Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
5d215cf3550...7N.exe
windows7-x64
7d215cf3550...7N.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PROGRAMFI.../m.exe
windows7-x64
8$PROGRAMFI.../m.exe
windows10-2004-x64
8$PROGRAMFI...UL.exe
windows7-x64
6$PROGRAMFI...UL.exe
windows10-2004-x64
6$PROGRAMFI...xb.exe
windows7-x64
5$PROGRAMFI...xb.exe
windows10-2004-x64
5Hash-MD5֤.exe
windows7-x64
3Hash-MD5֤.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 22:24
Behavioral task
behavioral1
Sample
d215cf3550092e9833a3f540caca905b73460f9b0ea0f97637aea5301e9389f7N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d215cf3550092e9833a3f540caca905b73460f9b0ea0f97637aea5301e9389f7N.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PROGRAMFILES/Funshion Online/Funshion/m.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PROGRAMFILES/Funshion Online/Funshion/m.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PROGRAMFILES/Intel/yFMSUL.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PROGRAMFILES/Intel/yFMSUL.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PROGRAMFILES/Windows Media Player/jcxb.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PROGRAMFILES/Windows Media Player/jcxb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Hash-MD5֤.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Hash-MD5֤.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
uninst.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
uninst.exe
Resource
win10v2004-20241007-en
General
-
Target
$PROGRAMFILES/Funshion Online/Funshion/m.exe
-
Size
100KB
-
MD5
ffa9a7df6480ff67b5492f7a118e1b4b
-
SHA1
2fdd98953d7dbff5f027cdff4b34f33c90374101
-
SHA256
9f68c06375e0c5b624e81938ad8df51ea3053b7100c7e96adeee5e5207d2d5c3
-
SHA512
c90cac6640b7f104903003f3d2adfd7a64aea23e6465e951e155b5616b884b536227ba6b4d8be95bf9f788e607a098606c82e9925136e9397f7fe330f171fb60
-
SSDEEP
1536:WyZMSZFvknTePMZd4k4kJJM4Romu/5M7HVtfVt+gTXBUZ0qeUxVzef6i0lixG/HZ:xZMJnTeM4cJJM45DjVhDOZzxVayrrdZp
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3768 attrib.exe 2868 attrib.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Commdlg\ImagePath = "system\\COMMDLG.DRV" regedit.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral6/files/0x0007000000023cc6-28.dat acprotect -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation m.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4184 MediaCenter.exe -
Executes dropped EXE 1 IoCs
pid Process 4184 MediaCenter.exe -
Loads dropped DLL 1 IoCs
pid Process 3920 regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CE7C3CF0-4B15-11D1-ABED-709549C10000} regsvr32.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\userinit.bat m.exe File created C:\Windows\SysWOW64\IEHelper.dll m.exe File opened for modification C:\Windows\SysWOW64\GROUPPOLICY\MACHINE\SCRIPTS\SCRIPTS.INI cmd.exe File opened for modification C:\Windows\SysWOW64\GROUPPOLICY\MACHINE\SCRIPTS\SCRIPTS.INI attrib.exe File created C:\Windows\SysWOW64\GROUPPOLICY\MACHINE\SCRIPTS\SHUTDOWN\QWERT.BAT cmd.exe File opened for modification C:\Windows\SysWOW64\GROUPPOLICY\MACHINE\SCRIPTS\SHUTDOWN\QWERT.BAT attrib.exe File created C:\Windows\SysWOW64\userinit.vbs m.exe File opened for modification C:\Windows\SysWOW64\GROUPPOLICY\MACHINE\SCRIPTS attrib.exe File created C:\Windows\SysWOW64\GROUPPOLICY\MACHINE\SCRIPTS\SCRIPTS.INI cmd.exe File opened for modification C:\Windows\SysWOW64\GROUPPOLICY\MACHINE\SCRIPTS\SHUTDOWN\QWERT.BAT cmd.exe -
resource yara_rule behavioral6/files/0x0007000000023cc6-28.dat upx behavioral6/files/0x0007000000023cc9-58.dat upx behavioral6/memory/3920-164-0x0000000010000000-0x000000001001A000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\2.ico m.exe File created C:\Program Files (x86)\WindowsPlayer\Media\MediaCenter.exe m.exe -
Drops file in Windows directory 23 IoCs
description ioc Process File created C:\Windows\1 m.exe File created C:\Windows\2 m.exe File created C:\Windows\3 m.exe File created C:\Windows\¡¡¡¡ m.exe File created C:\Windows\KB924270.log m.exe File opened for modification C:\Windows\IEHelper m.exe File created C:\Windows\init.bat m.exe File opened for modification C:\Windows\System\COMMDLG.DRV m.exe File created C:\Windows\KB611568.log m.exe File opened for modification C:\Windows\¡¡ m.exe File created C:\Windows\Iesy1 m.exe File created C:\Windows\r m.exe File created C:\Windows\System\COMMDLG.DRV m.exe File opened for modification C:\Windows\r m.exe File created C:\Windows\¡¡ m.exe File created C:\Windows\KB611565.log m.exe File opened for modification C:\Windows\2 m.exe File opened for modification C:\Windows\3 m.exe File opened for modification C:\Windows\init.bat m.exe File opened for modification C:\Windows\Iesy1 m.exe File opened for modification C:\Windows\¡¡¡¡ m.exe File created C:\Windows\IEHelper m.exe File opened for modification C:\Windows\1 m.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main regedit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.135118.com/?index" regedit.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CE7C3CF0-4B15-11D1-ABED-709549C10000}\VersionIndependentProgID\ = "IEHlprObj.IEHlprObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ovfile\shell\open m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile\shell\open m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\omfile\shell\open\command\ = "C:\\Program Files (x86)\\internet explorer\\iexplore.exe" m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\omfile m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\omfile\shell m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.1\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib\Version = "1.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CE7C3CF0-4B15-11D1-ABED-709549C10000}\ = "IEHlprObj Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib\Version = "1.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ov\ = "ovfile" m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile\shell m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\ = "IEHlprObj Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer\ = "IEHlprObj.IEHlprObj.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\omfile\shell\open m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.om m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CE7C3CF0-4B15-11D1-ABED-709549C10000}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.1\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ovfile\shell m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile m.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CE7C3CF0-4B15-11D1-ABED-709549C10000}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CE7C3CF0-4B15-11D1-ABED-709549C10000}\ProgID\ = "IEHlprObj.IEHlprObj.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CE7C3CF0-4B15-11D1-ABED-709549C10000}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.1\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ovfile\shell\open\command m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ovfile m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.1\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CE7C3CF0-4B15-11D1-ABED-709549C10000} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\omfile\shell\open\command m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID\ = "{CE7C3CF0-4B15-11D1-ABED-709549C10000}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CE7C3CF0-4B15-11D1-ABED-709549C10000}\InprocServer32\ = "C:\\Windows\\SysWow64\\IEHelper.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.1\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ = "IIEHlprObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.om\ = "omfile" m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib\ = "{CE7C3CE2-4B15-11D1-ABED-709549C10000}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CE7C3CF0-4B15-11D1-ABED-709549C10000}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ov m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.oc\ = "ocfile" m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\ = "IIEHlprObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile\shell\open\command\ = "C:\\Program Files (x86)\\internet explorer\\iexplore.exe" m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.1\ = "IEHelper 1.01 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CE7C3CF0-4B15-11D1-ABED-709549C10000}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE7C3CE2-4B15-11D1-ABED-709549C10000}\1.1\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE7C3CEF-4B15-11D1-ABED-709549C10000}\TypeLib\ = "{CE7C3CE2-4B15-11D1-ABED-709549C10000}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ovfile\shell\open\command\ = "C:\\Program Files (x86)\\internet explorer\\iexplore.exe" m.exe -
Runs .reg file with regedit 3 IoCs
pid Process 1776 regedit.exe 1940 regedit.exe 448 regedit.exe -
Runs regedit.exe 1 IoCs
pid Process 1824 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4184 MediaCenter.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1524 wrote to memory of 1824 1524 m.exe 83 PID 1524 wrote to memory of 1824 1524 m.exe 83 PID 1524 wrote to memory of 1824 1524 m.exe 83 PID 1524 wrote to memory of 1712 1524 m.exe 86 PID 1524 wrote to memory of 1712 1524 m.exe 86 PID 1524 wrote to memory of 1712 1524 m.exe 86 PID 1524 wrote to memory of 4184 1524 m.exe 87 PID 1524 wrote to memory of 4184 1524 m.exe 87 PID 1524 wrote to memory of 4184 1524 m.exe 87 PID 1712 wrote to memory of 4612 1712 WScript.exe 89 PID 1712 wrote to memory of 4612 1712 WScript.exe 89 PID 1712 wrote to memory of 4612 1712 WScript.exe 89 PID 4612 wrote to memory of 1184 4612 cmd.exe 91 PID 4612 wrote to memory of 1184 4612 cmd.exe 91 PID 4612 wrote to memory of 1184 4612 cmd.exe 91 PID 4612 wrote to memory of 1852 4612 cmd.exe 92 PID 4612 wrote to memory of 1852 4612 cmd.exe 92 PID 4612 wrote to memory of 1852 4612 cmd.exe 92 PID 4612 wrote to memory of 3768 4612 cmd.exe 93 PID 4612 wrote to memory of 3768 4612 cmd.exe 93 PID 4612 wrote to memory of 3768 4612 cmd.exe 93 PID 4612 wrote to memory of 4884 4612 cmd.exe 94 PID 4612 wrote to memory of 4884 4612 cmd.exe 94 PID 4612 wrote to memory of 4884 4612 cmd.exe 94 PID 4612 wrote to memory of 3304 4612 cmd.exe 95 PID 4612 wrote to memory of 3304 4612 cmd.exe 95 PID 4612 wrote to memory of 3304 4612 cmd.exe 95 PID 4612 wrote to memory of 2868 4612 cmd.exe 96 PID 4612 wrote to memory of 2868 4612 cmd.exe 96 PID 4612 wrote to memory of 2868 4612 cmd.exe 96 PID 4612 wrote to memory of 1776 4612 cmd.exe 97 PID 4612 wrote to memory of 1776 4612 cmd.exe 97 PID 4612 wrote to memory of 1776 4612 cmd.exe 97 PID 4612 wrote to memory of 1940 4612 cmd.exe 98 PID 4612 wrote to memory of 1940 4612 cmd.exe 98 PID 4612 wrote to memory of 1940 4612 cmd.exe 98 PID 4612 wrote to memory of 448 4612 cmd.exe 99 PID 4612 wrote to memory of 448 4612 cmd.exe 99 PID 4612 wrote to memory of 448 4612 cmd.exe 99 PID 4612 wrote to memory of 3664 4612 cmd.exe 100 PID 4612 wrote to memory of 3664 4612 cmd.exe 100 PID 4612 wrote to memory of 3664 4612 cmd.exe 100 PID 4612 wrote to memory of 3920 4612 cmd.exe 101 PID 4612 wrote to memory of 3920 4612 cmd.exe 101 PID 4612 wrote to memory of 3920 4612 cmd.exe 101 -
Views/modifies file attributes 1 TTPs 5 IoCs
pid Process 1184 attrib.exe 1852 attrib.exe 3768 attrib.exe 3304 attrib.exe 2868 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Funshion Online\Funshion\m.exe"C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Funshion Online\Funshion\m.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\regedit.exeregedit.exe -s C:\Windows\r2⤵
- Sets service image path in registry
- System Location Discovery: System Language Discovery
- Runs regedit.exe
PID:1824
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SYSTEM32\userinit.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\WINDOWS\system32\userinit.bat" "3⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\attrib.exeATTRIB -R -H -S C:\Windows\SYSTEM32\GROUPPOLICY\MACHINE\SCRIPTS /S /D4⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1184
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB C:\Windows\SYSTEM32\GROUPPOLICY\MACHINE\SCRIPTS\SCRIPTS.INI -S -R -H4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1852
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB C:\Windows\SYSTEM32\GROUPPOLICY\MACHINE\SCRIPTS\SCRIPTS.INI +S +R +H4⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3768
-
-
C:\Windows\SysWOW64\gpupdate.exeGPUPDATE /FORCE4⤵
- System Location Discovery: System Language Discovery
PID:4884
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB C:\Windows\SYSTEM32\GROUPPOLICY\MACHINE\SCRIPTS\SHUTDOWN\QWERT.BAT -S -H -R4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3304
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB C:\Windows\SYSTEM32\GROUPPOLICY\MACHINE\SCRIPTS\SHUTDOWN\QWERT.BAT +S +H +R4⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2868
-
-
C:\Windows\SysWOW64\regedit.exeREGEDIT.EXE /S C:\Users\Admin\AppData\Local\Temp\SETIE.reg4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Runs .reg file with regedit
PID:1776
-
-
C:\Windows\SysWOW64\regedit.exeREGEDIT.EXE /S C:\Users\Admin\AppData\Local\Temp\HCMD.reg4⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1940
-
-
C:\Windows\SysWOW64\regedit.exeREGEDIT.EXE /S C:\Users\Admin\AppData\Local\Temp\IEqwert.reg4⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:448
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command" /v "" /d "C:\Program Files\Internet Explorer\IEXPLORE.EXE "http://www.135118.com/?index"" /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3664
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\SYSTEM32\REGSVR32.EXE /S C:\Windows\SYSTEM32\IEHelper.dll4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3920
-
-
-
-
C:\Program Files (x86)\WindowsPlayer\Media\MediaCenter.exe"C:\Program Files (x86)\WindowsPlayer\Media\MediaCenter.exe" C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Funshion Online\Funshion\m.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4184
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD547c714dd58ec8d0beaa1893bc94c30d8
SHA1aa1a06b7b0aea4a8f518bc1e92f53610bf5a3b2c
SHA256bfe09d763cb3d63ead982f1d0986d5105c1a0082dd494c8c4fbd2212ac377662
SHA5125ab074072b24adb17ce71b59521df2b68e5570863dae348c952e8e11ea2780781a73e5699a371b07f7baf704436478565687f72d5c18024e5ae30dd37eff8395
-
Filesize
267B
MD5cda2ea37e36f761b0b9e012ad8276d6d
SHA10e6c9063ba90f738a66d105eae33535eed4ba501
SHA256290589f13b16b02a7d5bc6716d1abd59e1de0a7e6dc1270264d9ecffa576a063
SHA5122106258417a3425c5c4802527a29a7c4a0290c785e6c0d8679e4afd6b73eb320ebb085450edc95c84b798c696b74577164d9565e2615c54537d7662d80498c3f
-
Filesize
40B
MD5d103d2ea528b2688dfa736cdf95d4c26
SHA111916b760f19dc805582d0ab6500a73087b68745
SHA2565acb839e4b05429aacc7fc33ba63a375a0532601d8b86317c8629979085b8ee1
SHA512923cb20b14005d04de83a50d13bb119770df5dd3322fe360906e172245139f4ff8ac56806382d31cee433366cba6b04cfa2cd79b4c79714269c7f4503b482102
-
Filesize
1KB
MD5bfb73618d22dab32c03e166c6cd97661
SHA1971999e1cbf40d080b57d54801a6ed6273c0eb02
SHA256d1e34cec5841b77cfe98f5046507feb25e5ab3151a48162a596bcaa6a80ab35e
SHA512bfed6b4364331f28e2f15e2531d90ba47b0449f99fb8a3d7a176dc9c8522e2cf266a638d1bbd21f11690be0bc75e618e6524e02991f8655094c97d98157e5b68
-
Filesize
150B
MD531800eb10f4806bdce38e1059acb7519
SHA17825de9e30a52b81a04c3f70d1cfaadfabfe580c
SHA25655474d27e7a0bb64014b87473bb245a6676f7fcb1a05c6a8f71b3375236ef6ee
SHA512677da3c07d20b850f69ec2b9da5ce24f26b2ebf45fd91e44a11d0fdedfbcff9682303bd0318792d938e57c200e77ca3b04e5c49e9b0c3d5d2f486c4a9e1e9d4b
-
Filesize
232B
MD5313d621b5b31449f6963bb238e26eb3d
SHA117351a27e4bbd3a2f12beba3934e7826696aa600
SHA2565039377073079bc30768fed03f6f4fb0630319d38483ed0fb378aa45ed0790d5
SHA5124cf20c956914f11f1bd4bca4ee7c4667f353bdce8ea6a63919039a925c98101054a57840c4a94c9b412575108e629880e6d4b692cb5944f1627ee2320a4597ea
-
Filesize
294B
MD5b3da6c958962a5d9ea13e8a67415680b
SHA1bdcb4a598f4782c6130d602cbd3a2d71ec98af35
SHA2568b23d79b96401a92548ca2adf1f3e8fda5371fc3c07937ac295617d8a65600bc
SHA51272818b870c61ed9060640cfad397ab9228f08f5c06c3f9a6b1b6d9b83e1c88788f2c7fd5e4725e091d8e7cf414e81a703d97ddd1decb0d12fd7cccc8e13f1835
-
Filesize
9KB
MD5f08f5e65141be235580b9b6784f9f78a
SHA19786b4e68a6a3d1377e066f0ee7703e71d129597
SHA256e53da24fa53cd24b98848eb45a59e95f7872717d5ec400061c89aece4498b282
SHA512ed99259a77da36e14da3a1163fdb9a677135f52cacd44a4a6268f6af63e5320aa67146d81abf7b41e67921a0961189f3f510a2b97e3196dcbea354de0982e772
-
Filesize
25KB
MD583669aebc401dac229a6644c62b5dfb6
SHA19904bb4e9e64c927f84777c3250fb37d33924e6d
SHA256ae4a1cce633ccd31d4605d46c8af308c99aae25355580662e941a3d3ec275f51
SHA512a6a276d5a517a383c99a56a37cdaa02de08b8f614b08ece1fe15db645a4f2808fe763f002f34435bb4b6398d73154a407b119813a89dc04e8bb43dc80ffb6de1
-
Filesize
25KB
MD5fe7c00acee71a7c95e0296b09eae86cf
SHA172788f2393cb6d870350386ba08155f22019336c
SHA25653d674c1f2997a7d80392301b450d256668591d52a4900c660c84615ad668617
SHA512a477821d1d39e8a3ca42b59e261a66f7ade8d99c370cee58c838413b36ee828bb1d61ed3bdcf5c6b5ebbedce3fe3fbde74a516e038b6625370fa1f4f56c44f8e
-
Filesize
3KB
MD5e6675b96beafa719b6789d1a7cf4a17a
SHA1be012f7f22c006edb44b7288c67308a4010030e6
SHA25660f7afa0df6805e5fed8f31943a3fd1f6cdca9638defee9f99b28cf549f5834c
SHA51208e7f07e0bd49d5779fc927e3f3c34f58845878a2e163a653153bd09beef1a612a6a2d1d042674652df16645452516a7fe392212953d0a3445dddad97950e36a
-
Filesize
103B
MD5d3d77f0ec0d0112582cedf5c61fd74c1
SHA1fe5c76f453f38597a231e3999c6d4c390a2977a9
SHA25629dc54b0d040e8c9dbca525f67e180bddbdc629c5fe8dae48d0af38f35f48c5a
SHA512d74788d539f6f4a134320d3c7570974d0d880d5d2eebad5d3ddc955bc1c9e570512a00175ea43f77bec678460fe3752b9045f1deebd4c3f9f8545b9793104dee
-
Filesize
5KB
MD5fe4840ece6f2045678545b8a4b9575a6
SHA19ec7bc018241cc4966e5668185d0c86c0777e100
SHA256b54eccc0323d725353df9afecf585dd565ae2be8112f0c6d8ae69c08d23ab3cc
SHA512967a228d71d35de15468d99d4f144675fdeb631c1bfca3c3aafbb8dd405dd8adfbd1cfc220ab2784594a870c8b57b43f73af4337e3d115083cbb95e9d0a6f079
-
Filesize
720B
MD51e4a364d62af7ca2e848641f96dfbd9e
SHA16cdc070edfc1311e745e81f154f1b5fc0036c3cc
SHA2566ba029de625ee359e9a92e5c6275aa64fa033f6bfd0ea82e1400b9fd9df46d3b
SHA512ae4f52dda7728e0f4b76368cde650d5afba955a95b85f7bcf11388b63b721a4d51a4eb1b266fb9d94179331e27e8e486b5407b40b47f168644717a59edabe6a0