Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-11-2020 10:28
Static task
static1
Behavioral task
behavioral1
Sample
Dori.ocx.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Dori.ocx.dll
Resource
win10v20201028
General
-
Target
Dori.ocx.dll
-
Size
141KB
-
MD5
745868c40e6f1d1d40ae60335417f6d7
-
SHA1
cfe42b4014fc22596b4305271c4a133492603349
-
SHA256
7a5e4fd35a1a636ef1beb7e62cc647d7e63f5c7aadd2aa1a49d49c81183aca93
-
SHA512
fae585aa131dfa0c5063991fe13938f73c83d78b43ee142ca39e767ec7db6ec7bb419522b4c0c6c210163b05e95db896388446dd8b70b7a29d4c6fe31d130b18
Malware Config
Signatures
-
Blacklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 26 3952 rundll32.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3596 timeout.exe -
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a000000000200000000001066000000010000200000000f0e8dbde0f36e0960a9dd22c300e731bf3c595ef313c298a35e76c19142f778000000000e800000000200002000000040d880c84ddb0575271f5d1c713ad631b2734dce9bdf2437e765641739045a37d000000054c913ca54c00b09dd8f34efd4b0bbdab6ff8a70239ce3950aab54227e5c82072cde5408f72b01d41e52fa50c287a5d0c2ea56f84185d7e067dff169df1e1af70c88d1bd54f1b110db0e80b2aa91d88396dd08281d6a2f8c9d7b8a709ed8e63a4a6dc53d677f51b88c352417339fb3193200a75c9ab6a4d2a7892a2108713156995d6e0d99b78b488da81cd128bd6d8450c3ffe6f66c695ea7f5b1dc916f2c1a3784dbfcb85f7011e1933cc7450de9031cd35def46eca5c161226dc5c965969b1f98b85330a6ad2334a119e7f9dc2c75400000004c0545e83ec19ca8974f1f95f1087f725283c36897866bbe139b9f93162f657a646c84af89d274c070b5e02f26b3616a593dcb92f95e1a5943af7d8b255fa070 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00e62c1b0b9d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD1EC7F4-25A3-11EB-B59A-5A6C71108AE1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E41AE0C8-25A3-11EB-B59A-5A6C71108AE1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30849456" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff720000001a000000f80400007f020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08634bcb0b9d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08053bcb0b9d601 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3097091006" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a00000000020000000000106600000001000020000000d9df726929ae400dcc283c99eb3410c123d0191ce85f9327277d29b7ef1d576e000000000e80000000020000200000005caeb63dbdfabd1da7c4ce0b29947285acbe0c6436d47ac1a762330f8ba2bff520000000e73b3ea32f9fb5d6800f4e77a3399d8a92c690cc1ecccfff9accc57c5d941624400000006de5002c9bb0709772416b4d9e25a44b31e21d2823fb27f2d46055a5c8c0de5ee9077fb0dba127a06e7f4a0f80f5a13c1e6057af5c3e28d18e5fc9081a97c80e iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff1a0000001a000000a00400007f020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3097091006" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff680000001a000000ee0400007f020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff4e00000000000000d404000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30849456" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a000000000200000000001066000000010000200000009abfd8850e6eccb5053949058399ddce890fa767e32ad1a99d10c44cef7eb46e000000000e8000000002000020000000e269a3436ab7ae48fbe3b00eebcb63241aba468f70057b3f3ed954441849302b20000000f1a6d702aa8de9a7e48c8c4c64dc3f70f0434bc0de2491d2125c75448402bce6400000003fe3712ddbae9893d241a064791f6869f8a039e682d58f51bd8ebc5c9a700911512c515d86364d38881135d5d93571b5d4d61f5b7a1af38ec10933e0e7baa54f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff00000000000000008604000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3400000034000000ba04000099020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a00000000020000000000106600000001000020000000e8f9821d88220efbba580e12f6b4fd3c4d9a6013bb1c930999fc897339e39478000000000e80000000020000200000001a0399e3f70069a0d26e888b3149af8bfb687b0a569e38980ff5107fe1b5403520000000f3c09b1cd6693d614f3c6d0a01b3e23ebf4cac65c762afcba2b8621c4a9478b640000000a8e8348edf3c00a88753fd4933dc0af325006d82e991bccd8c5703445f1951a8caec4356f91783d7c2173111c2460b366b5a2c650a0f25716f26265c749b5e6f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
timeout.exepid process 3596 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 1980 powershell.exe 1980 powershell.exe 1980 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
powershell.execmd.exepid process 1980 powershell.exe 1328 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1980 powershell.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
iexplore.exeiexplore.exepid process 188 iexplore.exe 2072 iexplore.exe 2072 iexplore.exe 2072 iexplore.exe 2072 iexplore.exe 2072 iexplore.exe 2072 iexplore.exe 2072 iexplore.exe 2072 iexplore.exe 2072 iexplore.exe 2072 iexplore.exe 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 48 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 188 iexplore.exe 188 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2072 iexplore.exe 2072 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 2072 iexplore.exe 2072 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2072 iexplore.exe 2072 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 2072 iexplore.exe 2072 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 2072 iexplore.exe 2072 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 2072 iexplore.exe 2072 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 2072 iexplore.exe 2072 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 2072 iexplore.exe 2072 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 2072 iexplore.exe 2072 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 2072 iexplore.exe 2072 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 2072 iexplore.exe 2072 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
rundll32.exeiexplore.exeiexplore.execmd.exeforfiles.execmd.exepowershell.execsc.execsc.execmd.exedescription pid process target process PID 648 wrote to memory of 3952 648 rundll32.exe rundll32.exe PID 648 wrote to memory of 3952 648 rundll32.exe rundll32.exe PID 648 wrote to memory of 3952 648 rundll32.exe rundll32.exe PID 188 wrote to memory of 2920 188 iexplore.exe IEXPLORE.EXE PID 188 wrote to memory of 2920 188 iexplore.exe IEXPLORE.EXE PID 188 wrote to memory of 2920 188 iexplore.exe IEXPLORE.EXE PID 2072 wrote to memory of 1852 2072 iexplore.exe IEXPLORE.EXE PID 2072 wrote to memory of 1852 2072 iexplore.exe IEXPLORE.EXE PID 2072 wrote to memory of 1852 2072 iexplore.exe IEXPLORE.EXE PID 2072 wrote to memory of 2980 2072 iexplore.exe IEXPLORE.EXE PID 2072 wrote to memory of 2980 2072 iexplore.exe IEXPLORE.EXE PID 2072 wrote to memory of 2980 2072 iexplore.exe IEXPLORE.EXE PID 2732 wrote to memory of 508 2732 cmd.exe forfiles.exe PID 2732 wrote to memory of 508 2732 cmd.exe forfiles.exe PID 508 wrote to memory of 3880 508 forfiles.exe cmd.exe PID 508 wrote to memory of 3880 508 forfiles.exe cmd.exe PID 3880 wrote to memory of 1980 3880 cmd.exe powershell.exe PID 3880 wrote to memory of 1980 3880 cmd.exe powershell.exe PID 1980 wrote to memory of 3716 1980 powershell.exe csc.exe PID 1980 wrote to memory of 3716 1980 powershell.exe csc.exe PID 3716 wrote to memory of 1484 3716 csc.exe cvtres.exe PID 3716 wrote to memory of 1484 3716 csc.exe cvtres.exe PID 1980 wrote to memory of 2476 1980 powershell.exe csc.exe PID 1980 wrote to memory of 2476 1980 powershell.exe csc.exe PID 2476 wrote to memory of 3172 2476 csc.exe cvtres.exe PID 2476 wrote to memory of 3172 2476 csc.exe cvtres.exe PID 1980 wrote to memory of 2968 1980 powershell.exe Explorer.EXE PID 1328 wrote to memory of 3596 1328 cmd.exe timeout.exe PID 1328 wrote to memory of 3596 1328 cmd.exe timeout.exe PID 1328 wrote to memory of 3596 1328 cmd.exe timeout.exe PID 1328 wrote to memory of 3596 1328 cmd.exe timeout.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Dori.ocx.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Dori.ocx.dll,#13⤵
- Blacklisted process makes network request
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit" /p C:\Windows\system32 /s /m po*l.e*e2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\forfiles.exeforfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit" /p C:\Windows\system32 /s /m po*l.e*e3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe/k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uogsmkl2\uogsmkl2.cmdline"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAD0A.tmp" "c:\Users\Admin\AppData\Local\Temp\uogsmkl2\CSC75B632ABD1F94F1AA5E3636A6A96A5D.TMP"7⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jcqvhdjm\jcqvhdjm.cmdline"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAEBF.tmp" "c:\Users\Admin\AppData\Local\Temp\jcqvhdjm\CSCB1B29390F5284A47889976A4302CDA2D.TMP"7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout /t 5 && del "C:\Users\Admin\AppData\Local\Temp\Dori.ocx.dll"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:188 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:82948 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08MD5
a69fba04d9b13e82fb772d1b38b6054a
SHA1f7ab8c1d32ddc58e13f65f9b8bb0cc844f164454
SHA256733d04f9d9e1fdf85914f097cca3f8bfb3926c38a7ccf69e7c74d887abbc64ff
SHA5126fae50c73cc08c48d5ecb6814785f82c46ded1dc00ba9a8b02a9b2bd907a10bba6015e0a5753487a12765db242162ce4f822bf5d3381a71ae2143c9f5d34669a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08MD5
6302e9a5d0f268f1433591d31e01acad
SHA124875c60b2590c988b31bf0e094fb1dc164d65f7
SHA25672f928d53601ec4aba8671a028cec4007a86041bf7f8c89293da5bc2bcc0c411
SHA51217ca30f8c78143e816829c7a11a44639e7c8321aefe5985001aabb8fef9e1b5a0dcefad9d1950a4e57190b5e170b492731e66e4df8449e9b2f2ea3bf0c3a3ba7
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-314712940\msapplication.xmlMD5
c7e58141bd5ecf62a0f487b36a8b0e37
SHA1fca58ce5d0c7c454970048cc3d3c35b80bfd8df5
SHA2568799ecd016534f9d59f64366359e3092b3aa9d8ac8dfd92ea803ebc79735ccab
SHA5122720a3176ab9d6d06136fff540d3d11ef930303f670410775554ff1216766ccbf46837ef544bc0626f551f80df78cb6aae6efdf2a5bd991127b364c04a873421
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ygi6rqc\imagestore.datMD5
04df80bf324fc57bd174cc406201e1e2
SHA1abb107e49242617f1aa225e766516dd672c1e308
SHA2563e0cdaf4d6346210124a718b71882003f72fe89da946a37a31b5332e698d9187
SHA5128be07abafb1364633139c09b8e37c6638cac10e7549ec57af8ed61f7734eb3dca6ab4f44205ceac6140050143405cc32dd5f591787728dcc06d64357172e7125
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RW8YYLAG\favicon[1].icoMD5
a976d227e5d1dcf62f5f7e623211dd1b
SHA1a2a9dc1abdd3d888484678663928cb024c359ee6
SHA25666332859bd8e3441a019e073a318b62a47014ba244121301034b510dc7532271
SHA5126754d545f2ce095cfa1fa7ca9e3223f89e37726ee7e541ebcf3e209e18b2602f3be8677598cb30d697327a63de032c11dbf8ef7ad7889a79c488a21044c1cb3f
-
C:\Users\Admin\AppData\Local\Temp\RESAD0A.tmpMD5
a0180bcf5d64704b69f5750264c5f3fe
SHA12e44aab9685103f8b4704ba0fa8dc87188367e57
SHA25665ecf338904ce04bb25a79bfb1f97e123997b86aca9ab8fed74ffcb86f2b1b9f
SHA512e4c243d20e7c571288185d22901910561649eb74f1456d138a2530b4166086ef2f5fc00a2a4e1c776b4e97ad91f981dcaf753231636c7a2836c0b1648ee9a5b5
-
C:\Users\Admin\AppData\Local\Temp\RESAEBF.tmpMD5
9cee2ab0351ffccdcb29e57a3d5db0ea
SHA12ba3a1440e820316a32bee9e35e6e57844d24906
SHA256055c17589322c921c1621e3dd1b846cd4f867bfcf821f5d2ec6dea4af290e9de
SHA512eb5f5d0cfdd70c026f9081e5c2151e652b83cb4b0484d568c65c99ac1133e3a0dcad45c3e01943ff8945e0b335d2191585c813bee4a089ae32a55ee538c637de
-
C:\Users\Admin\AppData\Local\Temp\jcqvhdjm\jcqvhdjm.dllMD5
1079ada75b69e161ea545341cd8a762b
SHA1735465040c2ea85336d9f6e74c2477af4371a96d
SHA256236892c404baf7d68b9881d216449a240edd1e1cbb12ffe347f11af92256f5f2
SHA51268a09044ab5db976a53d019f6ef50c47b49c5843bee5d91c9bdd6f2c5171c2ce0d08d03aeef0d64b0ad2e70fefbd6240db685c9bbc7ee805cec801832fbb2043
-
C:\Users\Admin\AppData\Local\Temp\uogsmkl2\uogsmkl2.dllMD5
11a58d795c38d0d54e85da11c557a703
SHA1e77a1c38080d249c21ab16710b67ebf114f75dff
SHA256b007e4183bd044a9c5fd6f1db9ed2675b005ba86e14e2ea10618e2305b5199bc
SHA512c8f0b24c8eadf098ed588db572a91bb879475304743eb234c6895d910a966b97ef9f484e207f6fe53ce1bd60efe9d98a14f909d92640073573254dd95bcd2602
-
\??\c:\Users\Admin\AppData\Local\Temp\jcqvhdjm\CSCB1B29390F5284A47889976A4302CDA2D.TMPMD5
7918a6f8b461abd032097b9b515cc193
SHA1e78c6eb1ae60f213173c8fc646a06f47336712bc
SHA256a5d1aaa9990b387e35fa46100e3c4d307068e3e9ce9a8b48fec0fe680e50dc25
SHA512931111aa34ad30be60e7bfcde8bee1d6c05fd357e4db52f60baad335214946a769bb587e3f3cd783cda5abfe2ae229f2af7e18d059a511129908a5096d3703f8
-
\??\c:\Users\Admin\AppData\Local\Temp\jcqvhdjm\jcqvhdjm.0.csMD5
a5043957e07dbe0dee7bb8aad13a403e
SHA1571c9136e0e90d016dd83b24c40eadbf7186c701
SHA25673775570d08cc971668d853274b7c9a0cfb407cf76480747b9e38542e5dc53c9
SHA51214f98e4902059980ed8f46c72fdefeb404f14df0fa06628476d63f9bb9ed76fd6398abd4de8c1de7dfa2a8b2108c31e2b9b668acfc92958c1eecc4a0c8d656a1
-
\??\c:\Users\Admin\AppData\Local\Temp\jcqvhdjm\jcqvhdjm.cmdlineMD5
30ef885e63ef5d36ddb9111288daf35c
SHA1dffedc99c46cbc2d3cfec3d9f3750d6eb4611bab
SHA256c401c1370cdc883954adcfb53289518a6ca37d634841353545166ba74dfddae8
SHA51230b98c97a5cc3309a08568e106397b8f7891e4eae7a167d02fab8fad065fa21ccb83ba95cf40d055beb163c64cda284e84e14d6e9968879a300f082587c66aab
-
\??\c:\Users\Admin\AppData\Local\Temp\uogsmkl2\CSC75B632ABD1F94F1AA5E3636A6A96A5D.TMPMD5
8c287a8ff814282d2269c78729edde72
SHA110dba1d253850bcfaaf3bc140cc7e53e89210b90
SHA256ee22a88e7d6825c38f25d17a02c2c5261fb1e96624f6ff52f87306d31d60e83f
SHA512e4ce1f9fde13bd62ce3cf4468c7c24dea84c2602e0e53b4e81e9fe16c249517f6bc87f0d920a6a15fafb29f4ebfe7b6f8d9734a5b4e3f6e55a8f0afc8cf04abe
-
\??\c:\Users\Admin\AppData\Local\Temp\uogsmkl2\uogsmkl2.0.csMD5
aee5ecef6b6a9b4372991443276b71ce
SHA1911bd26fba4c5e51423f2c6339cc267f8697f339
SHA25690e03a7c9cb196fd260c54663a4c867f33621ac29746cd8c0a4b2aa9b390754a
SHA512cf99d4941aa5d1a4dd3abd5ca7a4d3d19a7f497c3247fd09505e263a9a4646b81eb19d7a9312b17a00d22ca9881b6d725b76013b7dc470dcc964b77970c96cc3
-
\??\c:\Users\Admin\AppData\Local\Temp\uogsmkl2\uogsmkl2.cmdlineMD5
2296727600df583a99edf48ff211e702
SHA1a9f477cfdad021a1e34f762e6edae40ea0feb689
SHA2569f4e21d7b97d2a4773f9ef1d439ba8735f2c640c378d62a5c12b73e819bb27e2
SHA5126b808ab48dced612742d05fd0c2f27f63db658dbfaf60413bf8a995a2e8e2bf00099d22b306f879f01c2261aebed6b3af91eea898d7f2ba30d648150a3a2ac72
-
memory/508-10-0x0000000000000000-mapping.dmp
-
memory/508-11-0x0000000000000000-mapping.dmp
-
memory/1328-35-0x000001B72B7D0000-0x000001B72B7E8000-memory.dmpFilesize
96KB
-
memory/1484-20-0x0000000000000000-mapping.dmp
-
memory/1852-5-0x0000000000000000-mapping.dmp
-
memory/1980-16-0x00000201E2570000-0x00000201E2571000-memory.dmpFilesize
4KB
-
memory/1980-34-0x00000201E2540000-0x00000201E2558000-memory.dmpFilesize
96KB
-
memory/1980-14-0x00007FF99E710000-0x00007FF99F0FC000-memory.dmpFilesize
9.9MB
-
memory/1980-13-0x0000000000000000-mapping.dmp
-
memory/1980-32-0x00000201E2500000-0x00000201E2501000-memory.dmpFilesize
4KB
-
memory/1980-24-0x00000201E24F0000-0x00000201E24F1000-memory.dmpFilesize
4KB
-
memory/1980-15-0x00000201C7E30000-0x00000201C7E31000-memory.dmpFilesize
4KB
-
memory/2476-25-0x0000000000000000-mapping.dmp
-
memory/2920-2-0x0000000000000000-mapping.dmp
-
memory/2980-9-0x0000000000000000-mapping.dmp
-
memory/3172-28-0x0000000000000000-mapping.dmp
-
memory/3596-36-0x0000000000000000-mapping.dmp
-
memory/3716-17-0x0000000000000000-mapping.dmp
-
memory/3880-12-0x0000000000000000-mapping.dmp
-
memory/3952-1-0x0000000003100000-0x0000000003112000-memory.dmpFilesize
72KB
-
memory/3952-0-0x0000000000000000-mapping.dmp