Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 22:46
Behavioral task
behavioral1
Sample
828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe
Resource
win10v2004-20241007-en
General
-
Target
828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe
-
Size
143KB
-
MD5
a6f4cf7723180ed098d0e4c80f7dd4f7
-
SHA1
5b10326fbae669536a371e4b1c92ab79c2fce22d
-
SHA256
828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573
-
SHA512
995b690ea0c92a54c81f0a88ff71d1b28a2c84df17f14efa48cd6e3c669932863c3932cc1c956babd3aa3a61599ca8f55b3e11c829df0c2d30b9451c9e726216
-
SSDEEP
3072:61i/NU8bOMYcYYcmy5cU+gTn6HOjDhWrzvvQwlgO5v1i/NU82OMYcYYamv5b:ki/NjO5YBgegD0PHzSwi/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\qx.bat 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe File created C:\WINDOWS\SysWOW64\ie.bat 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 4592 cmd.exe 4736 cmd.exe 376 cmd.exe 2592 cmd.exe 804 cmd.exe 4392 cmd.exe 2660 cmd.exe -
resource yara_rule behavioral2/memory/2456-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cb0-10.dat upx behavioral2/files/0x0007000000023cb1-11.dat upx behavioral2/memory/2456-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe File opened for modification C:\WINDOWS\windows.exe 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{6A10C91C-8690-11EF-91C3-CAF61997B0B0} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1047110337" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000042e7dba96731da408b68fe0ed5b0a2460000000002000000000010660000000100002000000025e13da1eb93c3a66255f21125c45b5186b3e4c5718da57396ba0fc3a25e2291000000000e8000000002000020000000b207145220a65c770e429ce25690a388e31c3eb77e49e754670b727a8a37f2352000000021071a3980ec6991c00d1e157b60a6b48dffc496c1ea451ea59a8f201c3714b04000000019d6e33a6d1a7756159515f594c1e10864e8e86916e0f6d9ffea7f28db76cbc146b37813cb7ea23959be3572fd6f9b25e49589a10ff6e7633f9baa9599773aed IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000042e7dba96731da408b68fe0ed5b0a246000000000200000000001066000000010000200000000dca16aa619d32ac7c577f5c9d0f1c73beb639db26623748727fd7ad745fc05c000000000e80000000020000200000008a95224783c79e86c8f2871d8edce7f4a55c8e20a154c05ac59714f1f6e41c6e200000000ae254d5ee229603c354c8e671d3c6ab7947d2e30f357180e00718f803e6545a40000000f4cfec1ca39e51a2fcf135aaf77a53a555c1cea629a47e812eb20b49c03099eddf1313aa17d8ebce8a2ed28f8043ecd7732660924fdb3f1035162cd0528200d6 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0275f3f9d1adb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1051797951" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136413" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136413" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435279003" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31136413" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d0503f9d1adb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1047110337" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4472 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 4472 IEXPLORE.EXE 4472 IEXPLORE.EXE 4648 IEXPLORE.EXE 4648 IEXPLORE.EXE 4648 IEXPLORE.EXE 4648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2456 wrote to memory of 4472 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 84 PID 2456 wrote to memory of 4472 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 84 PID 4472 wrote to memory of 4648 4472 IEXPLORE.EXE 86 PID 4472 wrote to memory of 4648 4472 IEXPLORE.EXE 86 PID 4472 wrote to memory of 4648 4472 IEXPLORE.EXE 86 PID 2456 wrote to memory of 1996 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 87 PID 2456 wrote to memory of 1996 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 87 PID 2456 wrote to memory of 376 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 88 PID 2456 wrote to memory of 376 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 88 PID 2456 wrote to memory of 376 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 88 PID 376 wrote to memory of 1592 376 cmd.exe 90 PID 376 wrote to memory of 1592 376 cmd.exe 90 PID 376 wrote to memory of 1592 376 cmd.exe 90 PID 2456 wrote to memory of 2592 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 91 PID 2456 wrote to memory of 2592 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 91 PID 2456 wrote to memory of 2592 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 91 PID 2592 wrote to memory of 2908 2592 cmd.exe 93 PID 2592 wrote to memory of 2908 2592 cmd.exe 93 PID 2592 wrote to memory of 2908 2592 cmd.exe 93 PID 2456 wrote to memory of 804 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 94 PID 2456 wrote to memory of 804 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 94 PID 2456 wrote to memory of 804 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 94 PID 804 wrote to memory of 2772 804 cmd.exe 97 PID 804 wrote to memory of 2772 804 cmd.exe 97 PID 804 wrote to memory of 2772 804 cmd.exe 97 PID 2456 wrote to memory of 4392 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 98 PID 2456 wrote to memory of 4392 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 98 PID 2456 wrote to memory of 4392 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 98 PID 4392 wrote to memory of 4968 4392 cmd.exe 100 PID 4392 wrote to memory of 4968 4392 cmd.exe 100 PID 4392 wrote to memory of 4968 4392 cmd.exe 100 PID 2456 wrote to memory of 2660 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 101 PID 2456 wrote to memory of 2660 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 101 PID 2456 wrote to memory of 2660 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 101 PID 2660 wrote to memory of 4372 2660 cmd.exe 103 PID 2660 wrote to memory of 4372 2660 cmd.exe 103 PID 2660 wrote to memory of 4372 2660 cmd.exe 103 PID 2456 wrote to memory of 4592 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 104 PID 2456 wrote to memory of 4592 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 104 PID 2456 wrote to memory of 4592 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 104 PID 4592 wrote to memory of 4148 4592 cmd.exe 106 PID 4592 wrote to memory of 4148 4592 cmd.exe 106 PID 4592 wrote to memory of 4148 4592 cmd.exe 106 PID 2456 wrote to memory of 4736 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 107 PID 2456 wrote to memory of 4736 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 107 PID 2456 wrote to memory of 4736 2456 828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe 107 PID 4736 wrote to memory of 3772 4736 cmd.exe 109 PID 4736 wrote to memory of 3772 4736 cmd.exe 109 PID 4736 wrote to memory of 3772 4736 cmd.exe 109 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 1592 attrib.exe 2908 attrib.exe 2772 attrib.exe 4968 attrib.exe 4372 attrib.exe 4148 attrib.exe 3772 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe"C:\Users\Admin\AppData\Local\Temp\828f103c733b2d3ac4803c9ec3a538e27fc755fb8d19102856f1c9f92f97a573.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4472 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4648
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
PID:1996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4968
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4372
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4148
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
143KB
MD550db57b4534227a4d4c79c66b1f17d6e
SHA1ecf2076b430e72149cfa555ba774137180704c29
SHA2566a37794c24dd1ca083cb30a9ef7fd3dabe468a2179db4718ba8b92d5e8c3c4f7
SHA512a9557a91376950ba16d267150b2d5fae03fed14e8941f299679c4d8d7fb9a8eff57e3f0f9077aa958ad3274f7a4f3d50ecac4e9df58729e6c79a5476764ce98c
-
Filesize
143KB
MD5cc6e2d80156790fab9fe67d9406567c2
SHA11ff40245755f12d4af763d37c92f2f40c2ec9c2d
SHA256ea0449f1933fc9450c2871789dcdfa14ef5f6240653d085421fb9b24c979e23f
SHA512ad566d144d2968c04594be119cf447a27f9d44516a457ee7651da48c3efef1b82a9482ad669a316a5583fb165dcc2ef34b49b1ca02de6c28de91e010f276420f