Analysis
-
max time kernel
103s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe
Resource
win10v2004-20241007-en
General
-
Target
4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe
-
Size
88KB
-
MD5
4f9f687f8df41907fa222314666007f0
-
SHA1
59609aeb105d132b352ad580e0edc6fc8b2aa38c
-
SHA256
4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63
-
SHA512
0017b1697e582684ab78da2fc870b1d303b5d74dfaee128cbe5730ba8b6c161c55cc9a412b151843c351271da5920872128d72319cbcc5936d38d05388d91942
-
SSDEEP
1536:8h7xsCKosi5pzjIcdRiTpqMGxs39h7xsCKosi5pzjIcdRiTpqMGxs3eO:8EhWbcpqI9EhWbcpqI/
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe\debugger = "ntsd -d" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\debugger = "ntsd -d" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\debugger = "ntsd -d" reg.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe " cmd.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\appletviewer.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jrunscript.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\outicon.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jjs.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\tnameserv.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pubs.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\serialver.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\klist.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\rmid.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jstatd.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Integration\Integrator.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmadminicon.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\policytool.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\unpack200.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\kinit.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\java.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\7-Zip\7z.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\klist.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\javah.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\orbd.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\wsimport.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\7-Zip\7zFM.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Internet Explorer\ielowutil.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\xjc.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\jjs.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0409-1000-0000000FF1CE}\misc.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\dbcicons.exe 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.txt cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe " cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open\Command cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe " cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open\Command cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe " cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.txt \ = " exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe " cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1560 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 84 PID 2144 wrote to memory of 1560 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 84 PID 2144 wrote to memory of 1560 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 84 PID 2144 wrote to memory of 2640 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 89 PID 2144 wrote to memory of 2640 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 89 PID 2144 wrote to memory of 2640 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 89 PID 2144 wrote to memory of 3416 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 90 PID 2144 wrote to memory of 3416 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 90 PID 2144 wrote to memory of 3416 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 90 PID 2144 wrote to memory of 2432 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 91 PID 2144 wrote to memory of 2432 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 91 PID 2144 wrote to memory of 2432 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 91 PID 2144 wrote to memory of 628 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 94 PID 2144 wrote to memory of 628 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 94 PID 2144 wrote to memory of 628 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 94 PID 2144 wrote to memory of 2832 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 95 PID 2144 wrote to memory of 2832 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 95 PID 2144 wrote to memory of 2832 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 95 PID 2144 wrote to memory of 4316 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 96 PID 2144 wrote to memory of 4316 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 96 PID 2144 wrote to memory of 4316 2144 4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe 96 PID 2640 wrote to memory of 1452 2640 cmd.exe 101 PID 2640 wrote to memory of 1452 2640 cmd.exe 101 PID 2640 wrote to memory of 1452 2640 cmd.exe 101 PID 2640 wrote to memory of 3456 2640 cmd.exe 102 PID 2640 wrote to memory of 3456 2640 cmd.exe 102 PID 2640 wrote to memory of 3456 2640 cmd.exe 102 PID 2640 wrote to memory of 1284 2640 cmd.exe 103 PID 2640 wrote to memory of 1284 2640 cmd.exe 103 PID 2640 wrote to memory of 1284 2640 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe"C:\Users\Admin\AppData\Local\Temp\4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\123.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\ZhuDongFangYu.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:1452
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\360tray.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:3456
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\taskmgr.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:1284
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c assoc .txt = exefile2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3416
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype comfile=C:\Users\Admin\AppData\Local\Temp\4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe2⤵
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2432
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype zipfile=C:\Users\Admin\AppData\Local\Temp\4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:628
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype jpgfile=C:\Users\Admin\AppData\Local\Temp\4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2832
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype txtfile=C:\Users\Admin\AppData\Local\Temp\4e7dc460dc9dfbdf1148b1833c3530c13b9d2fd4282e98e572f7e181af3a0b63N.exe2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443B
MD570170ba16a737a438223b88279dc6c85
SHA1cc066efa0fca9bc9f44013660dea6b28ddfd6a24
SHA256d3674f4b34a8ca8167160519aa5c66b6024eb09f4cb0c9278bc44370b0efec6a
SHA51237cc8c954544374d0a1ca4d012c9bd0b47781bc9bb8d0c15a8a95b9934893db3bedee867b984c20edabe54c39574abf7250de433aade6c0d544b8dd2c972c6da
-
Filesize
88KB
MD5135ef49b5da5ce86745d1f572f4fdb97
SHA1020bbe3c3e0ae0c563d2e52fa42ed05d34ad465d
SHA2562c1318117ac038c2aa54eea34a95f7cfd13a56c0c4ea57f19be42520ccf72525
SHA512d9dfccfcf0d6ccf05460f6a0a9717c19e4bcded3231cd746078f363ffc1a177fbc876e10d9b94c6472d533ab2cff92c1329869e4d3403493f47f983c4c61650e