Analysis
-
max time kernel
95s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 18:23
Behavioral task
behavioral1
Sample
0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe
Resource
win10v2004-20241007-en
General
-
Target
0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe
-
Size
232KB
-
MD5
ab159fbd0f74f1d87281a5414d13ab5e
-
SHA1
3cc45229fe8e3b8d4bd565e8d1bf61033db31111
-
SHA256
0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3
-
SHA512
a1c53cedf0d90e21fd1a6b6bff998a06dfd82f7865603584f590c78b19cb6bdc19d7022881f1d6cdd7989714fc5b394dbaa0716dd84049a70a399acce8c83016
-
SSDEEP
3072:7I1i/NU8bOMYcYYcmy5cU+gTn6HOjDhWrzvvQwlgO5s1i/NU82OMYcYYamv5b:Ki/NjO5YBgegD0PHzSni/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe File created C:\WINDOWS\SysWOW64\qx.bat 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 5108 cmd.exe 4132 cmd.exe 388 cmd.exe 4116 cmd.exe 3796 cmd.exe 5064 cmd.exe 1572 cmd.exe -
resource yara_rule behavioral2/memory/5052-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0009000000023c95-10.dat upx behavioral2/files/0x0007000000023c9e-12.dat upx behavioral2/memory/5052-20-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\windows.exe attrib.exe File created C:\WINDOWS\windows.exe 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe File opened for modification C:\WINDOWS\windows.exe 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A5FCCA73-866B-11EF-A7EA-6AACA39217E0} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136376" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e75b7b781adb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2052901756" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2057432943" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008110495d4aa4cb41b6757eb2472c6e5100000000020000000000106600000001000020000000ca6d3068cca8f5bc0d8369aecaa8773b6d603b501b937586cb09f4ba94c3121d000000000e8000000002000020000000a653b539953f98da90f1c457ee81c585e4d111a80cf8b8c007a1aa9c6a6df71a20000000c065dac3067354750b0854c935c07849f267915bac9631a38efc9b13f71f400c400000009f752baf5b849ab6c0813a19ee19daa658e66bb209bdb5ebdb10f881162edf0a31a8e6a3d00190f7041116ec9c4e8f5e088eb411f847108c0f08868568b63eed IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05d657b781adb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136376" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2052901756" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31136376" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008110495d4aa4cb41b6757eb2472c6e510000000002000000000010660000000100002000000092fce4f3855905c174cb65b64c56103226c66cdb2883c39d5e531a636c0fd8f8000000000e8000000002000020000000d7222da781b0b040c8827fede62dd882d2fc4906e56687ffa4656fdc5de113fd20000000c40674a465fe3760c92ba5259ab0a80f3e717df6aa2d463c29db4a2399ea482840000000bb3f2e74e7c1aee97c2ad0bd354b4aba6db502bb0959f4cb91d50997d52b438870499a4b1827fec16f3a0583c11cc0cbb55fdd43dc4e8d355d5b8c0c0c3aa7a6 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435263212" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 5052 wrote to memory of 2716 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 85 PID 5052 wrote to memory of 2716 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 85 PID 2716 wrote to memory of 1116 2716 IEXPLORE.EXE 86 PID 2716 wrote to memory of 1116 2716 IEXPLORE.EXE 86 PID 2716 wrote to memory of 1116 2716 IEXPLORE.EXE 86 PID 5052 wrote to memory of 1780 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 87 PID 5052 wrote to memory of 1780 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 87 PID 5052 wrote to memory of 4116 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 89 PID 5052 wrote to memory of 4116 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 89 PID 5052 wrote to memory of 4116 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 89 PID 4116 wrote to memory of 4880 4116 cmd.exe 91 PID 4116 wrote to memory of 4880 4116 cmd.exe 91 PID 4116 wrote to memory of 4880 4116 cmd.exe 91 PID 5052 wrote to memory of 3796 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 92 PID 5052 wrote to memory of 3796 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 92 PID 5052 wrote to memory of 3796 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 92 PID 3796 wrote to memory of 4664 3796 cmd.exe 94 PID 3796 wrote to memory of 4664 3796 cmd.exe 94 PID 3796 wrote to memory of 4664 3796 cmd.exe 94 PID 5052 wrote to memory of 5064 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 95 PID 5052 wrote to memory of 5064 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 95 PID 5052 wrote to memory of 5064 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 95 PID 5064 wrote to memory of 1032 5064 cmd.exe 97 PID 5064 wrote to memory of 1032 5064 cmd.exe 97 PID 5064 wrote to memory of 1032 5064 cmd.exe 97 PID 5052 wrote to memory of 1572 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 98 PID 5052 wrote to memory of 1572 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 98 PID 5052 wrote to memory of 1572 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 98 PID 1572 wrote to memory of 3092 1572 cmd.exe 100 PID 1572 wrote to memory of 3092 1572 cmd.exe 100 PID 1572 wrote to memory of 3092 1572 cmd.exe 100 PID 5052 wrote to memory of 5108 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 101 PID 5052 wrote to memory of 5108 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 101 PID 5052 wrote to memory of 5108 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 101 PID 5108 wrote to memory of 2524 5108 cmd.exe 103 PID 5108 wrote to memory of 2524 5108 cmd.exe 103 PID 5108 wrote to memory of 2524 5108 cmd.exe 103 PID 5052 wrote to memory of 4132 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 104 PID 5052 wrote to memory of 4132 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 104 PID 5052 wrote to memory of 4132 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 104 PID 4132 wrote to memory of 3020 4132 cmd.exe 106 PID 4132 wrote to memory of 3020 4132 cmd.exe 106 PID 4132 wrote to memory of 3020 4132 cmd.exe 106 PID 5052 wrote to memory of 388 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 107 PID 5052 wrote to memory of 388 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 107 PID 5052 wrote to memory of 388 5052 0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe 107 PID 388 wrote to memory of 2916 388 cmd.exe 109 PID 388 wrote to memory of 2916 388 cmd.exe 109 PID 388 wrote to memory of 2916 388 cmd.exe 109 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 1032 attrib.exe 3092 attrib.exe 2524 attrib.exe 3020 attrib.exe 2916 attrib.exe 4880 attrib.exe 4664 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe"C:\Users\Admin\AppData\Local\Temp\0903cd32bcd56a20c8b66570fa61eff7ad9fce5fb48885a0fe9a2f800a0a14c3.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1116
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
PID:1780
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4880
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4664
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3092
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2524
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
232KB
MD546f71b95ea4fbb7402b4802a33b7233f
SHA112dc171cd8c630b11acd7f2859a547c5888a12d5
SHA2564bd11b9f9baf0723aec09297c7d240118020c85265777394bc7c1b74183e4956
SHA5120bab4d64177ffba2c974063f262b54903dd7291f283736be30272f3e920b2e9e34dbd3294d86206df672dd52ca7f32c1891e3265b0370a960b27af16a75db808
-
Filesize
232KB
MD52000ef36d5c1a32dc7e4c80d807ede6c
SHA11113dbb9da8d0f30bb52bf00ead5ba9343199718
SHA256d4c9cd062a3f2122e6d9dc66fa1fd10e9972e4dc7b1f37f929bb649614180ff9
SHA512398b40c01dd674f0799365e77bcdc148c70323ea63a8343a1963b77a8a61ed860dc08c0ebbf441f9b3e3aff4fedd2343c5056c953bb8109af569835ef2cf32b3