Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 20:51
Behavioral task
behavioral1
Sample
31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe
Resource
win10v2004-20240802-en
General
-
Target
31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe
-
Size
232KB
-
MD5
3b9a24122715895bca73202126c31e85
-
SHA1
6a15d34fa9dc40e05b3fc16ad5a344414e2ccdb1
-
SHA256
31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32
-
SHA512
d97d787f53c712e8bd9f30b2808588ff8a727b82b970cb82b88567a1c7fb9aeac7a0b6cf8cff2801062a312643f6dda94c477908f273e24be317b1fcb3a7b46e
-
SSDEEP
3072:G1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1VOz1i/NU82OMYcYU:gi/NjO5xbg/CSUFLTwMjs6oi/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe -
resource yara_rule behavioral1/memory/2404-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x0008000000015fcc-10.dat upx behavioral1/files/0x0008000000015fd2-11.dat upx behavioral1/memory/2404-16-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe File created C:\WINDOWS\SysWOW64\qx.bat 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 2436 cmd.exe 2620 cmd.exe 2728 cmd.exe 2596 cmd.exe 2700 cmd.exe 2832 cmd.exe 2716 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\windows.exe attrib.exe File created C:\WINDOWS\windows.exe 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe File opened for modification C:\WINDOWS\windows.exe 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0536EE51-68A4-11EF-8CC6-7ED57E6FAC85} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431385782" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000001964d3b526ec3789411ec2f7483b7e6b2f77ac582ce07fd91357cd6e00e16d35000000000e8000000002000020000000f44dbf4520ef8c10f761db1711482844a5ca6529dcae4dda59478eb5b403484c90000000e0e237cbb534c3d9de1f338d46e9156750fdb82422c7d536e954e788813ef46bc97120f569b4fe1353fc8851090907fa73b7bdcdbd128f037b7be4059b0dee045e5221585a012cb81faeaf8b7db7fc7159aed5cbb33d92d4f536154442c5d445b54efb9de9f0c84dc5a7c24d877269cdb9452038b6050b107e509ee9d59a1a391c0d65104af4a78e784c3a41c86c498540000000180d8c6de698489a7cf02648c7222d6484c40fb6c1670807c1a22c5ee62faeda3e92850e2cee59cd87c82738caab809b3dc595b5c387bf3f210d3088caef9738 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000001ce01215ee8fd0df7c706b2f2153d7d894303f04f667d1d0e2b99226225498c7000000000e80000000020000200000003f08a57dae6d58ccdd29860583aa064b6e60b74187781659a5b5a8d148adf217200000001cf16b9a19d48367dcbcab3ee9668224ca1b3b83de07e10bea91556e4545bcbb400000002e8bd6575fba5301011768dc3460e54f4d4a5c8658dab0c63dd1094a19243ce4ad93d46de8b7f80d0522f9553c6a3d852914111a8f40184bf41e99ffc0b0d03c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07108deb0fcda01 iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 1916 iexplore.exe 1916 iexplore.exe 916 IEXPLORE.EXE 916 IEXPLORE.EXE 916 IEXPLORE.EXE 916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1916 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 30 PID 2404 wrote to memory of 1916 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 30 PID 2404 wrote to memory of 1916 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 30 PID 2404 wrote to memory of 1916 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 30 PID 1916 wrote to memory of 916 1916 iexplore.exe 31 PID 1916 wrote to memory of 916 1916 iexplore.exe 31 PID 1916 wrote to memory of 916 1916 iexplore.exe 31 PID 1916 wrote to memory of 916 1916 iexplore.exe 31 PID 2404 wrote to memory of 2700 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 32 PID 2404 wrote to memory of 2700 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 32 PID 2404 wrote to memory of 2700 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 32 PID 2404 wrote to memory of 2700 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 32 PID 2700 wrote to memory of 2752 2700 cmd.exe 34 PID 2700 wrote to memory of 2752 2700 cmd.exe 34 PID 2700 wrote to memory of 2752 2700 cmd.exe 34 PID 2700 wrote to memory of 2752 2700 cmd.exe 34 PID 2404 wrote to memory of 2832 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 35 PID 2404 wrote to memory of 2832 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 35 PID 2404 wrote to memory of 2832 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 35 PID 2404 wrote to memory of 2832 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 35 PID 2832 wrote to memory of 2804 2832 cmd.exe 37 PID 2832 wrote to memory of 2804 2832 cmd.exe 37 PID 2832 wrote to memory of 2804 2832 cmd.exe 37 PID 2832 wrote to memory of 2804 2832 cmd.exe 37 PID 2404 wrote to memory of 2716 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 38 PID 2404 wrote to memory of 2716 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 38 PID 2404 wrote to memory of 2716 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 38 PID 2404 wrote to memory of 2716 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 38 PID 2716 wrote to memory of 2724 2716 cmd.exe 40 PID 2716 wrote to memory of 2724 2716 cmd.exe 40 PID 2716 wrote to memory of 2724 2716 cmd.exe 40 PID 2716 wrote to memory of 2724 2716 cmd.exe 40 PID 2404 wrote to memory of 2436 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 41 PID 2404 wrote to memory of 2436 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 41 PID 2404 wrote to memory of 2436 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 41 PID 2404 wrote to memory of 2436 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 41 PID 2436 wrote to memory of 2876 2436 cmd.exe 43 PID 2436 wrote to memory of 2876 2436 cmd.exe 43 PID 2436 wrote to memory of 2876 2436 cmd.exe 43 PID 2436 wrote to memory of 2876 2436 cmd.exe 43 PID 2404 wrote to memory of 2620 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 44 PID 2404 wrote to memory of 2620 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 44 PID 2404 wrote to memory of 2620 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 44 PID 2404 wrote to memory of 2620 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 44 PID 2620 wrote to memory of 2812 2620 cmd.exe 46 PID 2620 wrote to memory of 2812 2620 cmd.exe 46 PID 2620 wrote to memory of 2812 2620 cmd.exe 46 PID 2620 wrote to memory of 2812 2620 cmd.exe 46 PID 2404 wrote to memory of 2728 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 47 PID 2404 wrote to memory of 2728 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 47 PID 2404 wrote to memory of 2728 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 47 PID 2404 wrote to memory of 2728 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 47 PID 2728 wrote to memory of 2704 2728 cmd.exe 49 PID 2728 wrote to memory of 2704 2728 cmd.exe 49 PID 2728 wrote to memory of 2704 2728 cmd.exe 49 PID 2728 wrote to memory of 2704 2728 cmd.exe 49 PID 2404 wrote to memory of 2596 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 50 PID 2404 wrote to memory of 2596 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 50 PID 2404 wrote to memory of 2596 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 50 PID 2404 wrote to memory of 2596 2404 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 50 PID 2596 wrote to memory of 2636 2596 cmd.exe 52 PID 2596 wrote to memory of 2636 2596 cmd.exe 52 PID 2596 wrote to memory of 2636 2596 cmd.exe 52 PID 2596 wrote to memory of 2636 2596 cmd.exe 52 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 2704 attrib.exe 2636 attrib.exe 2752 attrib.exe 2804 attrib.exe 2724 attrib.exe 2876 attrib.exe 2812 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe"C:\Users\Admin\AppData\Local\Temp\31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:916
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2704
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50623451682947b859c33e849f40512eb
SHA166d5fe5d30d526a2e3b0e10de2c6d635d4cf8121
SHA25635c042ba1fa0f0648757fa9bfd7082b3243565fe49e792335ed9fbcf63e45342
SHA51298964f7368a14d39e5c674b95e164c08ec7f7bb31e53abf8456f8e02a3d70d7b8a9d3c3cb385f8d8b3d4ccf928184588e2bb1bf1c7abf603a0c6748d92b8a26e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a6a301a4c31bae346c4a0fcd52db49
SHA1a769c6ac7e5c0281d97ec6eddbd76668d19db104
SHA256e32db234fb88d7479a6059c8471795c20cda3bcb018beee56c5705a31e0b68cf
SHA5129745134fb3b61f0f5309259242fca86d9ab12bce65c03ef9a076ab48a7e9245a1d582a440e7cbd662b1c71a3d2b958c31b40f3a9a8509b66ebd502101be9d9d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516f4097585a8eef4ce3f16072020c37d
SHA103c6813e3e6cb9f0d9de930b64086fef3337be32
SHA256470da1b7c7c6aa6c9bac7914df1a40bd82be27b20636c64fb157f5c4b10b9856
SHA512b85cb89bdd37ff7f839075006853d23e12a2e0c84f0fdd69248644a8bfaaed8b2ea0916925cf7d7cb4fad64cd627cc1e5e4a6cda59b3525af6fe5d7544986047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbfec4e6a51217866df325d28f269e20
SHA1cef63c80f062ace184e9f75306161eecbad358c3
SHA256d1bbfd264784f2311d740712892dc7a98cff56e58ffda1285412b91c3114870d
SHA5121c2f324bd2ccd42bba9489de0400a4c9854aa7ef36f4d05728025d88f473547a9cd353fc593319e661bb439d5513d855e1bc25ba42e1b313980dba8a0025d11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd94fe16a582fa27643834dcf66baef
SHA1bae107a12fe225a5b1121a27f06bc8d83fcad17c
SHA25603992ce9f70608ad494a481eed251523fced0a109682c23c240174ca5b763f3c
SHA512028ad5f74ecb8b63ecba11529e84cfcd6a7963b1bacf3b91be4507e7e70c76637e7f7419a527c7c6f6124db50e481af57f89b2ef0da4bc57ffdda8a50ff6c935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5102a3154ceec67ba467be4342110f1e9
SHA167f7dcbc011916e59acac71c1119fcd11d732d72
SHA256267a4fb83aa214d89b8b893ea10371cc324f90e4aae4f366c3642d6d4e20222c
SHA51276b90f13c89ad2c4eb682c38258c156e14e0271751922dc6d70cf76688073cf035bef5c540411f6be7df007f93a360d7d5634dedb2fff79da86b4f9dfb7bd7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571cc461f65a8b2e6eba8930005ec44e1
SHA170ac2ebb4955c9ee85f56a5068bca63fada9db8d
SHA25646ee962382a2cf0be444aa13f5be0cee3a5677c7c9c5089e5d172db05d55ffcc
SHA512d0f855048cbc68987dc3c945c562f4d70534618855e6f4178bb05862a49d25adca1dd57874b3295d7d89bbbcd1dc0e1a25e3dc148458aeb042fc5a03f69bcb3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f97cb43b0e3051c5135140113339a641
SHA19bd02478c6fdaec2d0cd787417e2e2be6f190b81
SHA2563fe695656c4da77b8b4a6fd6ebbb445464a594a9988df94be46221bcc46892a6
SHA5128743e742132845aeaa2ff2699bf20241a5dc3da4e8f8dee8dd07ba36a76c96a29f427ab66c7242adba2c122fa19b56d12bfa3e3ebf01338e13f869d6d8e634ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5923159b9a0f611510f939c5b230077eb
SHA199f614690d7e8ea1b9f48262e44aecf669d43966
SHA256c9405d688dabff5ce7fcd3a294a4b86b320964c9693349a9c0415d63448ac8d8
SHA512d64de0be102c34ddc6dce75f432f6b71d86f26d75a10ff55cc0cdbfc699578dac79979d033eb9800a7df94381bc498b2e961ac8f434f0c47cc42d45fc9f60d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db40fea0a4aad5495f402ecd4fae41f
SHA1418786a866b1278bea745a26d648d9d440d25aef
SHA2569431a5e08cbfc86a10d54b0d632981378167e5b8f11fb74ad72092af2860016b
SHA51233f1c803a03c5a7e92583af72f3da4961420505bcc066b9bd2f6d965762a377fb6efb3ede7da3f83e0e6f0fd21bb6d802a4ade137372de93a84955de29b8c963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529608fc026e9667b2b236bba8b63e637
SHA11fbf94b8cfd466d160af2bec7fcc4d97bec3ed78
SHA256308b652958b86d79ec48a9b6deb15bf322556cb22276a8e4a06f26559b22cd80
SHA512ee36ebbdf4eb51e142ab6fd989994f5039525395e45e042e86bebd3ae1ee43c60588b2c1823f482d4a1fa38a78eca6f6574b0c5e3ab5ca204f2989b1d67c7e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b892b30c2625c46e4b0229cf39d485dc
SHA16890594cbd50d129c5547eb4496d9183624ee1cd
SHA256ca27c0f32b52ab095cf633aed18bd4b451cacdf530b2f7b0492bbf44d8c04c28
SHA512305182273362400258fe527bbf522b6bbd0103cabdb76338f79dfcfad08be3c2fbf00b386812a66a8bd5b722621822bceae04f3dfb7b4eca9e85816ff76256aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae9b23fad45cca561dbda1c70923690
SHA192881e46934ab24c2a1b2add69c470e9f1faab55
SHA25645c48e8bf4e2a18d8ec594d3f079478c95787e8ad2a628c3ca7296a82dcd8cbf
SHA512153e68d9af349ae51a62c10bbb380ab0f0664e22b9f48c81d83622c76e3bd7362389c77fcd001b19549a02e2c05d36030c6945a63549f23dc95d290e74ba751b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d8f7d25a0947ad6901deef817d85369
SHA198913e28b1498342c0a879280c222535e36abd22
SHA2565880e14f3b38417c7a7ff1621a5e96428a0462d74a71c216ad5c2230923420e6
SHA5126085ff042c33031783575b96f816b5ab3d4eca4334683f4abd629a6e5e72bf32bed073460422d386eaf752d868ad0f50d554c4d756f873cf8cedc50866246d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5749634f56a2f7e9ffbbdecd4db8f55d3
SHA17a3c863ff0254a6f021fb99664412e64b7baf2d0
SHA256fc0658802b94d73642e3b9745bd6765c513266f42f5541a0a1706ec9f202a8b8
SHA512a39447380f851e4193488b66e7a7cd4fe3ec02e6188a9dadb9ea09ac1be85b9891a2f1a78ab93e2ce0d823080ee8ea9765fbcbb5f93c81baffcf964265841e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5be648c45b380b420ffabf19ed24c00
SHA19280685ee842950c0faba9ca874f51b84d9dca28
SHA2569084d6e05da3fcbeae81f793ce6626a2116e35c7360ce412ca25f07995593172
SHA512c8d532695b1352b179bd9958461dfda32e7fce5aac42fcd348fa72839ad68064dcbb1ddefde33e6b50902cebfc627da671b5b675fa0e5aee0a71b65855786677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed31a6cbf82dd53d68952fa39f68a9df
SHA18a8bd17fd6d31cb57f97d1e4bd7cbbcf95250326
SHA256dea3cfd0a5e142bec54db9cf21baacfb9175cb0b8fcc40b543efbf2969dd476c
SHA512616ff783219ac3c71d1a2d18073f57ba06c8ed9d42191dd4bc2b149c869fe75b97882dd435c2340839648cd0cd4d919dd898a3d0663bb5eb3d9a7eb933bfff01
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
232KB
MD56b21b8b9506090bc155c6b42aafc7e6b
SHA195d24006871fe508d6942675d65a29656173fd50
SHA256236fc6fb6623dcbbdeedb3b1a9aeb2b2e099d16efc09e34e87a642af98519c07
SHA51228884e634dff6a6f5eee35e91a9e7c075433d44e00917b24e30c7d12d06dd47402ae5ef32eec0157ecb6e417f44decc056ef58b2c168adea08713bc9690bc0ec
-
Filesize
232KB
MD54f7ac27d348a2feb2370aa53a07f3023
SHA170442632c369e0bba54f3a3280719bf71ff1a092
SHA256feeb1e25ed808e62759d1344e08f6ee4c159a4b5c981ecbeeeb9e84b5465886f
SHA512c415e0a4823072557628e3f1b00719151dc790376a52ad9b68cbead84085f7adf83eb599f65402b6e1caa77f47119c9f2328feebe14116d2a1fa26e89d13f798