Analysis
-
max time kernel
94s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 00:20
Behavioral task
behavioral1
Sample
bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe
Resource
win10v2004-20241007-en
General
-
Target
bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe
-
Size
232KB
-
MD5
d7af2da7399318940640686b8754b800
-
SHA1
21edc3fbcf45bbd6281bad45410b06ed092a8407
-
SHA256
bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187a
-
SHA512
d7529e8150ea12e34022ebfd5a9d4204643cf4ef5df97c5b11bbfb0213241ef9a8a451e82abba41a47269bc10c1a2240497d4f2d1b244256b06683b603e07baf
-
SSDEEP
3072:rI1i/NU8bOMYcYYcmy5cU+gTn6HOjDhWrzvvQwlgO5s1i/NU82OMYcYYamv5b:ai/NjO5YBgegD0PHzSni/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe File created C:\WINDOWS\SysWOW64\qx.bat bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 2888 cmd.exe 2340 cmd.exe 2876 cmd.exe 2736 cmd.exe 1224 cmd.exe 3332 cmd.exe 1296 cmd.exe -
resource yara_rule behavioral2/memory/3676-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0008000000023c9a-10.dat upx behavioral2/files/0x0007000000023c9e-11.dat upx behavioral2/memory/3676-20-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\windows.exe attrib.exe File created C:\WINDOWS\windows.exe bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe File opened for modification C:\WINDOWS\windows.exe bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1724683654" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000013f787289f1be14e87be8dc204ff715d000000000200000000001066000000010000200000007ac0ec20582191648590f792f6f57de72ae72d4a47e5626fa544989c345f5246000000000e800000000200002000000089ab349bf3ad6e70043e939f6874327840ec1d762a8b0e3c2d15f3b62ca53e4b20000000a35e94f706144e997da658cb304f0bc3322fc26b3c5b2479314c043b1b37422e400000009d1c6be85671efdb8d2d1f536958105ef09025a19de3317afa33c525cfebbbbb11660f4e83b12fa9064d99d7ee83d3440753632918bfb611e64dac393a53282d IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31136426" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136426" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9267CF3A-869D-11EF-B319-4A034D48373C} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1728277437" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 505f9267aa1adb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Main bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1724683654" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136426" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000013f787289f1be14e87be8dc204ff715d0000000002000000000010660000000100002000000052a962bd62f3f7a04fa23a3ed57f79464636956646e5c70caf5e8a4bcafff52c000000000e8000000002000020000000a119d10d4bdf760006b02e0914ff19c530a6d3fb37334ccfe98d8838b9c678be20000000af469e19d7e6477e0043873909c8e49b91b40ecfbccaa036e6739f7a9c0ab4a240000000f8aa7d27075e650cb5864a68ef9ba6055dd2ae673d9a8bc967064d7a10cd30ed9428666ee03eaa7a27e24cbdd1090f760752ff0d4b3d79bfe73d648fc6a7bc7a IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408b9967aa1adb01 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435284654" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4800 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 4800 IEXPLORE.EXE 4800 IEXPLORE.EXE 4580 IEXPLORE.EXE 4580 IEXPLORE.EXE 4580 IEXPLORE.EXE 4580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 3676 wrote to memory of 4800 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 84 PID 3676 wrote to memory of 4800 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 84 PID 4800 wrote to memory of 4580 4800 IEXPLORE.EXE 86 PID 4800 wrote to memory of 4580 4800 IEXPLORE.EXE 86 PID 4800 wrote to memory of 4580 4800 IEXPLORE.EXE 86 PID 3676 wrote to memory of 4424 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 87 PID 3676 wrote to memory of 4424 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 87 PID 3676 wrote to memory of 2888 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 88 PID 3676 wrote to memory of 2888 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 88 PID 3676 wrote to memory of 2888 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 88 PID 2888 wrote to memory of 2868 2888 cmd.exe 90 PID 2888 wrote to memory of 2868 2888 cmd.exe 90 PID 2888 wrote to memory of 2868 2888 cmd.exe 90 PID 3676 wrote to memory of 2340 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 91 PID 3676 wrote to memory of 2340 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 91 PID 3676 wrote to memory of 2340 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 91 PID 2340 wrote to memory of 5060 2340 cmd.exe 93 PID 2340 wrote to memory of 5060 2340 cmd.exe 93 PID 2340 wrote to memory of 5060 2340 cmd.exe 93 PID 3676 wrote to memory of 2876 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 94 PID 3676 wrote to memory of 2876 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 94 PID 3676 wrote to memory of 2876 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 94 PID 2876 wrote to memory of 4028 2876 cmd.exe 97 PID 2876 wrote to memory of 4028 2876 cmd.exe 97 PID 2876 wrote to memory of 4028 2876 cmd.exe 97 PID 3676 wrote to memory of 2736 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 98 PID 3676 wrote to memory of 2736 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 98 PID 3676 wrote to memory of 2736 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 98 PID 2736 wrote to memory of 4788 2736 cmd.exe 100 PID 2736 wrote to memory of 4788 2736 cmd.exe 100 PID 2736 wrote to memory of 4788 2736 cmd.exe 100 PID 3676 wrote to memory of 1224 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 101 PID 3676 wrote to memory of 1224 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 101 PID 3676 wrote to memory of 1224 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 101 PID 1224 wrote to memory of 4960 1224 cmd.exe 103 PID 1224 wrote to memory of 4960 1224 cmd.exe 103 PID 1224 wrote to memory of 4960 1224 cmd.exe 103 PID 3676 wrote to memory of 3332 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 104 PID 3676 wrote to memory of 3332 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 104 PID 3676 wrote to memory of 3332 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 104 PID 3332 wrote to memory of 2720 3332 cmd.exe 106 PID 3332 wrote to memory of 2720 3332 cmd.exe 106 PID 3332 wrote to memory of 2720 3332 cmd.exe 106 PID 3676 wrote to memory of 1296 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 107 PID 3676 wrote to memory of 1296 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 107 PID 3676 wrote to memory of 1296 3676 bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe 107 PID 1296 wrote to memory of 1776 1296 cmd.exe 109 PID 1296 wrote to memory of 1776 1296 cmd.exe 109 PID 1296 wrote to memory of 1776 1296 cmd.exe 109 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 2868 attrib.exe 5060 attrib.exe 4028 attrib.exe 4788 attrib.exe 4960 attrib.exe 2720 attrib.exe 1776 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe"C:\Users\Admin\AppData\Local\Temp\bcfa564970a0050916701f60b133016506893fbce41edb6129be649d0624187aN.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4800 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4580
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
PID:4424
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4028
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4788
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4960
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
232KB
MD5c0735bb0c7e4b23df0486fd440942035
SHA153ebbd8597b22fb4de99811c66872a40b0dbb6cf
SHA256c046b3c471a95e85d25d737d728f22f4d09d3b64b745305543cab3fa7b18ece5
SHA51284dc1b04247a3b49b5b93055470c366803999abcacb32a82bb690ddfb13b6c623431b80a7674c4b38eaff1899726ace5620296727b04bf3ce759057f2c7fdf6d
-
Filesize
232KB
MD583bbdc321d65d1fa8218725b66eb37a4
SHA1b611ab0b717431d999cb7fe0ba430de1d8f0156e
SHA25698adfe511085c9f291dd9b769410cc71a6abfda8ffdf2ef3d8f1eaf21bf464a2
SHA5125f59b52143f93a41371538d79eb7336cb14eff5206a0afd253a9cb0f6dbf253a9340d37c7bc8fdc588028fa1b5b7daf059647c8994293ec929143b686f70cebc