Analysis
-
max time kernel
94s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 09:51
Behavioral task
behavioral1
Sample
f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe
Resource
win10v2004-20241007-en
General
-
Target
f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe
-
Size
232KB
-
MD5
0df1b74ab909356f534e569e61104133
-
SHA1
c3c2bf0fd752c69879cf7c54d9fb165fd2af957f
-
SHA256
f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c
-
SHA512
949dc1d673f809555935e8ad522a83a0ca3ad033bc62f8c3f42605d13c93daedb92f4641ab007f7b9ceca5dc66a2aff7a8db06f6d14b4be9a3bff906121f7fcb
-
SSDEEP
3072:kI1i/NU8bOMYcYYcmy5cU+gTn6HOjDhWrzvvQwlgO5s1i/NU82OMYcYYamv5bG:Xi/NjO5YBgegD0PHzSni/N+O7v
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe File created C:\WINDOWS\SysWOW64\qx.bat f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 3216 cmd.exe 4836 cmd.exe 1680 cmd.exe 2264 cmd.exe 4944 cmd.exe 2464 cmd.exe 388 cmd.exe -
resource yara_rule behavioral2/memory/384-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0007000000023c9b-12.dat upx behavioral2/files/0x0007000000023c9c-18.dat upx behavioral2/memory/384-20-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe File opened for modification C:\WINDOWS\windows.exe f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31144552" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ab44cbc7ac5e824ba8748f8001f100a100000000020000000000106600000001000020000000480e4a58fa23a949d9c447d292d01a4a6cd67f37ede288afba96c0d714dc2327000000000e8000000002000020000000d2264a98bf6c033dc5e3269b7cda175ecdb6fcfdf7ce8d47e32e5c7ccb3fccd320000000f45c16d5685cd00db3b1161b81e86f9f38d2a6d2cee140f0f342d670a07665e5400000009a3a7ff03e375203685a0f98e6c51687dc14e15a5926dd8360d920ea01bea6931644408fd49c6b3148dbc6d67547e029cd79b3d151d54ae5dad2ff5dd3f2b05d IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31144552" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{DE1603E8-A65B-11EF-9361-4A034D48373C} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2994860415" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2994860415" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c73fb4683adb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3004235208" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ab44cbc7ac5e824ba8748f8001f100a1000000000200000000001066000000010000200000005d6e330c4f1b29849b54f91d3506dac0058e1704dc7e5c040f18de089dde07fb000000000e800000000200002000000059d91b92f7266e8715128f3d79503f408996b16c5854deb90e8a1e87d15ec35e200000001cb6c562e1952cb28b575a5fed2550a08c52122a5d987ae1282cc6e773d167bd400000004c16bce1513f71c503608e561a09fcbfe029c8702566c2282723c281d3bda0af870f2956d6255cc248a1c24440385e8e4896fb58797da7155ba2b3b75b2b5468 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f74db4683adb01 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438774872" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31144552" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1020 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 1020 IEXPLORE.EXE 1020 IEXPLORE.EXE 180 IEXPLORE.EXE 180 IEXPLORE.EXE 180 IEXPLORE.EXE 180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 384 wrote to memory of 1020 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 84 PID 384 wrote to memory of 1020 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 84 PID 1020 wrote to memory of 180 1020 IEXPLORE.EXE 85 PID 1020 wrote to memory of 180 1020 IEXPLORE.EXE 85 PID 1020 wrote to memory of 180 1020 IEXPLORE.EXE 85 PID 384 wrote to memory of 1164 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 86 PID 384 wrote to memory of 1164 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 86 PID 384 wrote to memory of 2264 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 87 PID 384 wrote to memory of 2264 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 87 PID 384 wrote to memory of 2264 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 87 PID 2264 wrote to memory of 4304 2264 cmd.exe 89 PID 2264 wrote to memory of 4304 2264 cmd.exe 89 PID 2264 wrote to memory of 4304 2264 cmd.exe 89 PID 384 wrote to memory of 4944 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 91 PID 384 wrote to memory of 4944 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 91 PID 384 wrote to memory of 4944 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 91 PID 4944 wrote to memory of 3420 4944 cmd.exe 93 PID 4944 wrote to memory of 3420 4944 cmd.exe 93 PID 4944 wrote to memory of 3420 4944 cmd.exe 93 PID 384 wrote to memory of 2464 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 94 PID 384 wrote to memory of 2464 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 94 PID 384 wrote to memory of 2464 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 94 PID 2464 wrote to memory of 3672 2464 cmd.exe 96 PID 2464 wrote to memory of 3672 2464 cmd.exe 96 PID 2464 wrote to memory of 3672 2464 cmd.exe 96 PID 384 wrote to memory of 388 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 97 PID 384 wrote to memory of 388 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 97 PID 384 wrote to memory of 388 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 97 PID 388 wrote to memory of 2712 388 cmd.exe 99 PID 388 wrote to memory of 2712 388 cmd.exe 99 PID 388 wrote to memory of 2712 388 cmd.exe 99 PID 384 wrote to memory of 3216 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 100 PID 384 wrote to memory of 3216 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 100 PID 384 wrote to memory of 3216 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 100 PID 3216 wrote to memory of 832 3216 cmd.exe 102 PID 3216 wrote to memory of 832 3216 cmd.exe 102 PID 3216 wrote to memory of 832 3216 cmd.exe 102 PID 384 wrote to memory of 4836 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 103 PID 384 wrote to memory of 4836 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 103 PID 384 wrote to memory of 4836 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 103 PID 4836 wrote to memory of 4056 4836 cmd.exe 105 PID 4836 wrote to memory of 4056 4836 cmd.exe 105 PID 4836 wrote to memory of 4056 4836 cmd.exe 105 PID 384 wrote to memory of 1680 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 106 PID 384 wrote to memory of 1680 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 106 PID 384 wrote to memory of 1680 384 f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe 106 PID 1680 wrote to memory of 4604 1680 cmd.exe 108 PID 1680 wrote to memory of 4604 1680 cmd.exe 108 PID 1680 wrote to memory of 4604 1680 cmd.exe 108 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 3672 attrib.exe 2712 attrib.exe 832 attrib.exe 4056 attrib.exe 4604 attrib.exe 4304 attrib.exe 3420 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe"C:\Users\Admin\AppData\Local\Temp\f148e772562925524a8a42764076cb32bd2bd1bad7fa5f1d7bca9206a9bb098c.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1020 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:180
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
PID:1164
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4304
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3420
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3672
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:832
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4056
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5cdfebcd84ff934bb577a1d3a07a3ccad
SHA15092f452374bb3943b00cf53bcad7a92215bae87
SHA2567f877563622aeda07395133fb7c81746df3389c360549e2309c161c8a394d9bf
SHA512605a455017dc67d6257a5b434ce9a8df8fbac30dcf6e45856c823ee9998f4008ae08947129a23d88c222c866a06192c2e75374880fe8b67d591816492ae4f56b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5e6e6488c4243af5b8451ac9ade28cda3
SHA1438f271a73bbad4c0da9deb6aa0d6a71d96b11a3
SHA2567494ac3b81d5ca6be574d22742b367611ad8cb82ff5371df7c1d1455809132c3
SHA512bc084ff1172f407d00411ce7ac9bcdef8bf571e7de179c8913965944ac20c3384a4241ffa82ac25dfe9cfeeff2f09aab21d870149769a992e617c20f61afce04
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
232KB
MD5f70c78a551b99546e45a4e29ec49c688
SHA1d19739ded3ce2c645ea94cefa3d333ac7e282785
SHA256e45faa9eb856df24b5bcb980f72b396c4fdb7dee6a751deb5b27aff2e6160a4e
SHA512eeabedb0889b4f0ecc5e7b0c56e30f262465614e6483426d2d65381668e0e8de2eb6454b717ebf8bf2644092039ac6aee744eafec2869da79a13ff0e14e433ba
-
Filesize
232KB
MD5faced2cfafee4bc557c1864c06222bc3
SHA137a8077225a15c24159f16d22baef47e7a62be06
SHA25668e4efe8e1c1b1f294529c83b5328ee3a1d09b801bd80adef97ceb960bb8cbf2
SHA51257fc34e300760bc55794b60b20331c906d816c05d12aebd850fcdf31aa195f079de648218917644990d273bed59d18cefd7d63aabb2355bb8319398b91358fdd