Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
a0d6a6e4ebae0e39740e09f1628d7fda
-
SHA1
3040f4bc073903e12c36f56a12cb54c5b4cd5193
-
SHA256
8686c7a85969f0745fdd310b49f4855b4797209031eaedb3b44fb83ace875172
-
SHA512
9e2d49ab1b1d46588e71570611daf88dbf398495e5913c69e5af6bfaa88c86829b3586e226af562bd09419703b08c81a08e738d220c20568015d859f61eb90ad
-
SSDEEP
24576:xYY+TBzrafXb8zsMb5U/TKY3cGSLivIJHTY5Nfaxsm4ki7CLJulh07HH4fbOW0Kv:xGJzsMq7DcGSLxUf0N5LJuKYqef
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2740 KSWebShield.exe 2876 KSWebShield.exe 2716 KSWebShield.exe 2536 KSWebShield.exe -
Loads dropped DLL 16 IoCs
pid Process 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2716 KSWebShield.exe 2716 KSWebShield.exe 2536 KSWebShield.exe 2536 KSWebShield.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 848 IEXPLORE.EXE 848 IEXPLORE.EXE 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat KSWebShield.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\progra~1\kingsoft\kwssp.dll a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe File opened for modification C:\PROGRA~1\kingsoft\KWSSVC.log KSWebShield.exe File opened for modification C:\progra~1\TheWorld 3\TheWorld.ini a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe File created C:\progra~1\kingsoft\KSWebShield.exe a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe File created C:\progra~1\ico\Film.ico a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe File created C:\progra~1\ico\Beauty.ico a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe File created C:\progra~1\ico\Taobao.ico a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe File opened for modification C:\progra~1\Maxthon\Config\config.ini a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe File opened for modification C:\progra~1\Maxthon2\SharedAccount\Config\Config.ini a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe File opened for modification C:\PROGRA~1\kingsoft\KWSSVC.log KSWebShield.exe File opened for modification C:\PROGRA~1\kingsoft\KWSSVC.log KSWebShield.exe File opened for modification C:\PROGRA~1\kingsoft\KWSSVC.log KSWebShield.exe File created C:\progra~1\ico\Video.ico a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe File created C:\progra~1\kingsoft\kwsui.dll a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe File created C:\progra~1\ico\Manhua.ico a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe File created C:\progra~1\kingsoft\KSWebShield.dll a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KSWebShield.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KSWebShield.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KSWebShield.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KSWebShield.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1092 PING.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF1A41A1-5C3E-11EF-9628-7EC7239491A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701d3c784bf0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000003bfcb0bd2b820b707608f8147c879720a0e76216b61cd01d9177041d6e6629b6000000000e800000000200002000000020c93dba27632fd1f605f9847ff9f3a9cbd78dbb7de5ed930c4fa15d99a4facc90000000759a916ef5f471553c6a73de45c6941b178e47127e447cad86cf2c3e4b289ddc9bbc5510796235960fd4e0aa4622077288154afc4ff3da0eff894867d7f4ab6ef1e96d9c3af0d1a6e722bbd7fe5022d4696016272468c69a05bbbb5a18d27b54ff7f8f2f86325244325ffb6c70a185cf68f7a7375ed225295310cc60d670b7238d19e7f8a562725b4da3c30c630b11864000000096ca19c6a1586d87e3dec1ef25857003a5cacead5facdeca60a98beaf49acc094bc7d4618bfaa42b2d3b13b8714964890bdf1e4a9618823e6e850e327c3528a2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430022899" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\New Windows\Allow\*.v258.net = "0" a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000204698bc0d55f169362b8cbf4b33e4f61c1d4e4db1a2af7cbd250d4e74ff2a46000000000e80000000020000200000006879abd3accf9e9912b85db757534e89e2732af08e9234cde91ae4f40f00d8e320000000991b19c5ef45f051727adabc31455a27954d42f85c7cb10d95580bcc30afd7ed40000000abcbd50766b127c305c714b454eabe89c90667401c8b3ac74776302115210fdf74441c3a035033ea779c5dc919c4e23cde27accb2eb5098b7eeca6dba6918dfa iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\New Windows\Allow a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{539F23BA-7A55-4351-86C9-DC0F555AB0C3}\WpadDecisionTime = e004977f4bf0da01 KSWebShield.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" KSWebShield.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0131000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 KSWebShield.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-5a-d9-7d-e8-6f KSWebShield.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{539F23BA-7A55-4351-86C9-DC0F555AB0C3}\2a-5a-d9-7d-e8-6f KSWebShield.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{539F23BA-7A55-4351-86C9-DC0F555AB0C3} KSWebShield.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-5a-d9-7d-e8-6f\WpadDecisionReason = "1" KSWebShield.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections KSWebShield.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" KSWebShield.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 KSWebShield.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{539F23BA-7A55-4351-86C9-DC0F555AB0C3}\WpadDecisionTime = 402e1a734bf0da01 KSWebShield.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-5a-d9-7d-e8-6f\WpadDecision = "0" KSWebShield.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 KSWebShield.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix KSWebShield.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ KSWebShield.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" KSWebShield.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings KSWebShield.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-5a-d9-7d-e8-6f\WpadDecisionTime = 402e1a734bf0da01 KSWebShield.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-5a-d9-7d-e8-6f\WpadDecisionTime = e004977f4bf0da01 KSWebShield.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" KSWebShield.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{539F23BA-7A55-4351-86C9-DC0F555AB0C3}\WpadDecisionReason = "1" KSWebShield.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{539F23BA-7A55-4351-86C9-DC0F555AB0C3}\WpadNetworkName = "Network 3" KSWebShield.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0131000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 KSWebShield.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings KSWebShield.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad KSWebShield.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" KSWebShield.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-5a-d9-7d-e8-6f\WpadDetectedUrl KSWebShield.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{539F23BA-7A55-4351-86C9-DC0F555AB0C3}\WpadDecision = "0" KSWebShield.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1092 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2740 KSWebShield.exe Token: SeDebugPrivilege 2876 KSWebShield.exe Token: SeDebugPrivilege 2716 KSWebShield.exe Token: 33 2716 KSWebShield.exe Token: SeIncBasePriorityPrivilege 2716 KSWebShield.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2396 iexplore.exe 2396 iexplore.exe 2396 iexplore.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 2536 KSWebShield.exe 2536 KSWebShield.exe 2396 iexplore.exe 2396 iexplore.exe 848 IEXPLORE.EXE 848 IEXPLORE.EXE 2396 iexplore.exe 2396 iexplore.exe 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 2396 iexplore.exe 2396 iexplore.exe 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2740 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2740 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2740 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2740 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2876 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2876 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2876 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2876 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2536 2716 KSWebShield.exe 33 PID 2716 wrote to memory of 2536 2716 KSWebShield.exe 33 PID 2716 wrote to memory of 2536 2716 KSWebShield.exe 33 PID 2716 wrote to memory of 2536 2716 KSWebShield.exe 33 PID 2488 wrote to memory of 2012 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 34 PID 2488 wrote to memory of 2012 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 34 PID 2488 wrote to memory of 2012 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 34 PID 2488 wrote to memory of 2012 2488 a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe 34 PID 2012 wrote to memory of 1092 2012 cmd.exe 36 PID 2012 wrote to memory of 1092 2012 cmd.exe 36 PID 2012 wrote to memory of 1092 2012 cmd.exe 36 PID 2012 wrote to memory of 1092 2012 cmd.exe 36 PID 2012 wrote to memory of 688 2012 cmd.exe 39 PID 2012 wrote to memory of 688 2012 cmd.exe 39 PID 2012 wrote to memory of 688 2012 cmd.exe 39 PID 2012 wrote to memory of 688 2012 cmd.exe 39 PID 2012 wrote to memory of 264 2012 cmd.exe 40 PID 2012 wrote to memory of 264 2012 cmd.exe 40 PID 2012 wrote to memory of 264 2012 cmd.exe 40 PID 2012 wrote to memory of 264 2012 cmd.exe 40 PID 2012 wrote to memory of 1756 2012 cmd.exe 41 PID 2012 wrote to memory of 1756 2012 cmd.exe 41 PID 2012 wrote to memory of 1756 2012 cmd.exe 41 PID 2012 wrote to memory of 1756 2012 cmd.exe 41 PID 2012 wrote to memory of 2240 2012 cmd.exe 42 PID 2012 wrote to memory of 2240 2012 cmd.exe 42 PID 2012 wrote to memory of 2240 2012 cmd.exe 42 PID 2012 wrote to memory of 2240 2012 cmd.exe 42 PID 2012 wrote to memory of 2216 2012 cmd.exe 43 PID 2012 wrote to memory of 2216 2012 cmd.exe 43 PID 2012 wrote to memory of 2216 2012 cmd.exe 43 PID 2012 wrote to memory of 2216 2012 cmd.exe 43 PID 2012 wrote to memory of 1648 2012 cmd.exe 44 PID 2012 wrote to memory of 1648 2012 cmd.exe 44 PID 2012 wrote to memory of 1648 2012 cmd.exe 44 PID 2012 wrote to memory of 1648 2012 cmd.exe 44 PID 2012 wrote to memory of 2204 2012 cmd.exe 45 PID 2012 wrote to memory of 2204 2012 cmd.exe 45 PID 2012 wrote to memory of 2204 2012 cmd.exe 45 PID 2012 wrote to memory of 2204 2012 cmd.exe 45 PID 2012 wrote to memory of 2084 2012 cmd.exe 46 PID 2012 wrote to memory of 2084 2012 cmd.exe 46 PID 2012 wrote to memory of 2084 2012 cmd.exe 46 PID 2012 wrote to memory of 2084 2012 cmd.exe 46 PID 2012 wrote to memory of 2316 2012 cmd.exe 47 PID 2012 wrote to memory of 2316 2012 cmd.exe 47 PID 2012 wrote to memory of 2316 2012 cmd.exe 47 PID 2012 wrote to memory of 2316 2012 cmd.exe 47 PID 2012 wrote to memory of 3048 2012 cmd.exe 48 PID 2012 wrote to memory of 3048 2012 cmd.exe 48 PID 2012 wrote to memory of 3048 2012 cmd.exe 48 PID 2012 wrote to memory of 3048 2012 cmd.exe 48 PID 2012 wrote to memory of 2132 2012 cmd.exe 49 PID 2012 wrote to memory of 2132 2012 cmd.exe 49 PID 2012 wrote to memory of 2132 2012 cmd.exe 49 PID 2012 wrote to memory of 2132 2012 cmd.exe 49 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 2320 attrib.exe 2192 attrib.exe 2344 attrib.exe 1596 attrib.exe 2912 attrib.exe 2444 attrib.exe 2176 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0d6a6e4ebae0e39740e09f1628d7fda_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\progra~1\kingsoft\KSWebShield.exeC:\progra~1\kingsoft\KSWebShield.exe -install2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\progra~1\kingsoft\KSWebShield.exeC:\progra~1\kingsoft\KSWebShield.exe -start2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\lnk.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:688
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Documents and Settings\All Users\Application Data\Kingsoft\kws\kws.ini" /p everyone:f3⤵
- System Location Discovery: System Language Discovery
PID:264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\Desktop\╘┌╧▀┬■╗¡.url" /p everyone:f3⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\Desktop\├└┼«╩╙╞╡.url" /p everyone:f3⤵
- System Location Discovery: System Language Discovery
PID:1648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\Desktop\╘┌╧▀╡τ╙░.url" /p everyone:f3⤵
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\Desktop\╨╘╕╨├└┼«.url" /p everyone:f3⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:2132
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\Desktop\╠╘▒ª╣║╬∩.url" /p everyone:f3⤵
- System Location Discovery: System Language Discovery
PID:540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\Desktop\╥┴╚╦┼«╨╘═°.url" /p everyone:f3⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Documents and Settings\All Users\Application Data\Kingsoft\kws\kws.ini" +R +S3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2320
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\Desktop\╘┌╧▀┬■╗¡.url" +R +S3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2192
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\Desktop\├└┼«╩╙╞╡.url" +R +S3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2344
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\Desktop\╘┌╧▀╡τ╙░.url" +R +S3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1596
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\Desktop\╨╘╕╨├└┼«.url" +R +S3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2912
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\Desktop\╠╘▒ª╣║╬∩.url" +R +S3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2444
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\Desktop\╥┴╚╦┼«╨╘═°.url" +R +S3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:948
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Documents and Settings\All Users\Application Data\Kingsoft\kws\kws.ini" /p everyone:R3⤵
- System Location Discovery: System Language Discovery
PID:1456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:1924
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\Desktop\╘┌╧▀┬■╗¡.url" /p everyone:R3⤵
- System Location Discovery: System Language Discovery
PID:928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\Desktop\├└┼«╩╙╞╡.url" /p everyone:R3⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:912
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\Desktop\╘┌╧▀╡τ╙░.url" /p everyone:R3⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:1776
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\Desktop\╨╘╕╨├└┼«.url" /p everyone:R3⤵
- System Location Discovery: System Language Discovery
PID:1384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\Desktop\╠╘▒ª╣║╬∩.url" /p everyone:R3⤵
- System Location Discovery: System Language Discovery
PID:1156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
- System Location Discovery: System Language Discovery
PID:1536
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\Desktop\╥┴╚╦┼«╨╘═°.url" /p everyone:R3⤵
- System Location Discovery: System Language Discovery
PID:1948
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.6626.net/?ukt-yt2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:23⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:848
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:668679 /prefetch:23⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1572
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:537621 /prefetch:23⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1568
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.31166.net/?uk-yt2⤵PID:2260
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.779dh.com/?kj-yt2⤵PID:1244
-
-
C:\progra~1\kingsoft\KSWebShield.exeC:\progra~1\kingsoft\KSWebShield.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\progra~1\kingsoft\KSWebShield.exeC:\progra~1\kingsoft\KSWebShield.exe -run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD51e9932706e4220119b078c346d4f4dfa
SHA12aaa44bee466ef8fe6503e64c2057d14ab3873c8
SHA25668e87c48112488efe59bf97848aa216aad98b98ca47edab207caa3de976b1e9c
SHA51292c32aa93152c82bd74b874251e9990116b5f6f69ce92ea66317db1eecb6350b62053d0834234b36f590c828e6e7411835e745c02dd01062f31f16d3f78d65b5
-
Filesize
296B
MD56267f94451c2f255cf97e5fcdff3bfd9
SHA104f118e415d29d49c5025807bcb4bbd05a3c2d48
SHA2565cef48aaa826d22ac8f76ef10b72faa61216202d21a55a962f859aec42eadbda
SHA5129c7645d7601fce25f5c486ddeab1b48ec1c46bd22ba7fe47e68ce37ab4a444c1f2ba4b565944b8fefbbeb552fd624b4f3f6a965348a83d104b50a153d646f575
-
Filesize
546B
MD5b56710335a80eb328172c608f0fa79a8
SHA1df0528f1e620722f2f9d2027c86bd752cc95af5b
SHA256bf5237c8d93cd4df7f6f40921d5be0d6e52ae4faa749f6533d0c2c3be7b5dd52
SHA512352f6c7c8a9f30460bf2ff56517a0215ed32901d572518f5c568e23439fff66fb71371164cfea2d1b44404498855377fa450765238f190933299a9417217ff55
-
Filesize
57B
MD55a4748b80129aae3995874a70cec08d1
SHA16ad41b07a54d4ded59d778faa273c6c4ad628bda
SHA256b260556167ed0cc2512b38d01a1c003e6ff57bedfd0497d5e2195326d823dd85
SHA512d9ec9c49c9f369795369edcac184e5ffa9b93a512a4156a109905dede95893c8dcdab344dc6aec959f3cd327cf603684dbdbf01bee6f2e960a53f56a1205d570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6aa7fe40e416da95b41ea63222bb69
SHA18a663208b18d7a0864935fc0b885c2bd8e4ae8bc
SHA256ed669caae92dcb46e307e1e7c65c388f256aeed4e091bd6cafe5d5b8c3fb5f91
SHA512dc57daa92f552057821924ed22ddbcb70aa00331fb7b848c2a6c53e4ed2744c142582740d753c31b7ca9a45842e317530dde50d424123e76e887cd2765bec6ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124452a8b7dd23832bb142aaef09c760
SHA10826bdd95d39f4576a41052e82adb34004899f6d
SHA256265c6acf1023b18afe23411c9a28c5e10560ca78c6398effeccfd986328b20a7
SHA51244033b6dea74121a482ccc266dda9cf76344f4093adffa932a52a6529c4d57d663b7b434a74c2a63d973379d4cf6af47b5f81544dacfe7559a8f7fc795b70434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc05a6a67152d57a801fb7cf42bb6763
SHA19490593672eb999035838db75c4900dda2f32364
SHA256c282119be1472f4991b0ff79e8e8bf949d45c56529e4a5ded8c11d73a24752ee
SHA512554f094c771121c6fac30c92d02c5f27f31a5e40979a8f4f1357df607b2553ec77ab0ab79d702416129ac48ec46819ae6d8dfea22968c30749fd014cc7f7fa0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9cac21374af3f39b55ad3459a01d52a
SHA19b129f6d42dcac2dc5cfcbe64d0280bad713c6f4
SHA256b91d61072c5abcef7ff13867d05a44da9b50bab0a814e448474fee50a92d1315
SHA512fa2424838be4a4ac32c631f05c97d1a26a86353b017add35f28a518fd5d0d18d2948dceb69ef3e3607421c6a44614e22cb1b5d145096bad17ba95d10b5e30eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e50ca60d7786fc9aaca091f22294507
SHA136853f9d5951d0634ff1c230fcd98fc972e73845
SHA2564ac87718e7e21eeb26e184158714ccc987bc791fdcf64ae9021cccf8c658cf49
SHA512259fdd148148fbe2124b7930ad92ba83bb57a9035570fa3c96724a799e15919c449bf2045552b2ad0ec4684a120ee9f9dd0251326e2a27bb6f1948bfb6847fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5776dad246177b151de51499f6a74321b
SHA1c00365e39e0e2714e5d0a116f35e99953c44cf01
SHA2564fc9ef5b29734dcdbdb690bd268d6aed72049202e0ca78b41971ba407d115215
SHA512f7a0889d87885eae43d5ebce79f060aa013f546b32bbedf469ac380fb5e86df025a186cb0697ad70c2d6cf1a3c915a3780f8284f91f7d2d168cef7d12ab35ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df5943208286f3ee561e1ee072175540
SHA11883040f1c23db346279be0137ad4bf79c2cd6dc
SHA2561ed2724a88d9c9564c034a6599c0b79b53123527c8c8c0923e454d65c014ef06
SHA51212fd591cf519a8a15a71675e31412bb3a0f646370c00693950fd2efa0d2ed6a54c5fcf5c8ea9ee1465311cb36784be5a9dd5b5fabec990f16c3d2ff7ad8a3392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a736cdc21eb6730f8dc835993f993816
SHA1f6136da69d4795477cff76eddc27049c7cda6812
SHA2567364c9b121911290414e84f1a80d324d5ec494c7de9246e69422a0bfca44afe3
SHA512ca373f6add72327ccbad7f855bafde6a6baa088d3b58498f21be4895ec918d8c0d116e943c9b9afe8256d36abc7addd8ab822e4b3ca32319befebe7aac33f847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5751139dd8546c0d0f9271e10a9637819
SHA1d6dc72d8b9d33060df9b20bfa6bad7b4c0f20b70
SHA256d3e4a3875b4f2c3b6b4b1586f2dd32c6118aff1fc93f7ca7e5d6f78aaf1c0c3c
SHA5121e7702e07bdfc5ab027e8ca54e14e48977c46eef80c3c5e0899a9e0117077bcf9a003a695dcdf912c2ac63012f0a9aa1d82762f97b39a7c74a5e684f6f5f805d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5915d624a79e73b48b1410516ab6755d0
SHA1752b1233de1f5020306f3196b63445b795517b73
SHA256f451d056d9fe80f054a65f410c39d97235aefa0b4ef1fe8fa6a815b5bf47267c
SHA512bab263dc72dfad33e078404752df14c7c87693897377798102abe8abdd7c70572880874ed3a5e8aea8b7f07c0d45f37f96a1629fb94e0f37a0933d0d0735ed06
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD590c75b8659294e166a60782eefc4f3bc
SHA197028e1233c09be6cefb6b3843dc477e56a98d56
SHA2560c3e179547b62b770ab31f7cab5c3cbd3ac2019a3f467c6808763a125b500655
SHA5127d33578c574f2f8b74a5379c616bd8e7cbcf4b1c65227c1a6e98287b6acf4edf259ffb4a68c0f39fe64b00ad3ce03be013acce5a11fbccea9a697fad13815b3a
-
Filesize
133B
MD508da998377776a44d7bb742f6a18f952
SHA1635dadea1f8f772fa2752868ef039e62fedbbd48
SHA256b593eaf8db263415e3b021e87ff07220ecc6e9940ccb2360aaaed24b130c143f
SHA5129b312ff0f3ed4d7bd318192b3336a3fbcd53bb4fd1e1cd2528bace9ce2ca7574c27cfcd7fe33253a63b844116a1bb417ed19c69fbaba8e05c9e44adcae25a403
-
Filesize
141B
MD51b19102072a4801951e4852a62332364
SHA1c4c34a89f3b474c9d22c0ca89f6d6fb6b5bb53ca
SHA256f5a8018fec89146166b52ae67ad0359c6561c5b38e9e0ed6925692156c63926a
SHA5126f7216dd7ed15a5014e2e80c82a7278f698488fbdaa10dd7a8ffa6821c8004beebd95ef362f4883bd28b12586d5503a728b8753d4b111e83721f3d5e68287f92
-
Filesize
437KB
MD50b629e4318e64a6ab7e2c43ad6cc3e83
SHA127e835072fb85614f49e7cd586f64bd10bfcd497
SHA25641ef17fdff69930c658773f394f2f33f2f9ddab4b638e2b962da76a63a975be5
SHA512298d43fb819a9257bdef1392bf68209423c82ea47f22f32657943dec0a6407be6ce8631e633b38e9d31df1ff9391b01010f6ff293835a1e6953dee09d30de24f
-
Filesize
633KB
MD58c8dc085ab24bd23b77f146c78c8ff14
SHA13c01f9a5338fec055dd2fea36e468d160420a0b8
SHA256ee50170b1c1829b98b647ea81d286f8a3630de1737be914ea02c409f1da1c217
SHA5124754af26541d1737c8bae42a89c16570618b5bb5a44a4812f5e9819c852a2c6e235a9111bae98008037e94c614f4aabcf5166d041dce6e16be30683e80a1990c
-
Filesize
197KB
MD52bcfdc7e51a9c556e5fb04e4d02fed39
SHA133e6eca60078affa733c2300605c91adddf992b0
SHA256ee47b58a5464ceb75d73a82935a217970270958030eabc4e03100c61e7222fb1
SHA51286b7a88d0aa5bacac2fd2a1eb60b5ac80a0fe012a1fb9105b7d7071e594a73e8fa049bebcbde144acc2e8116f682f47286d56c1302dd7153902fa5c2d617881c
-
Filesize
457KB
MD5272764640b4b296e13c7c136cfbaaca2
SHA18c4f405469d370db5270c64f119d5b5ba0eece4e
SHA25650723b6ad935609de87df9f838756bdbb6cbdf801d3c0ce8e08cebb35ef04b3b
SHA51297c4520913f968cf591d996c7aa82004455507d81f50968f8e7cbb5122b57be715c34b8de4f9d391195f4c1864747781b69632a8850119df4977524d002a604a