Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
submitted
13-10-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe
Resource
win7-20240903-en
General
-
Target
1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe
-
Size
3.2MB
-
MD5
e4d2768a201f9bf4d7f29d4b5d035616
-
SHA1
4bdca388ee6e104c40b3b554e4220ccd14f25cf7
-
SHA256
1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327
-
SHA512
0f174972e64975ff3e8db25cafec8ba6c6bc6378424350e177751783afd528610ebf31cff032bd92259c582d659ff874a31b33398421906b590e84bac5b69486
-
SSDEEP
98304:BZJt4HINy2Lkknynsmtk2aMIH2+WQMDOemzYSZ:ziINy2Lkkn8LTw2nQ2cfZ
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3188-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3188-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3188-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4900-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4900-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4900-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4900-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2132-32-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2132-41-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2132-68-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/3188-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3188-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3188-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4900-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4900-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4900-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4900-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2132-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2132-41-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2132-68-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Xred family
-
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
._cache_HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe._cache_Synaptics.exeHD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exeSynaptics.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ._cache_HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 9 IoCs
Processes:
RVN.exeTXPlatforn.exeHD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exeTXPlatforn.exe._cache_HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exeSynaptics.exeLOL查号器.exe._cache_Synaptics.exeLOL查号器.exepid Process 3188 RVN.exe 4900 TXPlatforn.exe 1932 HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 2132 TXPlatforn.exe 1172 ._cache_HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 3772 Synaptics.exe 892 LOL查号器.exe 3080 ._cache_Synaptics.exe 1876 LOL查号器.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe -
Drops file in System32 directory 2 IoCs
Processes:
RVN.exedescription ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
Processes:
resource yara_rule behavioral2/memory/3188-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3188-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3188-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3188-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4900-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4900-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4900-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4900-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4900-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2132-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2132-41-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2132-68-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
Processes:
1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exedescription ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
LOL查号器.exeRVN.exeHD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exePING.EXE._cache_Synaptics.exeSynaptics.exeLOL查号器.exe1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exeTXPlatforn.execmd.exe._cache_HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LOL查号器.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RVN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LOL查号器.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEcmd.exepid Process 972 PING.EXE 760 cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
Synaptics.exeHD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 1108 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exepid Process 3392 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 3392 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid Process 2132 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
RVN.exeTXPlatforn.exedescription pid Process Token: SeIncBasePriorityPrivilege 3188 RVN.exe Token: SeLoadDriverPrivilege 2132 TXPlatforn.exe Token: 33 2132 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2132 TXPlatforn.exe Token: 33 2132 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2132 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exeLOL查号器.exeEXCEL.EXELOL查号器.exepid Process 3392 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 3392 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 892 LOL查号器.exe 892 LOL查号器.exe 1108 EXCEL.EXE 1876 LOL查号器.exe 1876 LOL查号器.exe 1108 EXCEL.EXE 1108 EXCEL.EXE 1108 EXCEL.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exeRVN.exeTXPlatforn.execmd.exeHD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe._cache_HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exeSynaptics.exe._cache_Synaptics.exedescription pid Process procid_target PID 3392 wrote to memory of 3188 3392 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 84 PID 3392 wrote to memory of 3188 3392 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 84 PID 3392 wrote to memory of 3188 3392 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 84 PID 3188 wrote to memory of 760 3188 RVN.exe 87 PID 3188 wrote to memory of 760 3188 RVN.exe 87 PID 3188 wrote to memory of 760 3188 RVN.exe 87 PID 3392 wrote to memory of 1932 3392 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 88 PID 3392 wrote to memory of 1932 3392 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 88 PID 3392 wrote to memory of 1932 3392 1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 88 PID 4900 wrote to memory of 2132 4900 TXPlatforn.exe 89 PID 4900 wrote to memory of 2132 4900 TXPlatforn.exe 89 PID 4900 wrote to memory of 2132 4900 TXPlatforn.exe 89 PID 760 wrote to memory of 972 760 cmd.exe 92 PID 760 wrote to memory of 972 760 cmd.exe 92 PID 760 wrote to memory of 972 760 cmd.exe 92 PID 1932 wrote to memory of 1172 1932 HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 93 PID 1932 wrote to memory of 1172 1932 HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 93 PID 1932 wrote to memory of 1172 1932 HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 93 PID 1932 wrote to memory of 3772 1932 HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 94 PID 1932 wrote to memory of 3772 1932 HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 94 PID 1932 wrote to memory of 3772 1932 HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 94 PID 1172 wrote to memory of 892 1172 ._cache_HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 95 PID 1172 wrote to memory of 892 1172 ._cache_HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 95 PID 1172 wrote to memory of 892 1172 ._cache_HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe 95 PID 3772 wrote to memory of 3080 3772 Synaptics.exe 97 PID 3772 wrote to memory of 3080 3772 Synaptics.exe 97 PID 3772 wrote to memory of 3080 3772 Synaptics.exe 97 PID 3080 wrote to memory of 1876 3080 ._cache_Synaptics.exe 99 PID 3080 wrote to memory of 1876 3080 ._cache_Synaptics.exe 99 PID 3080 wrote to memory of 1876 3080 ._cache_Synaptics.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe"C:\Users\Admin\AppData\Local\Temp\1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exeC:\Users\Admin\AppData\Local\Temp\HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\LOL查号器.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\LOL查号器.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:892
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\LOL查号器.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\LOL查号器.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1876
-
-
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1108
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe
Filesize1.3MB
MD5cdffc31376f124a39d41390cfe458b0d
SHA1f049f377a4730520c97cf05e98f39cce261c9eeb
SHA25601aaedd32aa085bf75f7fcff89b1b9fc581c3382b2225fe57fa725adf1b94c40
SHA512672d2094967191162a31dd19e754a9ed4cd8435d903bf4edfd40d382b52b15b47a05e38eec075ee62ca09b49c4e367573985742c0030f46674e02da58011deab
-
C:\Users\Admin\AppData\Local\Temp\HD_1adcf2e4d8d4d2c6444f74992f8e181b42139854e62774fae39b711b27a47327.exe
Filesize2.0MB
MD548ba244660eab76672b9fa2aa354528f
SHA1d1a4a7fef67c2902f26f39dd5bcc53771d1210a9
SHA256c62f85d0a38cf1bbc6742efc58af647d9766e5691b9053101601ba1403d09a57
SHA512ac0fdec307a22b1e550e4fd162d804bfd80b21720522fc9f96a45896afc489bc5e362cfed356b21bbcaca46060e180a96e03a904b7da590179a1da673e5615fd
-
Filesize
1.2MB
MD513835e21b77e957c9f933e9ed0644155
SHA1e35107cf2aaa3c877d97a42cf010744f8a7289a7
SHA2569cabb295158ed06668f19465ec9ffc01b5649eb64518b4dffc2d7a086e561b32
SHA51275e6bca863c9478ad1cc4c58130d78f4b96a05fef44f95a4eaa8279db144ef3c532fa5803d6126705879354d7d690c4ad6078c7d8763c5835a4dfef0a517b204
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4
-
Filesize
940KB
MD5a770e92df03ce95b430eed3397965d0b
SHA13c05da58cf79e1bba554480ecea7e91dfbdf4593
SHA256f0a4b8c5f6b07d3e1089a667502c58f7d76c3fbcfe22019e99d8efd1bab86072
SHA51227b302d2139f52924acb5d1aaba406c7cb2c1182c1072809942b26f419fdaa26b0e901593c5bc96524d7936e09a4c6e4ebe5d0dd3fc3379df07d6b57746206da