Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 04:26
Behavioral task
behavioral1
Sample
f7e0658010d2ff3571e886ef239d74e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f7e0658010d2ff3571e886ef239d74e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f7e0658010d2ff3571e886ef239d74e0N.exe
-
Size
232KB
-
MD5
f7e0658010d2ff3571e886ef239d74e0
-
SHA1
47b2968adf6341194b796f4eae8415253e8ce33a
-
SHA256
61685319b4db7140248c50361720c29abaffcce9131f035d2ed7f9666aa73aef
-
SHA512
e7af72f586d44ad8d14414001f6c0c05a4afcd9756e5441780b8653d41bcf8ad4de79e8fdf293c4e8b47b80214dff1b5efa98794bc54525be7183afcacd2eb1f
-
SSDEEP
3072:d1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1Vne1i/NU82OMYcYU:/i/NjO5xbg/CSUFLTwMjs6wi/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} f7e0658010d2ff3571e886ef239d74e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" f7e0658010d2ff3571e886ef239d74e0N.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation f7e0658010d2ff3571e886ef239d74e0N.exe -
resource yara_rule behavioral2/memory/1380-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00080000000234ed-15.dat upx behavioral2/files/0x00070000000234f1-16.dat upx behavioral2/memory/1380-17-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat f7e0658010d2ff3571e886ef239d74e0N.exe File created C:\WINDOWS\SysWOW64\qx.bat f7e0658010d2ff3571e886ef239d74e0N.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 2024 cmd.exe 3460 cmd.exe 212 cmd.exe 1512 cmd.exe 768 cmd.exe 4248 cmd.exe 1144 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe f7e0658010d2ff3571e886ef239d74e0N.exe File opened for modification C:\WINDOWS\windows.exe f7e0658010d2ff3571e886ef239d74e0N.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7e0658010d2ff3571e886ef239d74e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039570b57fe416e4dbccca910bc3eabbd00000000020000000000106600000001000020000000e0741ecdaa3f108f757d5231717bdcb5ced23f3685b57748133a1356cf29f265000000000e800000000200002000000045a23a57fb1cb9e7653a08221196b001a5b532289ebccebe889499add9dbf10d200000006bb33408dae8a2b945d6d3147938fc91f186ad54f5b886d61a5a8722a57b1df540000000bee55caf82381238737b7d5c7c7469c8b3325ad005f7346f468ceed33c55a762e65f34edca90cfd5e5ba284d029de8d825a2d74fe61e3ac49dd4a722c34b9d64 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2308193704" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31129017" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2305224940" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039570b57fe416e4dbccca910bc3eabbd00000000020000000000106600000001000020000000b823b509de0a2c10946bc94d5fe1626bd52898ad73427c409bcbf38a3e3ee65e000000000e8000000002000020000000dd0a4335008e8bac9e924485ef95bdbebad5b7d6458015df0dfa392fa7ad763820000000b05caa78377b57559d4cec73a3cbb6a6a6ad6acb03f8875e9cdcfaea814ca71e400000005ee1188892797cea5c78abe5ff1b79168be5f8b2bda214aef115d7bf39410edd850d209bfda0e46fe1fae1882a182b69fff3b92afe5eb33ba42f3d8a4569e2fe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f023f189b9fdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main f7e0658010d2ff3571e886ef239d74e0N.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0def589b9fdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B5095280-69AC-11EF-98CC-4E01FFCF908D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2305224940" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31129017" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31129017" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432102571" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" f7e0658010d2ff3571e886ef239d74e0N.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 1380 f7e0658010d2ff3571e886ef239d74e0N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 1640 iexplore.exe 1640 iexplore.exe 4992 IEXPLORE.EXE 4992 IEXPLORE.EXE 4992 IEXPLORE.EXE 4992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1640 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 83 PID 1380 wrote to memory of 1640 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 83 PID 1640 wrote to memory of 4992 1640 iexplore.exe 85 PID 1640 wrote to memory of 4992 1640 iexplore.exe 85 PID 1640 wrote to memory of 4992 1640 iexplore.exe 85 PID 1380 wrote to memory of 1144 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 86 PID 1380 wrote to memory of 1144 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 86 PID 1380 wrote to memory of 1144 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 86 PID 1144 wrote to memory of 2848 1144 cmd.exe 88 PID 1144 wrote to memory of 2848 1144 cmd.exe 88 PID 1144 wrote to memory of 2848 1144 cmd.exe 88 PID 1380 wrote to memory of 2024 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 89 PID 1380 wrote to memory of 2024 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 89 PID 1380 wrote to memory of 2024 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 89 PID 2024 wrote to memory of 3304 2024 cmd.exe 91 PID 2024 wrote to memory of 3304 2024 cmd.exe 91 PID 2024 wrote to memory of 3304 2024 cmd.exe 91 PID 1380 wrote to memory of 3460 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 92 PID 1380 wrote to memory of 3460 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 92 PID 1380 wrote to memory of 3460 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 92 PID 3460 wrote to memory of 3784 3460 cmd.exe 94 PID 3460 wrote to memory of 3784 3460 cmd.exe 94 PID 3460 wrote to memory of 3784 3460 cmd.exe 94 PID 1380 wrote to memory of 212 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 95 PID 1380 wrote to memory of 212 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 95 PID 1380 wrote to memory of 212 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 95 PID 212 wrote to memory of 1044 212 cmd.exe 97 PID 212 wrote to memory of 1044 212 cmd.exe 97 PID 212 wrote to memory of 1044 212 cmd.exe 97 PID 1380 wrote to memory of 1512 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 98 PID 1380 wrote to memory of 1512 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 98 PID 1380 wrote to memory of 1512 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 98 PID 1512 wrote to memory of 2432 1512 cmd.exe 100 PID 1512 wrote to memory of 2432 1512 cmd.exe 100 PID 1512 wrote to memory of 2432 1512 cmd.exe 100 PID 1380 wrote to memory of 768 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 101 PID 1380 wrote to memory of 768 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 101 PID 1380 wrote to memory of 768 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 101 PID 768 wrote to memory of 3916 768 cmd.exe 103 PID 768 wrote to memory of 3916 768 cmd.exe 103 PID 768 wrote to memory of 3916 768 cmd.exe 103 PID 1380 wrote to memory of 4248 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 105 PID 1380 wrote to memory of 4248 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 105 PID 1380 wrote to memory of 4248 1380 f7e0658010d2ff3571e886ef239d74e0N.exe 105 PID 4248 wrote to memory of 2112 4248 cmd.exe 107 PID 4248 wrote to memory of 2112 4248 cmd.exe 107 PID 4248 wrote to memory of 2112 4248 cmd.exe 107 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 2112 attrib.exe 2848 attrib.exe 3304 attrib.exe 3784 attrib.exe 1044 attrib.exe 2432 attrib.exe 3916 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7e0658010d2ff3571e886ef239d74e0N.exe"C:\Users\Admin\AppData\Local\Temp\f7e0658010d2ff3571e886ef239d74e0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4992
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3304
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3784
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1044
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2432
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3916
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5fd14d8d002bca1b7d44ab64e54c8e517
SHA16830e9580610bfe26c417e2a472bdc16cae9081a
SHA256c58228df92bbb2e140fe0a35a1e1d640af2f306053a5060858b503d93fc9f4ed
SHA51229c3e2dd39ea5bd6b30972bf4f6231d928c2cae0223cb1b58ad4d73a1d1f7bc743e3370396249aa0f5ded90e36b2877baafc3922a21251308d9a4cfb97d891ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD50245bde35831430b2cc14ab60b3356c5
SHA108031e6bf7a5915fb21b77344fff4be59f74782e
SHA25663f08007e5594f8f33a3b83b184f73fef97e84758937683b60de1cffd0883e9e
SHA512090d073547f81441205f6b64fbd732cdb26d03cc47d2fb4a62ac238093d8457c26d63544af4da37dce82185485d40672c4669dd044a7386dc71b6cd064f54c88
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
232KB
MD5531c2315180e1eb575919deebfe00693
SHA1f0067c075acaf3df50a4e42667a5efe998501b85
SHA2566ba9cc18175b4e15bece1fe16d20551642212478e0d1bb765f3452770ba8739c
SHA51234dbd6913e3e6be7ff7de4c9ec7262a2a6c073cdcf04c8a661960e267ae75624ddece0298e1612f598cfb51cef69fcee1ba4a672efe1dea4ae5b4fb977a761d6
-
Filesize
232KB
MD54f709c9dfafeea0c0bc4a04a2b03072a
SHA18221e366a126af0dc71405bce10391af90ec53d9
SHA2561073e7f79d2f690ccfcfb4f4c0af372ab2fbe6a1364356ec38c710ae95cfc3aa
SHA51200c0f93cbc306471cbb140838847dab8b922e91bba866b1acb52ece843add96cae21e12bbc28718a7ffa537102e1a5b364a2695426fa3fa7160118fa52d53286