Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 15:58
Static task
static1
Behavioral task
behavioral1
Sample
3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe
Resource
win10v2004-20241007-en
General
-
Target
3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe
-
Size
88KB
-
MD5
f8f8e566683c85b2ce5dbf81da8a7e80
-
SHA1
4dc331a0639837cf0c0ac980333b3e9ac77809fa
-
SHA256
3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396b
-
SHA512
2faa44bd897300fe881acd41be7863129f45c15474b6a79a3dd9e201d4602e9f5d2dcd67849e6e906abb64fb226800586d7ec9471d4cb21551e019d26e5889be
-
SSDEEP
1536:8h7xsCKosi5pzjIcdRiTpqMGxs3ph7xsCKosi5pzjIcdRiTpqMGxs30:8EhWbcpqIpEhWbcpqI0
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe\debugger = "ntsd -d" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\debugger = "ntsd -d" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\debugger = "ntsd -d" reg.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe " cmd.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\visicon.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\lyncicon.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\rmid.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pptico.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0409-1000-0000000FF1CE}\misc.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\XLICONS.EXE 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmadminicon.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Google\Chrome\Application\chrome_proxy.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\accicons.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pj11icon.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\extcheck.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\javah.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\xjc.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\xlicons.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\msouc.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\ktab.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\tnameserv.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\jp2launcher.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ink\mip.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\policytool.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\pack200.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\grv_icons.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\serialver.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Internet Explorer\ExtExport.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-040C-1000-0000000FF1CE}\misc.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jrunscript.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\keytool.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\policytool.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\orbd.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\misc.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\servertool.exe 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.txt \ = " exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe " cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.txt cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open\Command cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open\Command cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe " cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe " cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe " cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 180 wrote to memory of 1780 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 85 PID 180 wrote to memory of 1780 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 85 PID 180 wrote to memory of 1780 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 85 PID 180 wrote to memory of 4440 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 88 PID 180 wrote to memory of 4440 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 88 PID 180 wrote to memory of 4440 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 88 PID 180 wrote to memory of 3624 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 89 PID 180 wrote to memory of 3624 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 89 PID 180 wrote to memory of 3624 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 89 PID 180 wrote to memory of 1472 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 90 PID 180 wrote to memory of 1472 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 90 PID 180 wrote to memory of 1472 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 90 PID 180 wrote to memory of 4728 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 91 PID 180 wrote to memory of 4728 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 91 PID 180 wrote to memory of 4728 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 91 PID 180 wrote to memory of 2232 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 93 PID 180 wrote to memory of 2232 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 93 PID 180 wrote to memory of 2232 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 93 PID 180 wrote to memory of 1520 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 94 PID 180 wrote to memory of 1520 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 94 PID 180 wrote to memory of 1520 180 3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe 94 PID 4440 wrote to memory of 2888 4440 cmd.exe 100 PID 4440 wrote to memory of 2888 4440 cmd.exe 100 PID 4440 wrote to memory of 2888 4440 cmd.exe 100 PID 4440 wrote to memory of 3508 4440 cmd.exe 101 PID 4440 wrote to memory of 3508 4440 cmd.exe 101 PID 4440 wrote to memory of 3508 4440 cmd.exe 101 PID 4440 wrote to memory of 4276 4440 cmd.exe 102 PID 4440 wrote to memory of 4276 4440 cmd.exe 102 PID 4440 wrote to memory of 4276 4440 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe"C:\Users\Admin\AppData\Local\Temp\3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\123.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\ZhuDongFangYu.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\360tray.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:3508
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\taskmgr.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:4276
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c assoc .txt = exefile2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3624
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype comfile=C:\Users\Admin\AppData\Local\Temp\3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe2⤵
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1472
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype zipfile=C:\Users\Admin\AppData\Local\Temp\3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4728
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype jpgfile=C:\Users\Admin\AppData\Local\Temp\3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2232
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype txtfile=C:\Users\Admin\AppData\Local\Temp\3fbb40667e5d09c14bbe10d7d135990b9d5363b1b0bda00e4757eef2769d396bN.exe2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443B
MD570170ba16a737a438223b88279dc6c85
SHA1cc066efa0fca9bc9f44013660dea6b28ddfd6a24
SHA256d3674f4b34a8ca8167160519aa5c66b6024eb09f4cb0c9278bc44370b0efec6a
SHA51237cc8c954544374d0a1ca4d012c9bd0b47781bc9bb8d0c15a8a95b9934893db3bedee867b984c20edabe54c39574abf7250de433aade6c0d544b8dd2c972c6da
-
Filesize
88KB
MD5648ec86777682da2420458dd84db531e
SHA13440e957618c0afd47fd7b3982305ea3656cacca
SHA256337ce33e05dc80bcc40c391a3fde2eb6eff4dc9beb232ef0cb8f783cfc831fd8
SHA5125a482b51a4ed3d1602edceb0b96bbda3f594aedc43944aae401170042ee56eae14d890dfdfec86cc3a590ce55895b443ccd234244d22c0c9737f04c140e46fb4