Analysis
-
max time kernel
120s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 00:33
Behavioral task
behavioral1
Sample
061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe
Resource
win10v2004-20241007-en
General
-
Target
061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe
-
Size
55KB
-
MD5
2f8d95766331a328e8b0c17a72bf71e1
-
SHA1
ebd0ee67b0ba3ab038c094201ae098205fba3651
-
SHA256
061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1
-
SHA512
93c4e507523ef72bddf33ba8bd225fd0d256c64d5b24d3aebadf8ccd64ccfe18d685125d9c90cfaccf09c2b12889126710906535a3d4c808d5fce00488bb5656
-
SSDEEP
1536:ehBZ1b9c409y1G1i35Bo01i/gcU8eVTOK/YqjYYamvbtb1:CZl2zoxV1i/NU82OMYcYYamv5b1
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe -
Drops file in System32 directory 2 IoCs
Processes:
061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exedescription ioc process File created C:\WINDOWS\SysWOW64\ie.bat 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe File created C:\WINDOWS\SysWOW64\qx.bat 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
Processes:
cmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 4532 cmd.exe 1496 cmd.exe 3540 cmd.exe 1288 cmd.exe 1588 cmd.exe 1100 cmd.exe 1124 cmd.exe -
Processes:
resource yara_rule behavioral2/memory/4480-0-0x0000000000400000-0x0000000000429000-memory.dmp upx C:\WINDOWS\windows.exe upx C:\system.exe upx behavioral2/memory/4480-20-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
Processes:
061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exeattrib.exedescription ioc process File created C:\WINDOWS\windows.exe 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe File opened for modification C:\WINDOWS\windows.exe 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeattrib.execmd.execmd.execmd.exeattrib.exeattrib.exe061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exeIEXPLORE.EXEattrib.exeattrib.exeattrib.execmd.exeattrib.execmd.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Processes:
IEXPLORE.EXEiexplore.exeIEXPLORE.EXE061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000086445aa8a430244a91c2b800ab210a51000000000200000000001066000000010000200000007017bd103ff97557d2e24031564b73ab2338a35cb9724474477bedf963f33c22000000000e80000000020000200000008fbf4d28259a3c810f9521055d459153c44acfa04ff2e3536efec98d6248c0cd20000000076311b53d2d212d8c978fd1e35352cee7fa97e58196a7ddbf46a40b54dba66f40000000a3f4c87ce2ec71409a61a3ba10522e28297a5759f64c7edb4280188cad798f8b7a9b5582a00607258cc8adc14b1bc52caa3e69e50433a279b43fbbe93af8862f IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2022FE99-AB8E-11EF-AEE2-DA61A5E71E4E} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31145882" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439346213" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4102225540" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31145882" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06c65f59a3fdb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000086445aa8a430244a91c2b800ab210a5100000000020000000000106600000001000020000000073cca1dee281ebf811f62b1596053212fb8ce638d8cb62b9585a54767a34392000000000e8000000002000020000000d37dee57a2793809e560cfb40d233901910ec22b2ea0e0995f2a23d44a1332642000000065229d11933813eb621166107cd5310981f26c381d26bef8e4af22430cc26b4740000000fa87ea63193cd7d26cf3d4c43098ede0bfcfa5bf90b6524c7b478901843526310ac8d06beb68437c46b05cc469037faecef8b3dd612d10c27e1c62148a4c5607 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31145882" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4105975740" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0986cf59a3fdb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4102225540" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exepid process 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 2260 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exeIEXPLORE.EXEIEXPLORE.EXEpid process 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 3588 IEXPLORE.EXE 3588 IEXPLORE.EXE 3588 IEXPLORE.EXE 3588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exeIEXPLORE.EXEcmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4480 wrote to memory of 2260 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe IEXPLORE.EXE PID 4480 wrote to memory of 2260 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe IEXPLORE.EXE PID 2260 wrote to memory of 3588 2260 IEXPLORE.EXE IEXPLORE.EXE PID 2260 wrote to memory of 3588 2260 IEXPLORE.EXE IEXPLORE.EXE PID 2260 wrote to memory of 3588 2260 IEXPLORE.EXE IEXPLORE.EXE PID 4480 wrote to memory of 3404 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe iexplore.exe PID 4480 wrote to memory of 3404 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe iexplore.exe PID 4480 wrote to memory of 4532 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 4532 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 4532 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4532 wrote to memory of 2076 4532 cmd.exe attrib.exe PID 4532 wrote to memory of 2076 4532 cmd.exe attrib.exe PID 4532 wrote to memory of 2076 4532 cmd.exe attrib.exe PID 4480 wrote to memory of 1496 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 1496 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 1496 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 1496 wrote to memory of 3048 1496 cmd.exe attrib.exe PID 1496 wrote to memory of 3048 1496 cmd.exe attrib.exe PID 1496 wrote to memory of 3048 1496 cmd.exe attrib.exe PID 4480 wrote to memory of 3540 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 3540 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 3540 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 3540 wrote to memory of 1564 3540 cmd.exe attrib.exe PID 3540 wrote to memory of 1564 3540 cmd.exe attrib.exe PID 3540 wrote to memory of 1564 3540 cmd.exe attrib.exe PID 4480 wrote to memory of 1288 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 1288 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 1288 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 1288 wrote to memory of 3684 1288 cmd.exe attrib.exe PID 1288 wrote to memory of 3684 1288 cmd.exe attrib.exe PID 1288 wrote to memory of 3684 1288 cmd.exe attrib.exe PID 4480 wrote to memory of 1588 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 1588 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 1588 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 1588 wrote to memory of 3464 1588 cmd.exe attrib.exe PID 1588 wrote to memory of 3464 1588 cmd.exe attrib.exe PID 1588 wrote to memory of 3464 1588 cmd.exe attrib.exe PID 4480 wrote to memory of 1100 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 1100 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 1100 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 1100 wrote to memory of 4640 1100 cmd.exe attrib.exe PID 1100 wrote to memory of 4640 1100 cmd.exe attrib.exe PID 1100 wrote to memory of 4640 1100 cmd.exe attrib.exe PID 4480 wrote to memory of 1124 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 1124 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 4480 wrote to memory of 1124 4480 061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe cmd.exe PID 1124 wrote to memory of 2440 1124 cmd.exe attrib.exe PID 1124 wrote to memory of 2440 1124 cmd.exe attrib.exe PID 1124 wrote to memory of 2440 1124 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 7 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 2440 attrib.exe 2076 attrib.exe 3048 attrib.exe 1564 attrib.exe 3684 attrib.exe 3464 attrib.exe 4640 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe"C:\Users\Admin\AppData\Local\Temp\061b2f3d2e90d31e660a96313af13f0c4b9ae9157cfe0b2276b05f318e7bfac1.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3588
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
PID:3404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3464
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2440
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5a6dfcf513cd338ab2640f399e560ba31
SHA1cbc6ea36eef4c8e6e8524b2aa220b9c0017a9145
SHA256fac20d9c0f5375b23b8932cb8ecb0839245962b4b2cd91924cfc0d9206e4fabf
SHA5127b2dc6f8ac8fc1503caa508e8efb767a99448c35ab4714c46c034536b4b7b9067b2bf3170798130fe5a9d2763f38308aba868ca301791d0abf60e169d17acd12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5eaede785be58b6c203d74eee60868a5a
SHA1be6046664567dfbfd27589ddda23ddf1964071bf
SHA2568c167b6b4de414adaf27036b9500545bd0fa2a76f8b8d71dc57e73b7b65dbc2b
SHA5123f623e05a65592f17a3ad52a5353323aa736a6af77c586c9ca73fd46fa277dd6ec1c8ed7d4d34d514b28d58d613478e5b7567cf38994a52157079a9033ff54bc
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
55KB
MD50d63604e7bba301c4b9478a7c5d5e75b
SHA11808bbea5792ada7a543f1e23a9be9d509dfbbc9
SHA2562f960d6d5023035ac784d2faaa5a553729b1d69d7ef1a272507ef8e4288ef64c
SHA512b93a925506f264a82fb08864653752590ad84bfcb2ed498f79796b0b80f20bec8cdf6ca8ba1e6dc2ca59cfe21dc48e1926cb82be0c699832551a9103cccd30c2
-
Filesize
55KB
MD5c6f60537c7be601ac974eef783d144b6
SHA1a29678d15b42c4a2b831942490591f66b34f7bf9
SHA256f32c9d270c86073a30b7ae958927dff55cb28d32cd65a7194d1773ca7b204415
SHA512804552216ff89a2fadca2a9e3e761d742b1009aee42311d966acbd5b92b365a8b8e095031bca24a42b55f1bfa3f01e4094152d0f562a7d5b223e24b58552a067