Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/12/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
Resource
win10v2004-20241007-en
General
-
Target
MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
-
Size
5.3MB
-
MD5
fbd9ad001bb2719f574c0705c5de05fb
-
SHA1
d07e77a490ad677935ac8213b88237e94440e791
-
SHA256
f0031f9d7f25d4d29581879f62565a5a565995899adc60213f9e218147c78593
-
SHA512
5724e3f858ae7ea92ba4ce325f3f8f4b90ecc6d7c19476e2888c4b09f0913463191b977f71314300918cceb0a6ae0b80e29d3c70891e8aeb9314da233a929e96
-
SSDEEP
98304:oeZOuRuvqAgef1ndGaX6tJJQv2FKA75OpVclc02vDRZTEB:1ZOPNdo3u0jc02vVZoB
Malware Config
Signatures
-
Downloads MZ/PE file
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\1.txt nemu-downloader.exe -
Executes dropped EXE 7 IoCs
pid Process 2304 nemu-downloader.exe 2728 ColaBoxChecker.exe 2748 HyperVChecker.exe 2620 HyperVChecker.exe 1924 HyperVChecker.exe 2112 MuMuDownloader.exe 1960 7z.exe -
Loads dropped DLL 25 IoCs
pid Process 2084 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe 2304 nemu-downloader.exe 2304 nemu-downloader.exe 2304 nemu-downloader.exe 2304 nemu-downloader.exe 2304 nemu-downloader.exe 2728 ColaBoxChecker.exe 2728 ColaBoxChecker.exe 2304 nemu-downloader.exe 1872 Process not Found 2304 nemu-downloader.exe 1932 Process not Found 2304 nemu-downloader.exe 2812 Process not Found 2304 nemu-downloader.exe 2304 nemu-downloader.exe 2112 MuMuDownloader.exe 2112 MuMuDownloader.exe 2304 nemu-downloader.exe 2304 nemu-downloader.exe 2304 nemu-downloader.exe 2304 nemu-downloader.exe 1960 7z.exe 1960 7z.exe 1960 7z.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ColaBoxChecker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MuMuDownloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nemu-downloader.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\mumuplayer.com\Total = "29" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "77" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.mumuplayer.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "47" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\easebar.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.mumuplayer.com\ = "77" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\easebar.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\mumuplayer.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "29" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\mumuplayer.com\Total = "47" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\research.easebar.com\ = "11" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\easebar.com\Total = "11" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\mumuplayer.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "88" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9768C921-B457-11EF-ADF2-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.mumuplayer.com\ = "29" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\mumuplayer.com\Total = "77" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\research.easebar.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\research.easebar.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.mumuplayer.com\ = "47" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DOMStorage\easebar.com\Total = "0" IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde nemu-downloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 nemu-downloader.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2304 nemu-downloader.exe 2304 nemu-downloader.exe 2304 nemu-downloader.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1960 7z.exe Token: 35 1960 7z.exe Token: SeSecurityPrivilege 1960 7z.exe Token: SeSecurityPrivilege 1960 7z.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2304 2084 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe 30 PID 2084 wrote to memory of 2304 2084 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe 30 PID 2084 wrote to memory of 2304 2084 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe 30 PID 2084 wrote to memory of 2304 2084 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe 30 PID 2084 wrote to memory of 2304 2084 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe 30 PID 2084 wrote to memory of 2304 2084 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe 30 PID 2084 wrote to memory of 2304 2084 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe 30 PID 2304 wrote to memory of 2728 2304 nemu-downloader.exe 31 PID 2304 wrote to memory of 2728 2304 nemu-downloader.exe 31 PID 2304 wrote to memory of 2728 2304 nemu-downloader.exe 31 PID 2304 wrote to memory of 2728 2304 nemu-downloader.exe 31 PID 2304 wrote to memory of 2728 2304 nemu-downloader.exe 31 PID 2304 wrote to memory of 2728 2304 nemu-downloader.exe 31 PID 2304 wrote to memory of 2728 2304 nemu-downloader.exe 31 PID 2304 wrote to memory of 2748 2304 nemu-downloader.exe 34 PID 2304 wrote to memory of 2748 2304 nemu-downloader.exe 34 PID 2304 wrote to memory of 2748 2304 nemu-downloader.exe 34 PID 2304 wrote to memory of 2748 2304 nemu-downloader.exe 34 PID 2304 wrote to memory of 2620 2304 nemu-downloader.exe 36 PID 2304 wrote to memory of 2620 2304 nemu-downloader.exe 36 PID 2304 wrote to memory of 2620 2304 nemu-downloader.exe 36 PID 2304 wrote to memory of 2620 2304 nemu-downloader.exe 36 PID 2304 wrote to memory of 1924 2304 nemu-downloader.exe 38 PID 2304 wrote to memory of 1924 2304 nemu-downloader.exe 38 PID 2304 wrote to memory of 1924 2304 nemu-downloader.exe 38 PID 2304 wrote to memory of 1924 2304 nemu-downloader.exe 38 PID 2304 wrote to memory of 2112 2304 nemu-downloader.exe 41 PID 2304 wrote to memory of 2112 2304 nemu-downloader.exe 41 PID 2304 wrote to memory of 2112 2304 nemu-downloader.exe 41 PID 2304 wrote to memory of 2112 2304 nemu-downloader.exe 41 PID 2304 wrote to memory of 2112 2304 nemu-downloader.exe 41 PID 2304 wrote to memory of 2112 2304 nemu-downloader.exe 41 PID 2304 wrote to memory of 2112 2304 nemu-downloader.exe 41 PID 2304 wrote to memory of 2416 2304 nemu-downloader.exe 43 PID 2304 wrote to memory of 2416 2304 nemu-downloader.exe 43 PID 2304 wrote to memory of 2416 2304 nemu-downloader.exe 43 PID 2304 wrote to memory of 2416 2304 nemu-downloader.exe 43 PID 2304 wrote to memory of 1960 2304 nemu-downloader.exe 44 PID 2304 wrote to memory of 1960 2304 nemu-downloader.exe 44 PID 2304 wrote to memory of 1960 2304 nemu-downloader.exe 44 PID 2304 wrote to memory of 1960 2304 nemu-downloader.exe 44 PID 2304 wrote to memory of 1960 2304 nemu-downloader.exe 44 PID 2304 wrote to memory of 1960 2304 nemu-downloader.exe 44 PID 2304 wrote to memory of 1960 2304 nemu-downloader.exe 44 PID 2416 wrote to memory of 3052 2416 iexplore.exe 46 PID 2416 wrote to memory of 3052 2416 iexplore.exe 46 PID 2416 wrote to memory of 3052 2416 iexplore.exe 46 PID 2416 wrote to memory of 3052 2416 iexplore.exe 46 PID 2416 wrote to memory of 3052 2416 iexplore.exe 46 PID 2416 wrote to memory of 3052 2416 iexplore.exe 46 PID 2416 wrote to memory of 3052 2416 iexplore.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe"C:\Users\Admin\AppData\Local\Temp\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\7z696B4824\nemu-downloader.exeC:\Users\Admin\AppData\Local\Temp\7z696B4824\nemu-downloader.exe2⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\7z696B4824\ColaBoxChecker.exe"C:\Users\Admin\AppData\Local\Temp\7z696B4824\ColaBoxChecker.exe" checker /baseboard3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\7z696B4824\HyperVChecker.exe"C:\Users\Admin\AppData\Local\Temp\7z696B4824\HyperVChecker.exe"3⤵
- Executes dropped EXE
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\7z696B4824\HyperVChecker.exe"C:\Users\Admin\AppData\Local\Temp\7z696B4824\HyperVChecker.exe"3⤵
- Executes dropped EXE
PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\7z696B4824\HyperVChecker.exe"C:\Users\Admin\AppData\Local\Temp\7z696B4824\HyperVChecker.exe"3⤵
- Executes dropped EXE
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\7z696B4824\MuMuDownloader.exe"C:\Users\Admin\AppData\Local\Temp\7z696B4824\MuMuDownloader.exe" --log="C:\Users\Admin\AppData\Local\Temp\nemu-downloader-aria.log" --log-level=notice --check-certificate=false --enable-rpc=true --rpc-listen-port=49271 --continue --max-concurrent-downloads=10 --max-connection-per-server=5 --async-dns=false --file-allocation=prealloc --enable-mmap=true --connect-timeout=5 --rpc-max-request-size=1024M --stop-with-process=23043⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2112
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.mumuglobal.com/problem/q58/?lang=en3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
-
-
C:\Users\Admin\AppData\Local\Temp\7z696B4824\7z.exe"C:\Users\Admin\AppData\Local\Temp\7z696B4824\7z.exe" a -tzip "C:\Users\Admin\AppData\Local\Temp\nemux.zip" "C:\Users\Admin\AppData\Local\Temp\nemux"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a811f901bc3fdf5e2c4d3459cc305190
SHA1a7231991787dfd0a5f6d3228997b67e73d1b3a18
SHA25610cc69f4945b10194c42e02f1cb57ed5a88e34e62e799c5a22061758dc3d8b3b
SHA5125aa3ca91d23b881b2e83ae0ec9bf2e07d83ea458fdae693c32417d9ba9ab56e02833ba3228e1983c57071f249252617a70ea8b37ac44e972e2e444b52ff2985b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5d715f022fd78c7c273318e0517bf63
SHA1d1f564380b6351e50ed6c0af7e1c20df2bb6dba1
SHA256af8ff1466da24b11bcfe4c49d72079e3724d3d0b77639baeebd1c7911ffdb239
SHA51256e40749d7737c39ad58228a742fc4d4bb0f0ecd28ae125f39ccf0b8bc41d4c095ae83d640e75e8190db4147a9cb7c1f053ef38b598c5dc3f36e21e82bed28f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d452417c2cf39bc685f630ba8ca2d7
SHA1f8bcb993e6385df65162b43c00e186ef91c32689
SHA2561b1f75f341e85179401de71027eebaa381b94113cbdd095915f6c8de81468867
SHA5127e3ba958869861085145f5e04395a9daf0f3666771a16bea7bd6b094158d4a0ed9d8e300a0005d04efcc24ca91a549fa1c602b2ee5c0467176d4f1fa14f76240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d9d87bee6acfbf45f39ae5f390bbd7c
SHA15f06e3c0e26586ab27d26aea3faa9e46635cb6be
SHA256dd1bbccee98bcab064db0f78f2f6d78068161f27861f1a12462cae9c16b1b2b6
SHA51286b962d52b09a38731c89851e48ffee105812390a3258b751f1f4faa1122171e79aff4aedc59d910f5afc9132e4efeea95ed1b0c41ad67596505bc42e01eb32b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58715750256c003e8977cbbb41c85bae1
SHA1b8b19660ccf91d8de8065a7764588457cac0e406
SHA2566102736206732148f9d230cb568b18899ffe184c3c6729f6f64a5e892d12472e
SHA5125d5f446c75c2de1885814bacb9953abfdd38bdc24eceb637d9bf6524798956be8308f2e52ee0b84b06a9e505ae3880de0da90735de38477e76f21eb3684be0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58113942ef547eae7292ff1c09ea0bb2c
SHA14e253730492bacff3f73e7d12bdc274a8084adbc
SHA256b952689366e36f430eade4a65d12305675908f5a2d84c120d8acf29d983373ce
SHA51210fc516f5e29a8251715981044d7fb8432e4c23871632f7f7186524be3a102b07290cae04cc32c54658fbda00508a73641348d25cfc028e846213017a96fee41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5017a1ff09e8300d58a022d4507a399d3
SHA136ad3bf37ae0902564fd0c2befd96a011b92fada
SHA25674041c71dbeb0733484e7945942d912bf04fb37efe51449c382f2ca51e948290
SHA5124bd1bc95bbf25ffc2ca62dc586fbb3bedc8c7a8ead15bdbac7637861f77dcb57b6c8d47e7ac73e0d96f16c82bee9dc479015aa0c27bdb0f0d1309741c79b5f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5081c5c7e69f6b7c112dd5f76d1a4b87e
SHA1647ff96d0510874bdfa62cdead657e6aea8357cd
SHA2565d2a3044a77ffc7d4fc11c21a893f40cb7aa120b3f7d8e055a94bc41383a5ddb
SHA51216d4db5bec337d16b155aae6876ce2f8950fc5a68e06f4c69c2528d8a9fd3f3521dfcb71e7987a7e9ac9a42ada0dc8694ed7b33eb2c5e0da2e0aadaafb8d5012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56186d60b5852689fdb067d5a44a5dc17
SHA138bf18211678369492b92e342c2263495cfe2454
SHA25684c3f554265c223a531e63050f0816da864cf4f961c64570046e3b9cf1709bce
SHA5122d710067feab3bddf589e3dd042c2036f66523e86c8ed52cf5c4fcdb0dbcef1c04199f5fe325d41b27817fb09bbd6e6b061e8ac5703b041ae8074e947f292ea8
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
4KB
MD58897d6d60d42e684964d1d77a41c4f1a
SHA169ea479813a445a4ca307a8ac6e267b0af321752
SHA256ebb2f07b0d778fa16609b65a9fd06be6f4dce3933b776e872840af064558d67c
SHA512cf80db9a98a304e0b4b7059b836398518afd4e7114aa7d11faf9ceb43e955859dd150dfb19678b9a4e7a0f79931dbb973caba56700336db85bc9fb4ab63248d6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6V88JEY\favicon[1].ico
Filesize4KB
MD50a2fa5526c59410046bd70a40567a182
SHA1a559da1f8fa5b6251a8501c0de6a13c8531c97b2
SHA256d9755ec6572e7e8623faa5c75408fda859817c6cb0ab01b39114fbd200029b24
SHA512e51daa988d221d8251509b1b6904b126d51e9d095f95ac2b40a00bc614384823f7a1677bf810adadc8e703308cd0c21adf00b11791013950b49b443667ae4065
-
Filesize
292KB
MD597b382235264f18a53eff8e891997920
SHA1cc0f3ad9411f54f70a2b1a1705e24048b06ea65c
SHA256bf42783c293279c65b00e4f8b72be39e1cb0fcbe14d6679151b0d5e27fd8572d
SHA5121e780698dbc0963ccbd73976da6898b3c0dc4b4e655a80563585518abd37a1a5561a980d035123011213a83c76320de6c08541caa71bfd6582eb93ff57672a83
-
Filesize
4.0MB
MD5839708e3f96cf055436fa08d6205263c
SHA1a4579f8cb6b80fe3fd50099794f63eb51be3292f
SHA2561373c5d006a5dbcd9b86cfff9a37616f1245d1333c4adcefc7cd18926b98d752
SHA512ece67e031e06a0442d935e7d81d0eed57ae92b348b5d104423577478ce226e4a4bde834c54e31d33bfe6f574fb7798ba96886d9e8edb738edee6e7c9c43054cd
-
Filesize
117KB
MD5dbd84c6083e4badf4741d95ba3c9b5f8
SHA14a555adf8e0459bfd1145d9bd8d91b3fff94aad0
SHA2569ff467bc5a1c377102d25da9fa9c24dcc4375f456510f71584f0714fdfb2af39
SHA512fb5fe74f64254609e07d6642acf904562bb905cd7c14c6f85ba31bcdbaf06686c0586609ec4f5d2f8f55ff90334dcbb774a3a6e78df74bf1b1d0cd03dec21870
-
Filesize
114B
MD569454b24ac54d2da8544a93ca1561161
SHA1af3f673fe717ed68b4fbeedaa800b071abbfca8e
SHA25644cd60dfaf583725968853325c92f9f5c8fd9f5cf8f8ba852433b4c9c27c3b17
SHA51254f0a42ae7c666a528198cb163fa451c300afb3cc5032051432ed0efd0373ab540af55915137723e7df93d3d222d4dd72ed091dfdc0790e786745c78675632f5
-
Filesize
346B
MD5d00fb4c61a255b58ff09886c6c72461b
SHA14e4f7d7ae36f67a4d6fc8479f8400b3eb769e978
SHA25677dec4d79e1e844a2156f101defc0fc81c138a989e8ba1c722c58feb91b3cd4a
SHA5128494ab9fe0594f3ff7b0893ca3e25d6d0a706e546e92c5b662aa864affcefe5f9721a6a95f37f40cdacf39d27a23e2b3cd5dbca4d7b8909cd7c186209d4b46db
-
Filesize
509KB
MD5ecb43530caf9566c1b76d5af8d2097f1
SHA134562ada66cd1501fcb7411a1e1d86729fd7fdc0
SHA256a12381f97aee2d91568f44b23e866ccc99f0ae5e5961f318ed24b72f4f5da80a
SHA5124a243c0bc4dbaf892bee91ea7eff9e6a7732d3aa2df5bebd9a4bea2859a30a8511945ce3bb823f7ef921f2e1a98906fb676fce85f25fd5908646b3a2f5d02563
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
1.1MB
MD50ffa2bff9e56e6122aec80d3c1119d83
SHA109b7eb124b8c83469ae7de6447d1b8a7f5c98c61
SHA256609cba3a8704aa6f5e2623858402bc048de7198a3567a53183bf97de091a3e48
SHA51242522bf850156577de397e527b8515b1bf0bdeceb170efae71d87c39a25c72c155a2fec6a88b5c3ae443752046f8840cd8afac9c42ed7bcf67aeb9e78aeb5f2e
-
Filesize
5.7MB
MD52f3d77b4f587f956e9987598b0a218eb
SHA1c067432f3282438b367a10f6b0bc0466319e34e9
SHA2562f980c56d81f42ba47dc871a04406976dc490ded522131ce9a2e35c40ca8616e
SHA512a63afc6d708e3b974f147a2d27d90689d8743acd53d60ad0f81a3ab54dfa851d73bcb869d1e476035abc5e234479812730285c0826a2c3da62f39715e315f221
-
Filesize
3.2MB
MD5cdf8047ceae80d9cd9eb798a57bf6084
SHA18e7971401fada3099aed61849745fda37e1c0d32
SHA2561f01a9abac64fae72e0a253ad9ffe2d62cd2967c1c2bc90fb956ac446fe2b11e
SHA512ac366f38f39b935110192d1355147392ced5a21966cc22386804356dce24b2da7971a6a60d675689f93d74014d961bfb3b0c13cf06809b9f9feef580045e20dc