Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
23-12-2020 12:40
Static task
static1
Behavioral task
behavioral1
Sample
b037fc5681d3d59f4ed0c7cd2a5d05ed8df3aaa0.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b037fc5681d3d59f4ed0c7cd2a5d05ed8df3aaa0.dll
Resource
win10v20201028
General
-
Target
b037fc5681d3d59f4ed0c7cd2a5d05ed8df3aaa0.dll
-
Size
233KB
-
MD5
68cf96f4bc91628e22e1526d9728990b
-
SHA1
a1e1063ec8c3667e86e1afab81cb6bbea84485b3
-
SHA256
790191b70550856b3e8ec108fdb82cd8d852822d6716ec865f21cfb5ad160b7c
-
SHA512
ca6bb734df8bf35a2f3346ff5ad954ecc058a719b0eabf90d8c323b80ed6b8659cef5b5f51f65b149c48435bc396920549a72471b0cde1d70a02bf59dbf37b24
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 25 4760 rundll32.exe -
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{195D9BE8-4525-11EB-B59A-CAD1272A8716} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a00000000020000000000106600000001000020000000fc0249aeb4b082fdb1308e5ca1fcde63bf4ba11095a75a3c8151ac481cf2c5ab000000000e8000000002000020000000cbb0710ad27fe99dda2186a6b0d35fab536a0dcbf5d32210aeedbd75b5c61dbc200000007bf490b8776c6f854025ad0ba7b5a4d650dda4d8f6164e920543ad17e1e0cfbb4000000079c38d685d51510ed515a55e75eb3c8e1065eb7cf3888c9cf50ce7e9ccb6db7aa06719da825159358a80e48f8377977cd620c7a5009228db4f7b26b1020f2519 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30857521" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a00000000020000000000106600000001000020000000eced0ae56e495c674c75d5791a50e526a25517633853c7d4c50d1eace1b5379e000000000e8000000002000020000000be94f38518559eac8a453971344423cb56542b719e6b3618fca36b399691941220000000f095ab37b8e372754ade2b91ef72195fbd858334b4d276a067c8c590cab10ad440000000d8ed751707aed8660147018764b267d85f62271859ac03892a6c8e84123b3e9d393baa63287a968a04dd27fb37f8fb7485863aedd9de2e079c4438f7ec9493f9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e9c7e431d9d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a00000000020000000000106600000001000020000000d322422439fb05a360fdbb5019d041252486742a0dc1b7fae448558ecd5cf193000000000e8000000002000020000000c2050375c556353bce4b5dbe1a8d8fcfbd11140b865e2edf51ea08b1cef2e9e720000000fc823d9f1ebce69f69f6c0b134e1ac6e05c9d85a1e42e7199d991150764d05f040000000549b5bdeac9ef166041908a53289463171afdf618d0bf3b8e6f056c1a97e4cdfceba75703d450d7b3fe16cffd7bcf0ab15b553e17fe62ccfc6860133a44d9f16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E783B8C-4525-11EB-B59A-CAD1272A8716} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a00000000020000000000106600000001000020000000a5b597d0f90c6d9fa6e5f2fe185a19989288487d92f64642ae2406cab17e56a6000000000e8000000002000020000000f9269ae44ae550d0e2fa3894234609ce3877947b7d5493152a4f9669984c902f200000004c4c9bc5eeb7b1a06f77b060cc7af5667cceabfbd473a728e0bb96df93838c3440000000514b6e1024068dc5bcf58a6c58265e9c0f844eb73b9a134f0b48267f3491b75c669f079e17773ffd892aed4729fb3171251c631c7b97b17f45827ab56f0ff81a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a000000000200000000001066000000010000200000006dd28625315ffdfe8b53f0f8d6d575d41cd0d9b9cf3c6df30918c4a476bbda4d000000000e800000000200002000000001da1bd7dd77a8f367fb630661aa0cf33aa8bef5995eb0f7b5a2989d55a39ec12000000002ed694ddc1d5d641a9ac2238e94727a95594fdc225368d1f757a8a6b0ee2c1740000000e515bcd9727ded81994d4c5378c6894d18237bfe0669113aa456e7ad41f6f286cb4e555a373b9e313df59f9772e2edb7734570ba65218666ec9fa96780484e65 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{002EC4A2-4525-11EB-B59A-CAD1272A8716} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30857521" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a0000000002000000000010660000000100002000000076b81144d8feebb55a3757176b56007ba55035cc44c64f25d139dff17a3381cf000000000e800000000200002000000079baf6722e9ff096df47072876b269301a075003135a8ac7d8ebc0ce39f6cf0f20000000411a1bf3d1983c651c680bcfc2ad2e94321d4f9f63bd44e104b8d35030804346400000001716dec8b087597153d4accdda710f9fad199e413f00fcdfbaaa2ef9f9b86ef6bd7bab17b2a81ea4fde6067b99aada7cc66cef83b0db014a2f0f2994d48e7c10 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c060251232d9d601 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37702424-4525-11EB-B59A-CAD1272A8716} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 804 iexplore.exe 1924 iexplore.exe 3556 iexplore.exe 1612 iexplore.exe 4612 iexplore.exe 1496 iexplore.exe 4856 iexplore.exe 3424 iexplore.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 804 iexplore.exe 804 iexplore.exe 676 IEXPLORE.EXE 676 IEXPLORE.EXE 1924 iexplore.exe 1924 iexplore.exe 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 3556 iexplore.exe 3556 iexplore.exe 4000 IEXPLORE.EXE 4000 IEXPLORE.EXE 1612 iexplore.exe 1612 iexplore.exe 4500 IEXPLORE.EXE 4500 IEXPLORE.EXE 4612 iexplore.exe 4612 iexplore.exe 4608 IEXPLORE.EXE 4608 IEXPLORE.EXE 1496 iexplore.exe 1496 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 4856 iexplore.exe 4856 iexplore.exe 724 IEXPLORE.EXE 724 IEXPLORE.EXE 3424 iexplore.exe 3424 iexplore.exe 3992 IEXPLORE.EXE 3992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
rundll32.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 4680 wrote to memory of 4760 4680 rundll32.exe rundll32.exe PID 4680 wrote to memory of 4760 4680 rundll32.exe rundll32.exe PID 4680 wrote to memory of 4760 4680 rundll32.exe rundll32.exe PID 804 wrote to memory of 676 804 iexplore.exe IEXPLORE.EXE PID 804 wrote to memory of 676 804 iexplore.exe IEXPLORE.EXE PID 804 wrote to memory of 676 804 iexplore.exe IEXPLORE.EXE PID 1924 wrote to memory of 2232 1924 iexplore.exe IEXPLORE.EXE PID 1924 wrote to memory of 2232 1924 iexplore.exe IEXPLORE.EXE PID 1924 wrote to memory of 2232 1924 iexplore.exe IEXPLORE.EXE PID 3556 wrote to memory of 4000 3556 iexplore.exe IEXPLORE.EXE PID 3556 wrote to memory of 4000 3556 iexplore.exe IEXPLORE.EXE PID 3556 wrote to memory of 4000 3556 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 4500 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 4500 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 4500 1612 iexplore.exe IEXPLORE.EXE PID 4612 wrote to memory of 4608 4612 iexplore.exe IEXPLORE.EXE PID 4612 wrote to memory of 4608 4612 iexplore.exe IEXPLORE.EXE PID 4612 wrote to memory of 4608 4612 iexplore.exe IEXPLORE.EXE PID 1496 wrote to memory of 2224 1496 iexplore.exe IEXPLORE.EXE PID 1496 wrote to memory of 2224 1496 iexplore.exe IEXPLORE.EXE PID 1496 wrote to memory of 2224 1496 iexplore.exe IEXPLORE.EXE PID 4856 wrote to memory of 724 4856 iexplore.exe IEXPLORE.EXE PID 4856 wrote to memory of 724 4856 iexplore.exe IEXPLORE.EXE PID 4856 wrote to memory of 724 4856 iexplore.exe IEXPLORE.EXE PID 3424 wrote to memory of 3992 3424 iexplore.exe IEXPLORE.EXE PID 3424 wrote to memory of 3992 3424 iexplore.exe IEXPLORE.EXE PID 3424 wrote to memory of 3992 3424 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b037fc5681d3d59f4ed0c7cd2a5d05ed8df3aaa0.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b037fc5681d3d59f4ed0c7cd2a5d05ed8df3aaa0.dll,#12⤵
- Blocklisted process makes network request
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:804 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3556 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4612 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1496 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4856 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3424 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4MD5
953f2125a88eced630fa3f95e287b02f
SHA1441e0e319ee73efd0621095d74e75b6a16239c48
SHA256251e9ca5f4e6580fe9014e843ac3e054aa45d6a8e7cef4f5c7512fc31fc354fa
SHA512b685e7d725dc2bf210c906b744445f1ad59a54a4ee251825f39b12522d98f02be49f4bce3fa1832bb7e08f8e118bfc1ed7c1bd76cb054b24223eb863103c0050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4MD5
1b1f99cb1f17d8422e1d8dfc8dc553f0
SHA12a3db8f52890c70e811a0f40c06da3587c204575
SHA256a2669d59ebc3a1b91535b567fa6e970748aacf8b333c235b4470adaa2857b653
SHA5120c09f115ab0167c78805448d94f69796e8e91545592dcb5d707cd9a1b6f1d76199e3597bca00e61574f1fa7a8333123340c8f5be392176108b7a937fa9b4baeb
-
memory/676-4-0x0000000000000000-mapping.dmp
-
memory/724-12-0x0000000000000000-mapping.dmp
-
memory/2224-11-0x0000000000000000-mapping.dmp
-
memory/2232-5-0x0000000000000000-mapping.dmp
-
memory/3992-13-0x0000000000000000-mapping.dmp
-
memory/4000-8-0x0000000000000000-mapping.dmp
-
memory/4500-9-0x0000000000000000-mapping.dmp
-
memory/4608-10-0x0000000000000000-mapping.dmp
-
memory/4760-2-0x0000000000000000-mapping.dmp
-
memory/4760-3-0x00000000027B0000-0x00000000027C2000-memory.dmpFilesize
72KB