Analysis
-
max time kernel
125s -
max time network
69s -
platform
windows7_x64 -
resource
win7v200410 -
submitted
17-04-2020 22:23
Static task
static1
Behavioral task
behavioral1
Sample
job_attach_h6x.js
Resource
win7v200410
windows7_x64
0 signatures
0 seconds
General
-
Target
job_attach_h6x.js
-
Size
1.3MB
-
MD5
c9a6a820f7d344bfd42471b9964049a8
-
SHA1
bdc1669dec4e00d2d76817379b7b5088fadb471b
-
SHA256
385f77e0604e9926408a261fb3e56268f60e0fda4f124f2d1b0c1b45d106bdc0
-
SHA512
8b5d2d1ad55b942a5158036530c7c92cdb7318b4e878ff4d3e31d891b5b4a874914860c708d056b0033872cff006ce542ebdd79d04d13249e9c63c7f2622fa8f
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
iexplore.exeExplorer.EXEpid process 1560 iexplore.exe 1560 iexplore.exe 1560 iexplore.exe 1216 Explorer.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 1604 PING.EXE -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEExplorer.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1560 iexplore.exe 1560 iexplore.exe 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1560 iexplore.exe 1560 iexplore.exe 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1560 iexplore.exe 1560 iexplore.exe 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1148 powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exeExplorer.EXEpid process 1148 powershell.exe 1148 powershell.exe 1216 Explorer.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
wscript.exeregsvr32.exeiexplore.exemshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 2016 wrote to memory of 316 2016 wscript.exe regsvr32.exe PID 2016 wrote to memory of 316 2016 wscript.exe regsvr32.exe PID 2016 wrote to memory of 316 2016 wscript.exe regsvr32.exe PID 2016 wrote to memory of 316 2016 wscript.exe regsvr32.exe PID 2016 wrote to memory of 316 2016 wscript.exe regsvr32.exe PID 316 wrote to memory of 1168 316 regsvr32.exe regsvr32.exe PID 316 wrote to memory of 1168 316 regsvr32.exe regsvr32.exe PID 316 wrote to memory of 1168 316 regsvr32.exe regsvr32.exe PID 316 wrote to memory of 1168 316 regsvr32.exe regsvr32.exe PID 316 wrote to memory of 1168 316 regsvr32.exe regsvr32.exe PID 316 wrote to memory of 1168 316 regsvr32.exe regsvr32.exe PID 316 wrote to memory of 1168 316 regsvr32.exe regsvr32.exe PID 1560 wrote to memory of 1736 1560 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 1736 1560 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 1736 1560 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 1736 1560 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 1032 1560 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 1032 1560 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 1032 1560 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 1032 1560 iexplore.exe IEXPLORE.EXE PID 1132 wrote to memory of 1148 1132 mshta.exe powershell.exe PID 1132 wrote to memory of 1148 1132 mshta.exe powershell.exe PID 1132 wrote to memory of 1148 1132 mshta.exe powershell.exe PID 1148 wrote to memory of 1244 1148 powershell.exe csc.exe PID 1148 wrote to memory of 1244 1148 powershell.exe csc.exe PID 1148 wrote to memory of 1244 1148 powershell.exe csc.exe PID 1244 wrote to memory of 568 1244 csc.exe cvtres.exe PID 1244 wrote to memory of 568 1244 csc.exe cvtres.exe PID 1244 wrote to memory of 568 1244 csc.exe cvtres.exe PID 1148 wrote to memory of 748 1148 powershell.exe csc.exe PID 1148 wrote to memory of 748 1148 powershell.exe csc.exe PID 1148 wrote to memory of 748 1148 powershell.exe csc.exe PID 748 wrote to memory of 808 748 csc.exe cvtres.exe PID 748 wrote to memory of 808 748 csc.exe cvtres.exe PID 748 wrote to memory of 808 748 csc.exe cvtres.exe PID 1148 wrote to memory of 1216 1148 powershell.exe Explorer.EXE PID 1148 wrote to memory of 1216 1148 powershell.exe Explorer.EXE PID 1148 wrote to memory of 1216 1148 powershell.exe Explorer.EXE PID 1216 wrote to memory of 1560 1216 Explorer.EXE iexplore.exe PID 1216 wrote to memory of 1560 1216 Explorer.EXE iexplore.exe PID 1216 wrote to memory of 1676 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 1676 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 1676 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 1560 1216 Explorer.EXE iexplore.exe PID 1216 wrote to memory of 1676 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 1676 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 1676 1216 Explorer.EXE cmd.exe PID 1676 wrote to memory of 1604 1676 cmd.exe PING.EXE PID 1216 wrote to memory of 1528 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 1528 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 1528 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 1548 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 1548 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 1548 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 2024 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 2024 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 2024 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 1400 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 1400 1216 Explorer.EXE cmd.exe PID 1216 wrote to memory of 1400 1216 Explorer.EXE cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1168 regsvr32.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Makes http(s) request 11 IoCs
Contacts server via http/https, possibly for C2 communication.
Processes:
description flow ioc HTTP URL 7 http://f1.pipen.at/api1/DU2BEoBJol4c9QR/hzPoobUQQv8hItvMi9/yhdvyNz9l/oa9KsvEawojRvasA7ex6/qfj_2F1wuNVIo8Fc6BB/HOpckssdLG5i65wrT3JIFE/XgCboLwQXQO1x/79XbhLtf/C9g7B9gE12qPhaJTRGfLFET/G8mN1kCFkA/9_2BrB1hqtcWDrHTm/tLQjX24Yl3CK/JdywgJ26Wiy/kozhgzH00Z2VXi/gaW3VxCXkV0tXRQeXn7OS/67MSrVSb6ZWxWd7c/xIkbfFEx_0A_0DP/eratXBGlfjEUmHYapK/reAwnI_2B/_2BFEgRgx0Mv/Q7nr3rXRLi/P HTTP URL 33 http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D HTTP URL 5 http://f1.pipen.at/api1/0ghLUnYo8aL5/9_2BUHjwrCF/0Hhr_2FmsXOct0/2t6l7ZjOSmAC3DcxcdbjP/Y7kI7USaEF_2BSA0/d9GPnE75dM2eS9U/W1HmSg_2BntnU6ln1p/7_2FpVuLh/X8_2FVM1bHcDc_2F4FX_/2FQdICJtOvvjgvAx7xv/4sQeLo3cTNsEziHcAmiuAY/Q6ezxbYK_2F9B/AbOaB_2F/pYwoXJtQGi0Nqt7SpCBKyx2/ggwho_2BGD/Ap2AKY1XKOv1aB0Mw/6JoBqn_2F4id/3IM9k43fSo1/cXSo5_0A_0DY5u/mi4NvLQvCQyUuiwA6TMUj/CIMOK8DkOBBf1I8yEtqo/bKy HTTP URL 6 http://f1.pipen.at/favicon.ico HTTP URL 12 http://api10.dianer.at/jvassets/xI/t64.dat HTTP URL 21 http://vv.malorun.at/api1/1Z0_2FywgL_2B_2Bt9Fe4X/ZvaxSxP1OgulP/scGcBUwg/saJkQaIG47lugmQ0dCi56e9/Z_2B6IAF_2/BL1K3q275gCXgtw7S/ay_2FbbZVNGX/d0CC8_2Bfjb/Ul3vLVD5f7KvZV/GAvGiYNVIqktr8eXQy3SJ/oYwOVWT_2F_2F6wB/I47VfiEOIeMM2rx/fq9LdyFR7qvgLuhjPI/z9yPj6i6q/3lPlmvnmfebKgh7_2Fzw/aN462bZHDfzBssbdNPF/VuZzjGkoW05bQqs_2Fd7GE/4zVy_0A_0DoDc/hYj4eBTq/sJWmw2Z5rYltmH9hnyhvM9t/iD9QZOpiNm/HtV HTTP URL 22 http://vv.malorun.at/api1/ewgHZVV99kZvKB5/DKPjpZCU6WF5IMxCV1/Gdua_2Fg9/KdUlvL_2F3blgTEP_2FY/6c5tfSXSx3VDVTzKiAZ/1MHsU5xEkTVizMcFmPQ_2F/SBrVaWo4bGI4T/IYVNjx7a/5fx_2B3nGXaWBMieEH_2FsD/IHYTQ_2BDn/dQ_2F1Oi_2Fpj0er3/nmS2F8dtoLvt/SVeppm1LIzI/Bpw9dUQESsdfF6/esugCnhGIM2vs0pUy_2BF/3qUKRuH6ccGxzRJ4/Rx_2Fr_2Fyyzshv/T8tb1n1_2BTqTzH_0A/_0DPpJvJ6/yK4vtz9wwsgFBhuivO3D/qh6H1d3r2Kpl88Qss1OU/0 HTTP URL 23 http://vv.malorun.at/api1/qFuBRfAP_2FZrp/Y1UWsFiwhdhD6_2FMGLVj/iRhhru45bUntL5qU/5qjfW8A_2BV3GQ7/tN2p7_2BImyue9FX7h/ShShHjnMM/8FTwy7wlqwH1O7rCM4gw/FBldMJcFsbG7KmP3pIs/tc6Cov6_2BO2umwU2Epch6/WMUXtOEzNpD40/ocHA87Qj/4DvvoVEdYAxHp6eChMMntBF/AGaminQRmx/QlJZWK6fHJGgdoeJn/YPiVvVqhoYQQ/a9_2BCN6O49/FM8QLeJnqAa0_2/BbJp_0A_0DjP5AaDhfpJB/c717czc_2FDy8PKr/5omPukm4qLKhCt5/_2BX5au3/N HTTP URL 32 http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D HTTP URL 8 http://f1.pipen.at/favicon.ico HTTP URL 9 http://f1.pipen.at/api1/sINhDXzmYnnZVloGkPL/OgzW4fKVFmoiCKYGKsZGM7/9sE0GAjBkmKAy/B8okQMl2/NBf0u7q6ouh_2FwUpGGIqJM/aNn6oVcpox/IQout2E0QyR9BSuDv/NlHIYymchKyI/LDPO2gZT879/fOipLGYgCnp2oh/aLJSM0esCiEAgwfgYb_2B/STIWe6QH9me34OR8/FKptxh02Fy1F2Uv/N9DSCAY7J3k8KfWR7A/oYav_2B28/HJuSldx2l4evYfXsSeUl/wcHx646zcT_0A_0DKoy/rHRV8_2Bp7J2g3JBH7eWPx/LcNueIU41Vg0t/834Zw0_2/F37BdzPcl8b8cUqygS6qlr7/NPb -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 1148 powershell.exe 1216 Explorer.EXE 1216 Explorer.EXE 1676 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 1148 set thread context of 1216 1148 powershell.exe Explorer.EXE PID 1216 set thread context of 1560 1216 Explorer.EXE iexplore.exe PID 1216 set thread context of 1676 1216 Explorer.EXE cmd.exe PID 1676 set thread context of 1604 1676 cmd.exe PING.EXE -
Processes:
IEXPLORE.EXEmshta.exeiexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dcc209169d6de14b878908571718e558000000000200000000001066000000010000200000008a7075e997b04bd999a79110ada4f50e8c105e0d291e4b2cd44533bbc2b04ad1000000000e8000000002000020000000b3052e1b2044e2d6eeae482d0b64ef5f5e54b53732e1665dbe162706cb4b1d3520000000332c721379ac3d209c58934a9bd1c595f72dba369051f1aef9a5d8b37558202440000000016c8198428647d4bbf7d562f0d11585944f959f52b0fd1b815324e5c270a6e788e213066b422025c245da3bb7fe576b009540039e9be22b2d67cff9c8aab08a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "293934423" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c173b21715d601 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dcc209169d6de14b878908571718e55800000000020000000000106600000001000020000000657ad2ba31688ce8d121d305c349b1f3a9719cec80c8caff8b312e1eaa69d20e000000000e80000000020000200000004112b2d20777ddd8ec14eab4832f0d5374da041a6e4ab4f40f07ee9cd7b867a7900000002c92f59a82d3ae975757a139c006225fc8f0fa8599fbfa4ba9096498344c8c259d68dca39e290a3cbc1478f413c82156649f8306fce064b3d1defee8f298ddc747afbaf11c70670b9a76a6781310c1ceed5c385c78b560b1b1f3e0046a3950839224137c40367f2ff80ba498fa1063411b75057a58fe074e1022aa1da720a6b9f224cd0c725598ef69183f98ebfe93d3400000000496e3d0179d04d9e0df7ba4bec5f74ab2aebd2631fa8b7008f377faca71b32267bb55d238b8df6742bb4f248b77c1bb69411fa7a33797114570416e226e3c36 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E92E4081-810A-11EA-BD3B-6E6D0CC9EA80} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1216 -
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\job_attach_h6x.js2⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Users\Admin\AppData\Local\Temp\\DeNSXQbUgM.txt3⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\regsvr32.exeC:\Users\Admin\AppData\Local\Temp\\DeNSXQbUgM.txt4⤵
- Loads dropped DLL
PID:1168
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').RegRead('HKCU\\Software\\AppDataLow\\Software\\Microsoft\\4F9B8A74-6250-5914-E4F3-B69D58D74A21\\DmdlDump'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
- Modifies Internet Explorer settings
PID:1132 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\4F9B8A74-6250-5914-E4F3-B69D58D74A21").Certxva2))3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1148 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dr4fipwn\dr4fipwn.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAAEE.tmp" "c:\Users\Admin\AppData\Local\Temp\dr4fipwn\CSCCFCF44488D8E4004BF95D4EA5BA1EF.TMP"5⤵PID:568
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\x03a0wna\x03a0wna.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAB7A.tmp" "c:\Users\Admin\AppData\Local\Temp\x03a0wna\CSC8051214C4A3F40E6B21688C7EEE55C83.TMP"5⤵PID:808
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\DeNSXQbUgM.txt"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1676 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Runs ping.exe
PID:1604
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\2760.bi1"2⤵PID:1528
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1208
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\2618.bi1"2⤵PID:1548
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:612
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2760.bi1"2⤵PID:2024
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2618.bi1"2⤵PID:1400
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Modifies Internet Explorer settings
PID:1560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:22⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Modifies Internet Explorer settings
PID:1736
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:406535 /prefetch:22⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Modifies Internet Explorer settings
PID:1032
-