Analysis
-
max time kernel
91s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 10:36
Behavioral task
behavioral1
Sample
30b062f5265d63af3c9ccc1eea4adc00N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30b062f5265d63af3c9ccc1eea4adc00N.exe
Resource
win10v2004-20240802-en
General
-
Target
30b062f5265d63af3c9ccc1eea4adc00N.exe
-
Size
232KB
-
MD5
30b062f5265d63af3c9ccc1eea4adc00
-
SHA1
694f3a72628cae050886c28e25ccb8431e0d16b9
-
SHA256
d035a83631ff9fae8a28d6c8ccde53fe8ad4ad621cc9f93d467c802a4a9661de
-
SHA512
3c9ecf614e88d7b741987f6c0a40d106cec47b53c678ee73123f067d368013081772b937426d71ecdbed19261fab5ff25aff032b8920f71471cca257a5290266
-
SSDEEP
3072:L1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1VOz1i/NU82OMYcYU:pi/NjO5xbg/CSUFLTwMjs6oi/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 30b062f5265d63af3c9ccc1eea4adc00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 30b062f5265d63af3c9ccc1eea4adc00N.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 30b062f5265d63af3c9ccc1eea4adc00N.exe -
resource yara_rule behavioral2/memory/4024-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00080000000234b9-15.dat upx behavioral2/files/0x00070000000234bd-16.dat upx behavioral2/memory/4024-17-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 30b062f5265d63af3c9ccc1eea4adc00N.exe File created C:\WINDOWS\SysWOW64\qx.bat 30b062f5265d63af3c9ccc1eea4adc00N.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 3628 cmd.exe 3872 cmd.exe 3880 cmd.exe 2112 cmd.exe 3160 cmd.exe 2212 cmd.exe 3548 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\windows.exe attrib.exe File created C:\WINDOWS\windows.exe 30b062f5265d63af3c9ccc1eea4adc00N.exe File opened for modification C:\WINDOWS\windows.exe 30b062f5265d63af3c9ccc1eea4adc00N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30b062f5265d63af3c9ccc1eea4adc00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1008368046" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31129069" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432124775" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1008368046" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{67A9C5A1-69E0-11EF-BFD9-762C928CCA03} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main 30b062f5265d63af3c9ccc1eea4adc00N.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31129069" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000682ef1adb6c1b741b9a6296375b8eefb0000000002000000000010660000000100002000000079c0e03f07df3c93cd0348d3dd1c3b9be90dcef316c2f31d19b01db56f4d1ebd000000000e8000000002000020000000d220d06e79e5c0f8ae72aae04f05d9e1cec7a28bb266a79615d4be68af1973b82000000038e6028dcb28dd3574f7e55b459df345992bc254fd70c9210f11db8b6e85aab340000000112717d361ca4ec6b542e3195ea398cfe2c64718fc4336f68766c3bece0cbf56d412b1b284c12582621d2f87c4cd8945da07ed884c99068b78a1f932031dc157 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f013a73cedfdda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31129069" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1011024305" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000682ef1adb6c1b741b9a6296375b8eefb00000000020000000000106600000001000020000000cbd491d54cf6685e510dee5e46751dc56be3d1dfc13d2b99889c0fbaf418edc5000000000e80000000020000200000002b5d70e32899b85f701493a9181f36f4c17a773ffdb3f207f39629f78c127118200000000af5d2dc3723eb7938d76cdfbd0821a81891f27b278afe6833a2dafae733b41640000000a41897052a51235817d6d957a2b7024ea9dc862582a3110046f9c8c319d1822323d0f281669cff22b9aa28aaf6a2fbc0fabf4a06b69ce8d0504d3400eb96554f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0059a23cedfdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 30b062f5265d63af3c9ccc1eea4adc00N.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4720 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 4720 iexplore.exe 4720 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4024 wrote to memory of 4720 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 87 PID 4024 wrote to memory of 4720 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 87 PID 4720 wrote to memory of 2412 4720 iexplore.exe 88 PID 4720 wrote to memory of 2412 4720 iexplore.exe 88 PID 4720 wrote to memory of 2412 4720 iexplore.exe 88 PID 4024 wrote to memory of 3872 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 89 PID 4024 wrote to memory of 3872 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 89 PID 4024 wrote to memory of 3872 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 89 PID 3872 wrote to memory of 1376 3872 cmd.exe 91 PID 3872 wrote to memory of 1376 3872 cmd.exe 91 PID 3872 wrote to memory of 1376 3872 cmd.exe 91 PID 4024 wrote to memory of 3880 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 92 PID 4024 wrote to memory of 3880 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 92 PID 4024 wrote to memory of 3880 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 92 PID 3880 wrote to memory of 2384 3880 cmd.exe 94 PID 3880 wrote to memory of 2384 3880 cmd.exe 94 PID 3880 wrote to memory of 2384 3880 cmd.exe 94 PID 4024 wrote to memory of 2112 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 95 PID 4024 wrote to memory of 2112 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 95 PID 4024 wrote to memory of 2112 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 95 PID 2112 wrote to memory of 3144 2112 cmd.exe 98 PID 2112 wrote to memory of 3144 2112 cmd.exe 98 PID 2112 wrote to memory of 3144 2112 cmd.exe 98 PID 4024 wrote to memory of 3160 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 99 PID 4024 wrote to memory of 3160 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 99 PID 4024 wrote to memory of 3160 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 99 PID 3160 wrote to memory of 728 3160 cmd.exe 101 PID 3160 wrote to memory of 728 3160 cmd.exe 101 PID 3160 wrote to memory of 728 3160 cmd.exe 101 PID 4024 wrote to memory of 2212 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 102 PID 4024 wrote to memory of 2212 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 102 PID 4024 wrote to memory of 2212 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 102 PID 2212 wrote to memory of 1860 2212 cmd.exe 104 PID 2212 wrote to memory of 1860 2212 cmd.exe 104 PID 2212 wrote to memory of 1860 2212 cmd.exe 104 PID 4024 wrote to memory of 3548 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 105 PID 4024 wrote to memory of 3548 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 105 PID 4024 wrote to memory of 3548 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 105 PID 3548 wrote to memory of 376 3548 cmd.exe 108 PID 3548 wrote to memory of 376 3548 cmd.exe 108 PID 3548 wrote to memory of 376 3548 cmd.exe 108 PID 4024 wrote to memory of 3628 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 109 PID 4024 wrote to memory of 3628 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 109 PID 4024 wrote to memory of 3628 4024 30b062f5265d63af3c9ccc1eea4adc00N.exe 109 PID 3628 wrote to memory of 976 3628 cmd.exe 111 PID 3628 wrote to memory of 976 3628 cmd.exe 111 PID 3628 wrote to memory of 976 3628 cmd.exe 111 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 1860 attrib.exe 376 attrib.exe 976 attrib.exe 1376 attrib.exe 2384 attrib.exe 3144 attrib.exe 728 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30b062f5265d63af3c9ccc1eea4adc00N.exe"C:\Users\Admin\AppData\Local\Temp\30b062f5265d63af3c9ccc1eea4adc00N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4720 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1376
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3144
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:728
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:376
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5a9e71cfa0fd200ef242423866677a8bc
SHA177d8b80f9c7543506679e388a9054e8076178b6e
SHA2564eec051a82e8518be91e3142b79571ab2ebf3aa862641e0ea13b5aa7fb2a3a62
SHA5128208365359c39028a718c64cd51e4969f41829888427595d139788709c37576086c3a9fb8ce37ebee3eca175047a5461213a848a616e1b2ead4d17ba01de2de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5ec5e276e1e710f88568443a4a068cab7
SHA152c4b3b3e51de40b5bdabdf2cb180ac894520120
SHA25649cc7c3e5d546492a4e9f22fbb551bb5c75e5e69808731be47d832c398d3a242
SHA512ae4096ebb04b463af352d45ffaf6d48b54fc4ea0db929e82b3f9e33870238ec9b2b27118b35f962f540965103773c831f34699bb2f529f86d8ab7e0f2f9978e4
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
232KB
MD5da36c6195485710d8b01c7f9ddedf321
SHA1af928d3a216a164560e83562cc53796d5a848cd7
SHA2564643b1476456f5eac5d8006caf8a510a3f884e03fbf7f79788730aa2d255a1d8
SHA5122d1380e32b9c8020ac8bfd683926c04df21fa03490ef3ff7dac8d37deb90241350b484b62a6eec5482653fd952269d046ea531773136f291e9f09130af50fc43
-
Filesize
232KB
MD5f7a34dd5b8ba65cfa354b2947cffd1bd
SHA197afb36a20ad334f2eada09131af8e87607d38ea
SHA256aa78ba06e41c97d6438fd02d5a7edd94673f7ea0bfccfe977b866675b3207ef4
SHA5126100e9212e637f22119992999aad4b82322dd0db74e72234d21aa31e8962e0d2536f1e52bf6ac0ec50c098de954979bc4eded5976428485288deed2e66ca52e2