Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10_x64 -
resource
win10v200410 -
submitted
17-04-2020 09:40
Static task
static1
Behavioral task
behavioral1
Sample
view_presentation_s1v.js
Resource
win7v200410
0 signatures
0 seconds
General
-
Target
view_presentation_s1v.js
-
Size
1.1MB
-
MD5
bec9e707404efce0517e706450067520
-
SHA1
4c146e386fcc547359eb6f5b9e8b1ebf8ca8d6e5
-
SHA256
b7eea25df9616cb260aede55526c4133e193e9459fcd32ba87abf446259ef811
-
SHA512
275a1982cce2edef38ff25d9e56661519f752b2c56838e5ebe44b67433290328afe23e2c301de2e0bbb75eabbe44817a3029fc844ff542e227b2d2c7df9d026b
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1720 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3588 PING.EXE -
Checks whether UAC is enabled 7 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1012152aad14d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006277417e0e384844bb6ae38577795032000000000200000000001066000000010000200000008c1d19ce5003753f451af6ef203b0fc5866b7d945aaa25eec6d3ea431cefbc6a000000000e8000000002000020000000293b72db0ed20c658c47337098cef1494bd57144a29435ff28221c3a4cc19bf720000000ecee3f8f73123940654b66c6762223909868708e45a52602b33ffb5bd0fbcde340000000b3e758e527d78ff0b04771d267b13847243880d65f20a4b887c11b712c18dae25778a88990257ec094eccbdc3c917163da558627edec344b39deee4bbbd122c6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DF59301-80A0-11EA-8133-4A0051343CE8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006277417e0e384844bb6ae3857779503200000000020000000000106600000001000020000000090a94a257b0782c91f36f186785906dfaa4f4b5a5a099eb2faa1063ebd227e8000000000e8000000002000020000000d2882fb18e88238a9a8d38176d96ac2a9341ac9ecb5ba622f66febfab5bc0cb1200000007d4814fb55c7188d9f9d1f0243a255ff0505b872ba7c7b3ec3987abcb62a4bc040000000d3574ac71c46adc7039ddeb7e869c3dfe1417fefd30ddcaf7e82f3583d6afa7c7857266f266aef24d2cd68d17e95717764a8b3d9f215d74997e3e9ddfcd47a0f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c37c3ead14d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2029e73fad14d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51903380-80A0-11EA-8133-4A0051343CE8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "644468073" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c1312aad14d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50250a41ad14d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30807213" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006277417e0e384844bb6ae385777950320000000002000000000010660000000100002000000029318d7bfe2b63de2d5071fe2ddb7374f2f681bd78aee251195623936db14818000000000e8000000002000020000000f12662ad53a233471f2880f0cc9e7bf0bb711c7985610d4b81d0a9980717fac520000000cfa4d0f7240fdc090b8a4026123847d0ecec2224294326bd2843498f81fb57b3400000001db417954d276ebd25bf54b5700a3add7799c29a5908e4e1e0bfc46838110ee754dcb6f0d589e2fa0e506860233733de72653bcc0d231486e7eff94fda667322 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "644468073" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60261d31ad14d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AFD0C83-80A0-11EA-8133-4A0051343CE8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30807213" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006277417e0e384844bb6ae38577795032000000000200000000001066000000010000200000008a1f4b0db24309b07fea27b0a9f59c46b608d4563c57bc8e677fe3e7dd63c7f3000000000e8000000002000020000000d80c3df7b2c9f0608d41bd74c84633be2d39b60daba32b39b051e866f8618a4220000000e739038de91b62102aea760ffd4603237230d7476c908e47e4fb98a63f71abb740000000ebb016efffb88fef711ea0163264f91ec160f4db76658544d169162dfdb0c9e4166fc3194da533a8fe9e840d2c6844a3b5630664ad454264f9e30530d1329128 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006277417e0e384844bb6ae3857779503200000000020000000000106600000001000020000000dd1b56b7b6a693bf6d7ba74892d514d7c7bc5f829d68d3dc67bb41a1165bcf43000000000e8000000002000020000000b9b59489c17001f0519180ad878d6271188e088295f898e34124339d8d8db33c20000000f593a6067037ceb540e3d7f8e528f29b15ab9627f4057c5b3ee8c186782c7bca40000000122381aadf6599ba4d85bd064c65d3532399e91a076ddf0ccc49f8c804e743a1036cc92d88eb42b927d5d96ca53646c4ae94e22e60f3545adf2dacf4c7be551d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006277417e0e384844bb6ae3857779503200000000020000000000106600000001000020000000eaca9be14cf8d86853442584a8902442781373f43fd9b2b0c0eac7aff76c3729000000000e800000000200002000000083cefa80ea201a9d81d24d5b92ec302e416bd1a031acff956a4b9986c9d50cb62000000009cd86aaeb960c48722c82ac8d38d8f0aaacd0c095c9c6b8d01e652ea7761b754000000067f4fc623352c0ee5746658a239d559b850f1e475f570c5f2e8216e97990d0a0a2c203eec2a6c1e94b21b88eb5952479d7115715662a6226c07c2e113082ece2 iexplore.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 3824 iexplore.exe 416 iexplore.exe 2100 iexplore.exe 2100 iexplore.exe 2100 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 183 IoCs
pid Process 400 powershell.exe 400 powershell.exe 400 powershell.exe 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE -
Makes http(s) request 11 IoCs
Contacts server via http/https, possibly for C2 communication.
description flow ioc HTTP URL 8 https://iecvlist.microsoft.com/ie11blocklist/1401746408/versionlist.xml HTTP URL 10 http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?967e74d844f40416 HTTP URL 5 http://f1.pipen.at/api1/Nioe9RYiisJwsLU8TPPWW2/sMDdtczGTp3Gu/cXBHBq8c/ljOsfqJ0e4YZNVy_2BDQqK_/2F8ZliFotX/Ls5Ge0FZwpyMBojon/hIaVxBAgMTSW/5HlTQpK_2Be/kKuJbliS7typ1i/c9fwsFiUFih3LzTEri_2F/t_2B0QwGkNv9YdKe/lgnBtEDKt2lqeef/IDODMnEKFj9gCitPsd/3vWLVDmDf/ooUPToFEkERV_2B97lRQ/F9LJUC2ZpHgLqwRlW_2/B0BOyOvkGl_2FQcolbIv_0/A_0DZrBUp2gtX/Af5Y_2FM/XoPcghL_2Bfu34PIDNpKcO_/2B5SPX7M/a1ady HTTP URL 26 http://f1.pipen.at/api1/_2BJMe6e/reLAcuLFjPZxCpCkqIUSk6w/soTd7s1mBX/oTC_2BJKY02z_2F04/C5nRu0CGtxa8/j_2BnFI747B/YqvJ86jLnsKPk8/nCNuIhqmWEOmK9261dR_2/FrsfWTSIpCiF1Gzm/CYumPrHHvpiiAfN/6hKWNujtyxTpY02cEo/wT6uq2H0C/NaBTHFFz8OA_2FXRonIh/_2BApY9zDbBruzNAomD/R9Iwc2ykb0_2FOrU_2Ba_2/BcLJ9b6QUFKA7/eFplSa3G/4k0iUUnCz99DDJMQ_0A_0D_/2Bp1yNf_2F/LWOE4kZY1q1zl91dP/6iX_2FhIDK1w/u62n4NDuVG4/_2FfbAXL3jeUq2/BgMFkOei/F61 HTTP URL 25 http://f1.pipen.at/favicon.ico HTTP URL 29 http://api10.dianer.at/jvassets/xI/t64.dat HTTP URL 12 http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D HTTP URL 22 http://f1.pipen.at/api1/gMiMau2KqRo9/cM7JG_2FrJ5/ZFPAkMplEeIvMY/wgXMZciiXlMLfP5WNdEWW/n1ye2zmEY1eZTMNm/JSovQEd5NfL_2Fb/nz7bspv2tAZCdvD2kF/_2FrNwVLH/WDtR_2FxbDwcqSz3EQc_/2BnSkmEuLo0_2BTWL_2/Fw20SyazQn0npHngMgL8Zg/9zvy1Wmpx2s4k/WOlt3TOH/NZiiUT3CkocM2Dsn34CIojA/O0afPxy2hK/B8EfgEBYzo6B7eA0x/A7hy_2FG8Rua/VGS1dcyj_0A/_0Dq7HmVx_2FJM/mj0okUNNsz7B5EJCKoW6X/V1MkRiq3qMbm9ic6/mcNmLyyQ2/XqRrWvFmn0bQ/6 HTTP URL 24 http://f1.pipen.at/favicon.ico HTTP URL 23 http://f1.pipen.at/api1/mcP_2B_2F_2B/_2F7CoUJBjf/PgYxiz3MceIPtK/5KmhDEVmZyTF4TNzbz_2F/WsQsjTsPtbXJf6nh/gQm4rFZ4E1qyfu5/4TVV8Efgefxoy3DrzI/aMR65dKZJ/NUZx1_2FdlHq1k14Hj8j/jyMF2qwzTh6FMtDCDga/nKXXTInDl03SVyGDtGD_2B/8QuFh47ttO_2B/8nHZDlbC/_2BkwMIk46lTKl1HucbcZXy/n_2Bf_2FQL/Dxa6T1vYOSj9J_2F6/RI8aFtcGHLbF/w3hRLZfZmVB/F9R3F_0A_0D_2B/qVhc7OpFCz6l_2B9zPRTP/E9VfuIjueIyNGRfI/z6FzzqK4bKP_2FD/M9AVcrXc7o/NnCVJ7Hh/K HTTP URL 30 http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?9e5a766a549ec20b -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 400 powershell.exe Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 3588 PING.EXE -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 400 set thread context of 2992 400 powershell.exe 57 PID 2992 set thread context of 3460 2992 Explorer.EXE 60 PID 2992 set thread context of 3004 2992 Explorer.EXE 92 PID 3004 set thread context of 3588 3004 cmd.exe 94 -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3600 wrote to memory of 3916 3600 wscript.exe 68 PID 3600 wrote to memory of 3916 3600 wscript.exe 68 PID 3916 wrote to memory of 1720 3916 regsvr32.exe 69 PID 3916 wrote to memory of 1720 3916 regsvr32.exe 69 PID 3916 wrote to memory of 1720 3916 regsvr32.exe 69 PID 3824 wrote to memory of 1804 3824 iexplore.exe 72 PID 3824 wrote to memory of 1804 3824 iexplore.exe 72 PID 3824 wrote to memory of 1804 3824 iexplore.exe 72 PID 416 wrote to memory of 808 416 iexplore.exe 76 PID 416 wrote to memory of 808 416 iexplore.exe 76 PID 416 wrote to memory of 808 416 iexplore.exe 76 PID 2100 wrote to memory of 2528 2100 iexplore.exe 82 PID 2100 wrote to memory of 2528 2100 iexplore.exe 82 PID 2100 wrote to memory of 2528 2100 iexplore.exe 82 PID 2100 wrote to memory of 3404 2100 iexplore.exe 83 PID 2100 wrote to memory of 3404 2100 iexplore.exe 83 PID 2100 wrote to memory of 3404 2100 iexplore.exe 83 PID 1144 wrote to memory of 400 1144 mshta.exe 86 PID 1144 wrote to memory of 400 1144 mshta.exe 86 PID 400 wrote to memory of 2396 400 powershell.exe 88 PID 400 wrote to memory of 2396 400 powershell.exe 88 PID 2396 wrote to memory of 3604 2396 csc.exe 89 PID 2396 wrote to memory of 3604 2396 csc.exe 89 PID 400 wrote to memory of 724 400 powershell.exe 90 PID 400 wrote to memory of 724 400 powershell.exe 90 PID 724 wrote to memory of 2132 724 csc.exe 91 PID 724 wrote to memory of 2132 724 csc.exe 91 PID 400 wrote to memory of 2992 400 powershell.exe 57 PID 400 wrote to memory of 2992 400 powershell.exe 57 PID 400 wrote to memory of 2992 400 powershell.exe 57 PID 2992 wrote to memory of 3460 2992 Explorer.EXE 60 PID 2992 wrote to memory of 3004 2992 Explorer.EXE 92 PID 2992 wrote to memory of 3004 2992 Explorer.EXE 92 PID 2992 wrote to memory of 3004 2992 Explorer.EXE 92 PID 2992 wrote to memory of 3460 2992 Explorer.EXE 60 PID 2992 wrote to memory of 3460 2992 Explorer.EXE 60 PID 2992 wrote to memory of 3004 2992 Explorer.EXE 92 PID 2992 wrote to memory of 3004 2992 Explorer.EXE 92 PID 3004 wrote to memory of 3588 3004 cmd.exe 94 -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 3824 iexplore.exe 3824 iexplore.exe 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 416 iexplore.exe 416 iexplore.exe 808 IEXPLORE.EXE 808 IEXPLORE.EXE 2100 iexplore.exe 2100 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2100 iexplore.exe 2100 iexplore.exe 3404 IEXPLORE.EXE 3404 IEXPLORE.EXE 2100 iexplore.exe 2100 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 400 powershell.exe 2992 Explorer.EXE 2992 Explorer.EXE 3004 cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:2992 -
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\view_presentation_s1v.js2⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\\HRLhUNI.txt3⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\regsvr32.exe-s C:\Users\Admin\AppData\Local\Temp\\HRLhUNI.txt4⤵
- Loads dropped DLL
PID:1720
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').RegRead('HKCU\\Software\\AppDataLow\\Software\\Microsoft\\786D016B-7752-6A8D-C12C-9B3E8520FF52\\Apdsprov'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\786D016B-7752-6A8D-C12C-9B3E8520FF52").Assioker))3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:400 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\akj4wkm0\akj4wkm0.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES792D.tmp" "c:\Users\Admin\AppData\Local\Temp\akj4wkm0\CSC983275562BD74D738E2C32E8918FE3.TMP"5⤵PID:3604
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\m1veewcm\m1veewcm.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7AA4.tmp" "c:\Users\Admin\AppData\Local\Temp\m1veewcm\CSC66323845D5C34D748CC7839B5A867745.TMP"5⤵PID:2132
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\HRLhUNI.txt"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:3004 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3588
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3460
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
PID:3824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3824 CREDAT:82945 /prefetch:22⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
PID:416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:416 CREDAT:82945 /prefetch:22⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:808
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:82945 /prefetch:22⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:82953 /prefetch:22⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3404
-