Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
22-01-2021 01:02
Static task
static1
Behavioral task
behavioral1
Sample
decrypted_bot_e2043c53a5f8383d9b640c101eb3ad1f.bin.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
decrypted_bot_e2043c53a5f8383d9b640c101eb3ad1f.bin.dll
-
Size
656KB
-
MD5
e2043c53a5f8383d9b640c101eb3ad1f
-
SHA1
ad8eb04e9c6eed46a66edf2f41b42e2699d2fd01
-
SHA256
b3182eb3fd2cb783925e57f6b8db3c5f720c872961c4c08af23fbe9fe13be8cb
-
SHA512
e47a0a4f6f65e219a56455452de2be4b46d7e7486153e45eb672d8d1a563fcabba1dab1d243656f28ae98ca2a0b2a7408609e8e18d58faafc448680aa8f4af9c
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1632-4-0x00000000749F0000-0x0000000074A97000-memory.dmp dridex_ldr behavioral1/memory/1632-5-0x00000000749F0000-0x0000000074A5B000-memory.dmp dridex_ldr -
Modifies Installed Components in the registry 2 TTPs
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Modifies registry class 150 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
rundll32.exepid process 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe 1632 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 247 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription pid process Token: SeShutdownPrivilege 2040 explorer.exe Token: SeShutdownPrivilege 2040 explorer.exe Token: SeShutdownPrivilege 2040 explorer.exe Token: SeShutdownPrivilege 2040 explorer.exe Token: SeShutdownPrivilege 2040 explorer.exe Token: SeShutdownPrivilege 2040 explorer.exe Token: SeShutdownPrivilege 2040 explorer.exe Token: SeShutdownPrivilege 584 explorer.exe Token: SeShutdownPrivilege 584 explorer.exe Token: SeShutdownPrivilege 584 explorer.exe Token: SeShutdownPrivilege 584 explorer.exe Token: SeShutdownPrivilege 584 explorer.exe Token: SeShutdownPrivilege 584 explorer.exe Token: SeShutdownPrivilege 584 explorer.exe Token: SeShutdownPrivilege 1824 explorer.exe Token: SeShutdownPrivilege 1824 explorer.exe Token: SeShutdownPrivilege 1824 explorer.exe Token: SeShutdownPrivilege 1824 explorer.exe Token: SeShutdownPrivilege 1824 explorer.exe Token: SeShutdownPrivilege 1824 explorer.exe Token: SeShutdownPrivilege 1824 explorer.exe Token: SeShutdownPrivilege 1824 explorer.exe Token: SeShutdownPrivilege 1824 explorer.exe Token: SeShutdownPrivilege 1672 explorer.exe Token: SeShutdownPrivilege 1672 explorer.exe Token: SeShutdownPrivilege 1672 explorer.exe Token: SeShutdownPrivilege 1672 explorer.exe Token: SeShutdownPrivilege 1672 explorer.exe Token: SeShutdownPrivilege 1672 explorer.exe Token: SeShutdownPrivilege 1672 explorer.exe Token: SeShutdownPrivilege 1672 explorer.exe Token: SeShutdownPrivilege 1672 explorer.exe Token: SeShutdownPrivilege 1668 explorer.exe Token: SeShutdownPrivilege 1668 explorer.exe Token: SeShutdownPrivilege 1668 explorer.exe Token: SeShutdownPrivilege 1668 explorer.exe Token: SeShutdownPrivilege 1668 explorer.exe Token: SeShutdownPrivilege 1668 explorer.exe Token: SeShutdownPrivilege 1668 explorer.exe Token: SeShutdownPrivilege 1668 explorer.exe Token: SeShutdownPrivilege 1668 explorer.exe Token: SeShutdownPrivilege 1668 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeShutdownPrivilege 1876 explorer.exe Token: SeShutdownPrivilege 372 explorer.exe Token: SeShutdownPrivilege 372 explorer.exe Token: SeShutdownPrivilege 372 explorer.exe Token: SeShutdownPrivilege 372 explorer.exe Token: SeShutdownPrivilege 372 explorer.exe Token: SeShutdownPrivilege 372 explorer.exe Token: SeShutdownPrivilege 372 explorer.exe Token: SeShutdownPrivilege 1700 explorer.exe Token: SeShutdownPrivilege 1700 explorer.exe Token: SeShutdownPrivilege 1700 explorer.exe Token: SeShutdownPrivilege 1700 explorer.exe Token: SeShutdownPrivilege 1700 explorer.exe Token: SeShutdownPrivilege 1700 explorer.exe -
Suspicious use of FindShellTrayWindow 214 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exepid process 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1668 explorer.exe 1668 explorer.exe 1668 explorer.exe 1668 explorer.exe 1668 explorer.exe 1668 explorer.exe 1668 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 372 explorer.exe 372 explorer.exe 372 explorer.exe 372 explorer.exe 372 explorer.exe 372 explorer.exe 372 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe -
Suspicious use of SendNotifyMessage 412 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exepid process 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 2040 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 584 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1824 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1672 explorer.exe 1668 explorer.exe 1668 explorer.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1108 wrote to memory of 1632 1108 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1632 1108 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1632 1108 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1632 1108 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1632 1108 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1632 1108 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1632 1108 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\decrypted_bot_e2043c53a5f8383d9b640c101eb3ad1f.bin.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\decrypted_bot_e2043c53a5f8383d9b640c101eb3ad1f.bin.dll,#12⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1632-2-0x0000000000000000-mapping.dmp
-
memory/1632-3-0x00000000760D1000-0x00000000760D3000-memory.dmpFilesize
8KB
-
memory/1632-4-0x00000000749F0000-0x0000000074A97000-memory.dmpFilesize
668KB
-
memory/1632-5-0x00000000749F0000-0x0000000074A5B000-memory.dmpFilesize
428KB
-
memory/1632-7-0x0000000000250000-0x0000000000256000-memory.dmpFilesize
24KB
-
memory/2040-6-0x000007FEFBEE1000-0x000007FEFBEE3000-memory.dmpFilesize
8KB