Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 20:51
Behavioral task
behavioral1
Sample
31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe
Resource
win10v2004-20240802-en
General
-
Target
31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe
-
Size
232KB
-
MD5
3b9a24122715895bca73202126c31e85
-
SHA1
6a15d34fa9dc40e05b3fc16ad5a344414e2ccdb1
-
SHA256
31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32
-
SHA512
d97d787f53c712e8bd9f30b2808588ff8a727b82b970cb82b88567a1c7fb9aeac7a0b6cf8cff2801062a312643f6dda94c477908f273e24be317b1fcb3a7b46e
-
SSDEEP
3072:G1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1VOz1i/NU82OMYcYU:gi/NjO5xbg/CSUFLTwMjs6oi/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe -
resource yara_rule behavioral2/memory/2552-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00080000000234ce-15.dat upx behavioral2/files/0x00070000000234d2-16.dat upx behavioral2/memory/2552-17-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe File created C:\WINDOWS\SysWOW64\qx.bat 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 2824 cmd.exe 3512 cmd.exe 4032 cmd.exe 4996 cmd.exe 4084 cmd.exe 2976 cmd.exe 5020 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe File opened for modification C:\WINDOWS\windows.exe 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a03c32dab0fcda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3652289954" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003d1c6f3067c0c84abb3839afa92ebb0f000000000200000000001066000000010000200000005a075dfda7e760fbbb311c061e3dc1da0f85d7eaa610e16a50fb385ad77f0009000000000e8000000002000020000000fac009adc0570cb980a618e74497dca31d4099bff647ce2562b1253829da5ec1200000005b1276cd92ef80c8b31805babb9027f35f3362a7374b0b728d115d11c9fc9268400000009fb947dc3f68226d7f659b9920ce6775d1cf73b253bdd71afd143ac2248a0b5990778822425c4684dbc88759ef5cebdeb0de8116e709255248cee719ed1d6e26 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906839dab0fcda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{0553E601-68A4-11EF-939B-D2EB330F3545} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31128752" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003d1c6f3067c0c84abb3839afa92ebb0f00000000020000000000106600000001000020000000a6da4340bdde341bc8b8f7bff298f2690838f60b6663b1e9277f5fd8b6ac33af000000000e8000000002000020000000cf68eb08a328ba2fbcf0c1136af766a5dc5c71bcbefbe342842218218915c8d0200000003edbacc2dbb80fbf12955bc0bdf9b1779ad7564e5edc474633a1bcc97c5c362040000000e1d2587b6044984532ada40acdf6cb66941e5ecea955611e50de3e3b8f5ae3a55a79519c2a6474963f534e5c4720217abb50a8ba7c3354ae87a99ce46386cf4f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431988889" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31128752" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3655727661" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3652289954" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31128752" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4404 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 4404 iexplore.exe 4404 iexplore.exe 4908 IEXPLORE.EXE 4908 IEXPLORE.EXE 4908 IEXPLORE.EXE 4908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2552 wrote to memory of 4404 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 83 PID 2552 wrote to memory of 4404 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 83 PID 4404 wrote to memory of 4908 4404 iexplore.exe 84 PID 4404 wrote to memory of 4908 4404 iexplore.exe 84 PID 4404 wrote to memory of 4908 4404 iexplore.exe 84 PID 2552 wrote to memory of 2824 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 86 PID 2552 wrote to memory of 2824 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 86 PID 2552 wrote to memory of 2824 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 86 PID 2824 wrote to memory of 4884 2824 cmd.exe 88 PID 2824 wrote to memory of 4884 2824 cmd.exe 88 PID 2824 wrote to memory of 4884 2824 cmd.exe 88 PID 2552 wrote to memory of 3512 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 89 PID 2552 wrote to memory of 3512 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 89 PID 2552 wrote to memory of 3512 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 89 PID 3512 wrote to memory of 5092 3512 cmd.exe 91 PID 3512 wrote to memory of 5092 3512 cmd.exe 91 PID 3512 wrote to memory of 5092 3512 cmd.exe 91 PID 2552 wrote to memory of 4032 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 92 PID 2552 wrote to memory of 4032 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 92 PID 2552 wrote to memory of 4032 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 92 PID 4032 wrote to memory of 2524 4032 cmd.exe 94 PID 4032 wrote to memory of 2524 4032 cmd.exe 94 PID 4032 wrote to memory of 2524 4032 cmd.exe 94 PID 2552 wrote to memory of 4996 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 95 PID 2552 wrote to memory of 4996 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 95 PID 2552 wrote to memory of 4996 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 95 PID 4996 wrote to memory of 4512 4996 cmd.exe 97 PID 4996 wrote to memory of 4512 4996 cmd.exe 97 PID 4996 wrote to memory of 4512 4996 cmd.exe 97 PID 2552 wrote to memory of 4084 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 98 PID 2552 wrote to memory of 4084 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 98 PID 2552 wrote to memory of 4084 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 98 PID 4084 wrote to memory of 1920 4084 cmd.exe 100 PID 4084 wrote to memory of 1920 4084 cmd.exe 100 PID 4084 wrote to memory of 1920 4084 cmd.exe 100 PID 2552 wrote to memory of 2976 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 101 PID 2552 wrote to memory of 2976 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 101 PID 2552 wrote to memory of 2976 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 101 PID 2976 wrote to memory of 4040 2976 cmd.exe 104 PID 2976 wrote to memory of 4040 2976 cmd.exe 104 PID 2976 wrote to memory of 4040 2976 cmd.exe 104 PID 2552 wrote to memory of 5020 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 105 PID 2552 wrote to memory of 5020 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 105 PID 2552 wrote to memory of 5020 2552 31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe 105 PID 5020 wrote to memory of 1456 5020 cmd.exe 107 PID 5020 wrote to memory of 1456 5020 cmd.exe 107 PID 5020 wrote to memory of 1456 5020 cmd.exe 107 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 1920 attrib.exe 4040 attrib.exe 1456 attrib.exe 4884 attrib.exe 5092 attrib.exe 2524 attrib.exe 4512 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe"C:\Users\Admin\AppData\Local\Temp\31ce9a4555eec4a271d1f4f66b4481f7268d2fd033d03efbc9af88add3524d32.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4404 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4908
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4884
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5092
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2524
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4512
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4040
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD51c7226fea3dc2059287a4a2ae7519102
SHA1ddf68a29afc928251f9743341d5fe0be207479ad
SHA256ccaab5444ee41ed3c94268a55693fe4157f72e980d2dc3687ac98bab1a265396
SHA512b646d2a7d9d8fbc5846f8ecc8a69e7913c603cbad1a488f24b75a0e371e3e367c596dc3fbae2ebbfb486e17b5f248ee4c47d34c6b5e7cdd7cc387d184e8366e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5e3300773fe801d67166c89949186cc49
SHA17d011f51584f536325bdde0a58a1cfb04b5fb3d1
SHA256c50247c909872ba2f22ad49905f29b63d4983ac9a2ea7ebd83831401f9574ea5
SHA5127e3a9ab2067e45537dd68df65d45275146b60d018e4f90a63b2c05a54a7151336e96390df35074498f1f3c50cb97f05896fd9f7f587c4d20fe26c6b2380aed28
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
232KB
MD5e3818b925991ba4c401c080d0549868f
SHA11704a38c3d7bd2d163e5d47986bbcb69bd6dc8b0
SHA25626f046151a58e74c0b206b50bce04e7398da5f9a0a86fa748567a6e3adee99b9
SHA5120ec2ec63366d540635e00d21ecf9fbafdf998f091e1557e79f2a464932ac5da738c286d6382f61662fc0904d8f650c4584c7089d7e4c312f8f5d87bf4648d645
-
Filesize
232KB
MD5ed5a7b2f1f3f8d8c7d12050e1774f7a4
SHA1916e2319c3d5ca42629258b2a10ef872d6bb2303
SHA25695222026361b01db09bd87530eeed0979bc068eacf9dab0961b512eb3f9b01d8
SHA512e6dfcf3b906e2ffa49626f2639b7d1feaa7960aa53a5b28519bc9c92d250ba46f8dc2beebb0f3e710db33f91bc8f7dc507fc63a0fdcf8bf030a6a4b5a9b919f1