Analysis
-
max time kernel
94s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:22
Behavioral task
behavioral1
Sample
06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe
Resource
win10v2004-20241007-en
General
-
Target
06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe
-
Size
232KB
-
MD5
0ed277310e367991b64e788411ce96e0
-
SHA1
565f8c4150c6eb644235555d2831fe540e6ddc20
-
SHA256
06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70
-
SHA512
8876f9bea29b58f4ff3d4d57f781a5072f81f3ff64a911b02777693cf4116536d99e09f2e4a0e24b5d231ad6e90b4f55db7a4d82b3e58030a56bc24c3aae0587
-
SSDEEP
3072:SI1i/NU8bOMYcYYcmy5cU+gTn6HOjDhWrzvvQwlgO5s1i/NU82OMYcYYamv5bm:hi/NjO5YBgegD0PHzSni/N+O7f
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe File created C:\WINDOWS\SysWOW64\qx.bat 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 2588 cmd.exe 1840 cmd.exe 3172 cmd.exe 804 cmd.exe 2288 cmd.exe 1756 cmd.exe 4220 cmd.exe -
resource yara_rule behavioral2/memory/448-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x000a000000023b96-10.dat upx behavioral2/files/0x000a000000023b97-13.dat upx behavioral2/memory/448-20-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe File opened for modification C:\WINDOWS\windows.exe 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a151198040e7724fb4d08b878b3ceba800000000020000000000106600000001000020000000a55ab8ef9376ffb122c2b0c37ca841ef05150bd63b2300c042f27a9e758f7772000000000e8000000002000020000000957fffbb14f4c4350d23361e55a28628e1f08f739fbc57b3c377f85a5d3babf22000000022cae2761d9bcca952158c8a97b1db523e43389d5a2fd06cf0e62e4e74586da7400000004608b948433315a5ce403df68d05adfa04736b82ea5300114371696d0163cb0545023572631b263082446467e3150933dc947050a4f4ca4eabc70750b80481b1 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d033de66e66bdb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31157222" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "444216467" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31157222" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a151198040e7724fb4d08b878b3ceba800000000020000000000106600000001000020000000a0f7c5919a6bf0b8a2364f23ecfcbcb990be5c10be06d6be388fea24249eccb0000000000e80000000020000200000007ec07ac3c9bf79e8b7842f4fae74ca6d2b7866fb0a9f84852eb68b743a6d631820000000ab19786938d501a76148da72948c12f5f733a25efa3553f08df4166c9217d83b40000000a745d0ca7c422b486466b05f43495dea9e3e3f01e8e6c8ae5bae43b1bcbe434bb3e6ca888528dad1935058fc1965eeccf9d579fc3eaa9b273161a589ab68afaf IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1715059440" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1716934672" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{91C1E444-D7D9-11EF-ADF2-5227CD58F2D9} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a9e766e66bdb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4972 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 4972 IEXPLORE.EXE 4972 IEXPLORE.EXE 5040 IEXPLORE.EXE 5040 IEXPLORE.EXE 5040 IEXPLORE.EXE 5040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 448 wrote to memory of 4972 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 82 PID 448 wrote to memory of 4972 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 82 PID 4972 wrote to memory of 5040 4972 IEXPLORE.EXE 83 PID 4972 wrote to memory of 5040 4972 IEXPLORE.EXE 83 PID 4972 wrote to memory of 5040 4972 IEXPLORE.EXE 83 PID 448 wrote to memory of 4820 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 84 PID 448 wrote to memory of 4820 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 84 PID 448 wrote to memory of 2588 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 85 PID 448 wrote to memory of 2588 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 85 PID 448 wrote to memory of 2588 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 85 PID 2588 wrote to memory of 1648 2588 cmd.exe 87 PID 2588 wrote to memory of 1648 2588 cmd.exe 87 PID 2588 wrote to memory of 1648 2588 cmd.exe 87 PID 448 wrote to memory of 1840 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 88 PID 448 wrote to memory of 1840 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 88 PID 448 wrote to memory of 1840 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 88 PID 1840 wrote to memory of 4740 1840 cmd.exe 90 PID 1840 wrote to memory of 4740 1840 cmd.exe 90 PID 1840 wrote to memory of 4740 1840 cmd.exe 90 PID 448 wrote to memory of 3172 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 91 PID 448 wrote to memory of 3172 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 91 PID 448 wrote to memory of 3172 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 91 PID 3172 wrote to memory of 3904 3172 cmd.exe 93 PID 3172 wrote to memory of 3904 3172 cmd.exe 93 PID 3172 wrote to memory of 3904 3172 cmd.exe 93 PID 448 wrote to memory of 804 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 94 PID 448 wrote to memory of 804 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 94 PID 448 wrote to memory of 804 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 94 PID 804 wrote to memory of 1736 804 cmd.exe 96 PID 804 wrote to memory of 1736 804 cmd.exe 96 PID 804 wrote to memory of 1736 804 cmd.exe 96 PID 448 wrote to memory of 2288 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 97 PID 448 wrote to memory of 2288 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 97 PID 448 wrote to memory of 2288 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 97 PID 2288 wrote to memory of 2008 2288 cmd.exe 99 PID 2288 wrote to memory of 2008 2288 cmd.exe 99 PID 2288 wrote to memory of 2008 2288 cmd.exe 99 PID 448 wrote to memory of 1756 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 100 PID 448 wrote to memory of 1756 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 100 PID 448 wrote to memory of 1756 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 100 PID 1756 wrote to memory of 4004 1756 cmd.exe 102 PID 1756 wrote to memory of 4004 1756 cmd.exe 102 PID 1756 wrote to memory of 4004 1756 cmd.exe 102 PID 448 wrote to memory of 4220 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 103 PID 448 wrote to memory of 4220 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 103 PID 448 wrote to memory of 4220 448 06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe 103 PID 4220 wrote to memory of 944 4220 cmd.exe 105 PID 4220 wrote to memory of 944 4220 cmd.exe 105 PID 4220 wrote to memory of 944 4220 cmd.exe 105 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 1648 attrib.exe 4740 attrib.exe 3904 attrib.exe 1736 attrib.exe 2008 attrib.exe 4004 attrib.exe 944 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe"C:\Users\Admin\AppData\Local\Temp\06b4cfefe89868c616cfe345b981d7843180a04652314227b2873ff639321e70N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4972 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5040
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
PID:4820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3904
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1736
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4004
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD50ada2095c461df5a751955aa41dd491e
SHA18366c54b31e1ddc8016aa22aab8c83f73c690810
SHA25680cd542688ed3a45669b53243c3f4922d6eb21a34d8dfeebc6c101484d3bac09
SHA512135991affe343d4358bb15a693effa7a6813d6715e555729d2aa04a98555e13fded55d3100a41a92a5beb57c68fbdacb199a3e66407944e37880b28d42d79e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD59da0ce09c048a8de12a86bc0dd65d2af
SHA1a6fb370bb5784fd486e04ed038750132973bd26e
SHA256198057791cdf3734ce133cc4858e5367bf783ddb5ca417310c5d2e52252ca5e8
SHA512cc3269a149190823e0c218ef75f5ae07290bbb4bad6cade499d8a869149e880087c19de1a0cecc7cb1fc46ee110770a12d20dacfc43c7fee268f18f84c67479e
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
232KB
MD5b95c6e76e2e8a8f85ca39937d0b8355c
SHA1f2137973723fb14afbd003586eb2a496c0d89075
SHA2568418230aa44560476ed0ffc8fa3724cab3b270b24bb2e69d7e2106c2b7ccff70
SHA5120499844975be9db0cce816568a8bea956a5226f73897303de78dfcae788f1404f44b72c98a799cc8cbc59c593746bcd44bd990bc221b290a71946b3df5c5d61f
-
Filesize
232KB
MD5d8d22c7c445f05477f103820aec5d824
SHA13d093048498bdb2cc972b01c672b28a10199fc03
SHA256b82cd0a685ef11bf90c2d863b1cbd212a31a7f805901a329705b1e6a50256a3e
SHA51201daa320e50f9f9d3d0912fd1f3379a3a164ee4c1e727c877381d55cb3f4f443342c863ddfd8aed73a196d5a8a1b9c6e930512fb94f27a245b551c7e37d20a1b