysis
-
max time kernel
94s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 08:04
Behavioral task
behavioral1
Sample
8d09b39e3434f740cbf742bc6c36dd00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d09b39e3434f740cbf742bc6c36dd00N.exe
Resource
win10v2004-20240802-en
General
-
Target
8d09b39e3434f740cbf742bc6c36dd00N.exe
-
Size
232KB
-
MD5
8d09b39e3434f740cbf742bc6c36dd00
-
SHA1
6c98931c739813fab1902dd4d4236cfe8498fc71
-
SHA256
409f0443ee369d79d861b78cd491936f3934d12518465ec8007131aae5b922d1
-
SHA512
6e542f0c9dfc7c23c5fe14d573adea43ac32d7cf40386e67a8d9076dfc5a3c2981e66d6c5ebbad41fe2bd3c52f35635903936977a5cf7868d3048006acbf27e0
-
SSDEEP
3072:r1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1VOz1i/NU82OMYcYU:Ji/NjO5xbg/CSUFLTwMjs6oi/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 8d09b39e3434f740cbf742bc6c36dd00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 8d09b39e3434f740cbf742bc6c36dd00N.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 8d09b39e3434f740cbf742bc6c36dd00N.exe -
resource yara_rule behavioral2/memory/2108-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00080000000234a5-15.dat upx behavioral2/files/0x00070000000234a6-16.dat upx behavioral2/memory/2108-17-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 8d09b39e3434f740cbf742bc6c36dd00N.exe File created C:\WINDOWS\SysWOW64\qx.bat 8d09b39e3434f740cbf742bc6c36dd00N.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 792 cmd.exe 1404 cmd.exe 2640 cmd.exe 3656 cmd.exe 3332 cmd.exe 1900 cmd.exe 1828 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe 8d09b39e3434f740cbf742bc6c36dd00N.exe File opened for modification C:\WINDOWS\windows.exe 8d09b39e3434f740cbf742bc6c36dd00N.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d09b39e3434f740cbf742bc6c36dd00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31123616" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2033728700" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003d1c6f3067c0c84abb3839afa92ebb0f00000000020000000000106600000001000020000000473227b1fd0d016e5310ff42b86737330fa7d753948dd5d3cf2970a1da326b74000000000e8000000002000020000000021c89694ac2d0945739615acd804a8ce01f2f2f92b4c5acfedf37c5f18407f12000000044292f88af7a01251889bd6863d9237fff72dd1f4a530fd489277cba207159f440000000c596d0237d146188ae58eb0a302826394b74f0c82dab163ea0e636b63dc59535c760b023b0591d4afcffcf082750c022c6be6aeb18005e2ea857dde18f126d64 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31123616" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1045da79a0e8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429782832" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main 8d09b39e3434f740cbf742bc6c36dd00N.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2033728700" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2037790933" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31123616" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A4E1C286-5493-11EF-939B-CA89CBF88D4A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003d1c6f3067c0c84abb3839afa92ebb0f00000000020000000000106600000001000020000000b1f5fe4cde99da715272e290464dc8c3639e0a500b7bfd016c3030de9d68df83000000000e8000000002000020000000d4a82d4dbd253fabbb2aa3c5f3ed4894f908eb0ddcfc0790315c8d015b592cbd200000000483b3c5a589b1a2c388591940106b22af389b16acd5ffea004345f57f178c1040000000a3c23c3314084b66fbf1ecbf5dcc4c9262f9aaf44bdd9450faabacd7bdd5a15187a2ee1453e178b54cda894e703fce999372e507d1e2d8e9576745b7e5cfdd3e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208ad579a0e8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 8d09b39e3434f740cbf742bc6c36dd00N.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1552 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 1552 iexplore.exe 1552 iexplore.exe 3640 IEXPLORE.EXE 3640 IEXPLORE.EXE 3640 IEXPLORE.EXE 3640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1552 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 85 PID 2108 wrote to memory of 1552 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 85 PID 1552 wrote to memory of 3640 1552 iexplore.exe 86 PID 1552 wrote to memory of 3640 1552 iexplore.exe 86 PID 1552 wrote to memory of 3640 1552 iexplore.exe 86 PID 2108 wrote to memory of 792 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 88 PID 2108 wrote to memory of 792 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 88 PID 2108 wrote to memory of 792 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 88 PID 792 wrote to memory of 5080 792 cmd.exe 90 PID 792 wrote to memory of 5080 792 cmd.exe 90 PID 792 wrote to memory of 5080 792 cmd.exe 90 PID 2108 wrote to memory of 1404 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 91 PID 2108 wrote to memory of 1404 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 91 PID 2108 wrote to memory of 1404 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 91 PID 1404 wrote to memory of 3296 1404 cmd.exe 93 PID 1404 wrote to memory of 3296 1404 cmd.exe 93 PID 1404 wrote to memory of 3296 1404 cmd.exe 93 PID 2108 wrote to memory of 2640 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 94 PID 2108 wrote to memory of 2640 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 94 PID 2108 wrote to memory of 2640 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 94 PID 2640 wrote to memory of 2776 2640 cmd.exe 96 PID 2640 wrote to memory of 2776 2640 cmd.exe 96 PID 2640 wrote to memory of 2776 2640 cmd.exe 96 PID 2108 wrote to memory of 3656 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 97 PID 2108 wrote to memory of 3656 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 97 PID 2108 wrote to memory of 3656 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 97 PID 3656 wrote to memory of 3692 3656 cmd.exe 99 PID 3656 wrote to memory of 3692 3656 cmd.exe 99 PID 3656 wrote to memory of 3692 3656 cmd.exe 99 PID 2108 wrote to memory of 3332 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 100 PID 2108 wrote to memory of 3332 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 100 PID 2108 wrote to memory of 3332 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 100 PID 3332 wrote to memory of 3912 3332 cmd.exe 102 PID 3332 wrote to memory of 3912 3332 cmd.exe 102 PID 3332 wrote to memory of 3912 3332 cmd.exe 102 PID 2108 wrote to memory of 1900 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 103 PID 2108 wrote to memory of 1900 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 103 PID 2108 wrote to memory of 1900 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 103 PID 1900 wrote to memory of 5024 1900 cmd.exe 105 PID 1900 wrote to memory of 5024 1900 cmd.exe 105 PID 1900 wrote to memory of 5024 1900 cmd.exe 105 PID 2108 wrote to memory of 1828 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 106 PID 2108 wrote to memory of 1828 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 106 PID 2108 wrote to memory of 1828 2108 8d09b39e3434f740cbf742bc6c36dd00N.exe 106 PID 1828 wrote to memory of 1916 1828 cmd.exe 108 PID 1828 wrote to memory of 1916 1828 cmd.exe 108 PID 1828 wrote to memory of 1916 1828 cmd.exe 108 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 5080 attrib.exe 3296 attrib.exe 2776 attrib.exe 3692 attrib.exe 3912 attrib.exe 5024 attrib.exe 1916 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d09b39e3434f740cbf742bc6c36dd00N.exe"C:\Users\Admin\AppData\Local\Temp\8d09b39e3434f740cbf742bc6c36dd00N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1552 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5080
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3296
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3692
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5024
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
232KB
MD5cd20665e7f708ee3e01464a4781b2f51
SHA1339ee92134c57b4abedc5393a02935bcec223bc6
SHA25657cb15108bc59174b4366e76880ae0336e13848451c9a5488dacc1c95013256b
SHA512dd8e408acf35dbb748683db090262f9d8afce5b73b3915408bb533ec1c285ba7b43856536da5261c002215c7fe17fc83781316ff61fc128bfa1cd3d2d8986055
-
Filesize
232KB
MD5cb4b44656b263f017039a6c29c57f389
SHA13443633830db4b1acfe188ffd2fbe7cc5b9801d6
SHA256cb46894b97a99c18667ac605fb83f3dc659f15b6f352ac2067cd979a3515714b
SHA5126be3ca92cb3dfcb4a0a04f4954dc29e46c18dab28df8ca934a7ac79b69047fbfc1e7be6c3fa709c51d8d007a4bd1d7327d0afa6f248b1bfb92d11a54d9dde6ee