Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 00:20
Behavioral task
behavioral1
Sample
bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe
Resource
win10v2004-20241007-en
General
-
Target
bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe
-
Size
232KB
-
MD5
d7af2da7399318940640686b8754b800
-
SHA1
21edc3fbcf45bbd6281bad45410b06ed092a8407
-
SHA256
bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187a
-
SHA512
d7529e8150ea12e34022ebfd5a9d4204643cf4ef5df97c5b11bbfb0213241ef9a8a451e82abba41a47269bc10c1a2240497d4f2d1b244256b06683b603e07baf
-
SSDEEP
3072:rI1i/NU8bOMYcYYcmy5cU+gTn6HOjDhWrzvvQwlgO5s1i/NU82OMYcYYamv5b:ai/NjO5YBgegD0PHzSni/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe File created C:\WINDOWS\SysWOW64\qx.bat bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 2820 cmd.exe 2756 cmd.exe 2488 cmd.exe 2640 cmd.exe 2780 cmd.exe 2616 cmd.exe 1976 cmd.exe -
resource yara_rule behavioral1/memory/2528-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x0008000000016241-10.dat upx behavioral1/files/0x000800000001630a-11.dat upx behavioral1/memory/2528-25-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\windows.exe attrib.exe File created C:\WINDOWS\windows.exe bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe File opened for modification C:\WINDOWS\windows.exe bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0cb0464aa1adb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BB57841-869D-11EF-A444-523A95B0E536} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BC483D1-869D-11EF-A444-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434681536" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000d890cfb020f8182ae19ed41185178e73dd8c63b6598d128877ea5e3d5dd04e69000000000e8000000002000020000000d27467d33daf64dbffded4097e0737ad80545386a10f3a0ff80b18ba45abbc8b200000004f911146ea919bec7897b738f3711ebeccef0bc8a4e6d4538a407301d1c407e4400000008f1c22479c0484b4d9977b67d5e3125860439750603bb60c432ba47b6cc9c860777497fce093a10606c51bb8214d4d3cb8d8a571c7be337bef92e3728c5fcadd IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1616 IEXPLORE.EXE 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2800 iexplore.exe 2800 iexplore.exe 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1616 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 30 PID 2528 wrote to memory of 1616 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 30 PID 2528 wrote to memory of 1616 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 30 PID 2528 wrote to memory of 1616 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 30 PID 1616 wrote to memory of 2232 1616 IEXPLORE.EXE 31 PID 1616 wrote to memory of 2232 1616 IEXPLORE.EXE 31 PID 1616 wrote to memory of 2232 1616 IEXPLORE.EXE 31 PID 1616 wrote to memory of 2232 1616 IEXPLORE.EXE 31 PID 2528 wrote to memory of 2800 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 32 PID 2528 wrote to memory of 2800 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 32 PID 2528 wrote to memory of 2800 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 32 PID 2528 wrote to memory of 2800 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 32 PID 2528 wrote to memory of 2820 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 33 PID 2528 wrote to memory of 2820 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 33 PID 2528 wrote to memory of 2820 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 33 PID 2528 wrote to memory of 2820 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 33 PID 2820 wrote to memory of 2760 2820 cmd.exe 35 PID 2820 wrote to memory of 2760 2820 cmd.exe 35 PID 2820 wrote to memory of 2760 2820 cmd.exe 35 PID 2820 wrote to memory of 2760 2820 cmd.exe 35 PID 2528 wrote to memory of 2756 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 36 PID 2528 wrote to memory of 2756 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 36 PID 2528 wrote to memory of 2756 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 36 PID 2528 wrote to memory of 2756 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 36 PID 2756 wrote to memory of 2740 2756 cmd.exe 38 PID 2756 wrote to memory of 2740 2756 cmd.exe 38 PID 2756 wrote to memory of 2740 2756 cmd.exe 38 PID 2756 wrote to memory of 2740 2756 cmd.exe 38 PID 2528 wrote to memory of 2488 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 39 PID 2528 wrote to memory of 2488 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 39 PID 2528 wrote to memory of 2488 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 39 PID 2528 wrote to memory of 2488 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 39 PID 2488 wrote to memory of 2768 2488 cmd.exe 41 PID 2488 wrote to memory of 2768 2488 cmd.exe 41 PID 2488 wrote to memory of 2768 2488 cmd.exe 41 PID 2488 wrote to memory of 2768 2488 cmd.exe 41 PID 2528 wrote to memory of 2640 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 42 PID 2528 wrote to memory of 2640 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 42 PID 2528 wrote to memory of 2640 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 42 PID 2528 wrote to memory of 2640 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 42 PID 2640 wrote to memory of 2644 2640 cmd.exe 44 PID 2640 wrote to memory of 2644 2640 cmd.exe 44 PID 2640 wrote to memory of 2644 2640 cmd.exe 44 PID 2640 wrote to memory of 2644 2640 cmd.exe 44 PID 2528 wrote to memory of 2780 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 45 PID 2528 wrote to memory of 2780 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 45 PID 2528 wrote to memory of 2780 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 45 PID 2528 wrote to memory of 2780 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 45 PID 2780 wrote to memory of 1372 2780 cmd.exe 47 PID 2780 wrote to memory of 1372 2780 cmd.exe 47 PID 2780 wrote to memory of 1372 2780 cmd.exe 47 PID 2780 wrote to memory of 1372 2780 cmd.exe 47 PID 2528 wrote to memory of 2616 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 48 PID 2528 wrote to memory of 2616 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 48 PID 2528 wrote to memory of 2616 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 48 PID 2528 wrote to memory of 2616 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 48 PID 2616 wrote to memory of 2672 2616 cmd.exe 50 PID 2616 wrote to memory of 2672 2616 cmd.exe 50 PID 2616 wrote to memory of 2672 2616 cmd.exe 50 PID 2616 wrote to memory of 2672 2616 cmd.exe 50 PID 2528 wrote to memory of 1976 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 51 PID 2528 wrote to memory of 1976 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 51 PID 2528 wrote to memory of 1976 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 51 PID 2528 wrote to memory of 1976 2528 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 51 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 2644 attrib.exe 1372 attrib.exe 2672 attrib.exe 2324 attrib.exe 2760 attrib.exe 2740 attrib.exe 2768 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe"C:\Users\Admin\AppData\Local\Temp\bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2232
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2644
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1372
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2324
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af349ebce2acdd09682735562df9e763
SHA1cc87669c2fe3e79474d88450842458db96697cc1
SHA256e7036927fee1635c922866df28a962af39ec32bc94b99841ac2963851270f801
SHA512fe2a89fdc1a6bac4a4020d454a0facb7fef0bbe514788de60df42331015985effa7f56a8113fb920a1c1aa012954a29ca7ab313661bdc8d77154acef02cf160e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ff1829b31ac6ffb54e85a8adb04c77
SHA15906bd52e66d348febd2189a32232eee11defaeb
SHA2562e2ea01f298ba314a9509c67f1c5f04eaf5ab12a3f5da8f90a7326fd2d315f77
SHA512a3ff98cdf5b1f1551318838acd9171e3e941c7ac06d55c9f8c46c268726289627e26c8a07454af64bbc8c5251fb5462d91c97a578a9c672a6881af9de5e8a223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bc0491a807e1f84d3121c384c124ffb
SHA19a313a3bb360693f4f00350610aa94089ca8dc1c
SHA256ff2bbf3591907ec7f76d853c36b0710cb29e5681bcd16acf59914fabcef35118
SHA512dab3247aa04ff0394cdbe992b6c45606fe2be785286133a028bc38c619582a0eda8c5aae3ff09274c4d220088f6ad93ac602233bb9bf6dc4962cfe5fa0d8672b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9dbcdccb2bb0969dd4a36890a4bf90c
SHA16da4c0ac174cab4ff9f47ddc9e72481090a538ba
SHA256543e4c0360fc6cb5cc2176998e776faa4f0e1c6ce9f8a85e0368d37bcfc8dc8c
SHA5121d2dffdad66c8b187ef5b4271c84cf10f24e563c7fa08155e2b559876db668fb8e9f5adceccf05633b90dd45c7dd427da2dce1e53e95157ae122752c204c63af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5893bb2d555ccaa8248d3d98ec0a74bd1
SHA1813b0780b4a0a7f40aa51105650eac2729b3f720
SHA256ab24da1768b358989a65717d80d8ff127762af8111b668b952e6ab8c81cf21f0
SHA512351a1352ce19cfc6dadd69ea965f81131997af1f9efc255b81a0f8aa4d24dcf9c70a592c8c687297cd285d759b08febbe5c19280450cebf5ac9f791a50aba2bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c1b8fd5df14f6ec737303b6c9d3bb9
SHA19a7a3af6149bf0bfac429c488d0238d93b16a15b
SHA256c134a2af0979ee99f48eb7b2f2ebd7b64c1d5f1e8b3c2f2dc9594cc0aa0fe40c
SHA5122f30a19e017fd4b8aea56432c2bb076c55a891e177ff206ff82394b2eda2cc2b724c742ae8207b0039bbac51a3e6b755af3f5a368de64ede115d8d5cba4b6706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5e55863fbaaeb31ab1605640395ddd
SHA17b856f59fedd5142610520e6ca566ab01500a243
SHA2567db8d1a17f22a81fb7abb89be4a2b589034e8b93dea1f19b915467c4baeb5674
SHA512d0d3207af9f3730e0719b3559d90d615f7afc249045bdaabbbc9cc00052b5512b1e5de5b28597cc7042919e6ed1cc5efa39c7ef8c9a1ef6004e779a76081714c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac480baab7f8dd5dcd724f3d0a3337e
SHA126a4df53eafdf00cda2083b6d485b71a85d72344
SHA25666558a74d44b9413a04dc72d9d35e05a1a4c34db9d9c94285901eab83417a261
SHA5125af531a8ea370c8e6a5b54e6d5d3daf178a65a96c5ce43bf78249a3c7323bbf4e4dcb4b847932525a200679f34fe86af439ce6f785e6bb71e29dab7024f0f214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bf0f47ea01950f63f0fd65a34697602
SHA1741fd743233e0c3beb0f1973c9e957129c36e6d2
SHA256283d405c59ab219321392e19c1612f426fb50e641f39035ecb5257f5d850c98e
SHA512535f9c5c7b87f4e455d0c0cb8521f27e94ce2bf09c8fd7e3e84bebc938fa09c39c1c998f8db3fc6834a1485151eebb3c488fc0ed2cfc826b1f5e7c38d4885038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58532fa3626fe5238037e072c09277a56
SHA14d37f58f26b0ffc855e1849de4c11cb77f15d990
SHA2560f10cbe7c12e03401a68793463db20cf8c9d3ac9ab7a149d5cab2451a4878092
SHA512e892c2094de3c09d5e442d0517b920c870e310b38a7f381065f66a9fb2bce4b290f595c8680f431c89f2af6fbb0df78410ab07a27318e3755b3ec86bbd8e73b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5067786438b0f40d53e2b6fffd5369b6d
SHA1a8a8e05942399fea19b37b239b91d11541d62248
SHA256b92724a6dd177f9c11649f903b4cefc51ef28fb3945f552b3537d549d53d9972
SHA512509cafcc629c1a89323ad9a33923943b65dc130a14ffc0bb71fc47dc5ab9a7d301055c6664686ab3c2f60b04b4f9068553d65c6ba95fae2b4059e1c157b68e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ee0adf2b5fcb948c31422870b35350
SHA1c7a21c453ada4600cf06c3a17cfcd0e37fd15242
SHA25642ef885b2f5a6e9306e40743fba58f628dedb81fc0986bc5463f360b801a2513
SHA512f7c8b6af3a4c2d8824a98751347f25bf52792329346c7e2d7afb5a067d859c120583265069f30d20e2b6a11f724c53d3a9ef9778ec1f9a9d1622a5ee02863a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53492101666c06764f68035cd62ca87a2
SHA139e3790ae4e1426eadcacaabcd3b4876a5b52afb
SHA2565b0db4a34579a91c68e019bfa7a7654c4f6da5ab6fff643859036e4f54244e37
SHA5123b92afc7307c45d3a90557372a66c68f01dd84f9897317b67e7360c1b31ddbbc5c6ce2249e623423420ea11eabed74d0adc8143143bde5ad6caa321fe8a91d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af7d1ffdcf339f3893003b007b69f19
SHA1548a984c310cd018eaa42a5e4b70f2f9b8e61049
SHA256e2c79bfe0b4bba38d3af074db5df4bd256f7ef7ccddaafcb922fd32c903389ad
SHA5123e9195ec94f6f32c1fb8b52e8c06158a4e627b236be7ff7e0d7341beb21d4768f4022360863a7e4fbb6baf4d81b33e627c64d236174ac2bfb15ae6a7aac4904c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596434f360130a240b6a85caaa8cd69ee
SHA1b61d9493fad75f5785a50eaa6bb8cde1ebd73ec8
SHA256cbc79f24f2e189746e0fd84dff01fab6a15e488a8d91662e1fcc62209323c663
SHA5128ea79e7826f02ddc9d11ec569ef3c47c6d3e6c8066dbc5f146defc7c38574541f619600244b50118e9f96235fe080cfda54e273fd2629f07c0deea9441e737af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc614cb56e24c6e3844af89589bbe28
SHA1f656fe2061c8d8965efcbe170723070bb4b93b4f
SHA2567af4919ea5c5a58de301af8a88cc6f410f47790b18d5e1fc63c736aeb80f2350
SHA512a9cd6bc2beebc90d29da250038d018e549c000e470128b9c046e1699465a96dc26585b63a57585e099afb89de7f7b69c80c90f5873c85e73d4da51b2fff7b9a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0fb336710de803ca73a1cbc9e136927
SHA190ab7ccbc3a2be717ed207e8d18d00f12e327b6c
SHA256a0214a9c6d10d640bbb3c0028c4c64da3ebb97e37aacf1da8bda53f0b3d028f7
SHA512a198dcb5c0d8b1a5c16e170ae02231a6ce4f9ae49f9daa825ffe43a7e17bbc0b403783c02bca2a7dbc221b16555411bfff4eec49ea58abb6729a8f7bbe1fc3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57068e2ffedfb7a00b7743d0b14b0da34
SHA1d1daf6d63ce3eeb0d52d3aed2992f15840abbe15
SHA2567f48c157a9365d8076021f6e76d8cdfbd1b9d214e0f8b2c3f1b94f47b561cc8c
SHA512ff6c200537686cc0b6397069047b26b75011385b67e66eb3671b665eb2b458e08f9f13eb8bf0e675d1e5dcf1b69dab5fa8a22acd1113dde915b706dba1a6dcc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b915d55eb86a01eb11f8167bb8de28d0
SHA1adbad268d6b41bc8ce4e70ed064f2c4c46d4acd9
SHA256315d4b08e0cc7b2f4a7a156192de5e100be718d8e31865eadb2ddeed8cbfcc12
SHA5128421b5609833bb2ab04b69a9f0bcaf64c6bb4e73b52d328f2927de7ca795726319daf8d9edaf476627be74bc9198f7cdc294e0d99d1db9937cf6b6ef0b4a82df
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8BB57841-869D-11EF-A444-523A95B0E536}.dat
Filesize5KB
MD5773b5344ef11ee913a2631574323eb1c
SHA1429deaa9739c730a7792ef70309322f869ad8518
SHA256b91dee82ec100828bc642db4033b5228782a6909e38b9e08f45c0842ad209cfb
SHA512ad75574494f0c446c28f5fc242e88c27c9f3649be3be9510ee91f6af14c2dfc42d83ca25fbe2accb3adb41724a076407d8426471a03456df8b3373be7dd9ba1c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
232KB
MD563fa673b713051e74cc9345f9670ba5e
SHA11d6e654b3785a1dfce3a349b6acb00ac0db5bcc4
SHA256a63314c43863063c611ccfdd3c74920069fc46f81074d9407d6a07b57f9df29c
SHA5128329825bb70a5509e355dfe598cfffcfe406a3feeff7b65105f6eda584a774ff32060fd583ccd61b9f6cc7e8a25209b18ed66dcfaae8a29242ad8782731671b2
-
Filesize
232KB
MD59603aa9385fa9750bfe01897e72a9bc4
SHA111843dcd6c4a7a8e89d05e8ba32527e7df917dcb
SHA2560ac7fd0a53773551822b398eba2ff2cd81b1a8f84b68c98eb37cdfb8d2d38855
SHA5120b1b10bddea2b7ddc993ae38ff86fc35d7709f44fbabfcc50f2dc66d7a941288d3481b2941aabffbb4dcbfd8965b2079732ccccc2c25e45700d51b4b20ca3447