Overview
overview
10Static
static
10ฺฺฺà...ฺฺ
windows10_x64
ฺฺฺà...ฺฺ
windows10_x64
ฺฺฺà...ฺฺ
windows10_x64
8ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
7ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
1ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
8ฺฺฺà...ฺฺ
windows10_x64
1ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
8ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
9ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
8ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
5ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
ฺฺฺà...ฺฺ
windows10_x64
10ฺฺฺà...ฺฺ
windows10_x64
8ฺฺฺà...ฺฺ
windows10_x64
10Resubmissions
24-08-2023 11:16
230824-nda8msdf8z 1005-08-2023 22:52
230805-2tn2bsfa82 1024-07-2023 06:25
230724-g6s6laag35 1022-07-2023 15:57
230722-tee6wabg5w 1020-07-2023 23:19
230720-3bb5gsbf5v 1020-07-2023 23:06
230720-23f23sba63 1003-02-2021 11:43
210203-6bgge2nfan 1022-11-2020 06:42
201122-6x1at779dj 10Analysis
-
max time kernel
302s -
max time network
311s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-02-2021 11:43
Static task
static1
Behavioral task
behavioral1
Sample
Endermanch@000.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Endermanch@7ev3n.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Endermanch@AnViPC2009.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Endermanch@Antivirus.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
Endermanch@AntivirusPlatinum.exe
Resource
win10v20201028
Behavioral task
behavioral6
Sample
Endermanch@AntivirusPro2017.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
Endermanch@BadRabbit.exe
Resource
win10v20201028
Behavioral task
behavioral8
Sample
Endermanch@Birele.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
Endermanch@Cerber5.exe
Resource
win10v20201028
Behavioral task
behavioral10
Sample
Endermanch@CleanThis.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
Endermanch@ColorBug.exe
Resource
win10v20201028
Behavioral task
behavioral12
Sample
Endermanch@DeriaLock.exe
Resource
win10v20201028
Behavioral task
behavioral13
Sample
Endermanch@Deskbottom.exe
Resource
win10v20201028
Behavioral task
behavioral14
Sample
Endermanch@DesktopPuzzle.exe
Resource
win10v20201028
Behavioral task
behavioral15
Sample
Endermanch@FakeAdwCleaner.exe
Resource
win10v20201028
Behavioral task
behavioral16
Sample
Endermanch@FreeYoutubeDownloader.exe
Resource
win10v20201028
Behavioral task
behavioral17
Sample
Endermanch@HMBlocker.exe
Resource
win10v20201028
Behavioral task
behavioral18
Sample
Endermanch@HappyAntivirus.exe
Resource
win10v20201028
Behavioral task
behavioral19
Sample
Endermanch@Illerka.C.exe
Resource
win10v20201028
Behavioral task
behavioral20
Sample
Endermanch@InternetSecurityGuard.exe
Resource
win10v20201028
Behavioral task
behavioral21
Sample
Endermanch@Koteyka2.exe
Resource
win10v20201028
Behavioral task
behavioral22
Sample
Endermanch@LPS2019.exe
Resource
win10v20201028
Behavioral task
behavioral23
Sample
Endermanch@Movie.mpeg.exe
Resource
win10v20201028
Behavioral task
behavioral24
Sample
Endermanch@NavaShield(1).exe
Resource
win10v20201028
Behavioral task
behavioral25
Sample
Endermanch@NavaShield.exe
Resource
win10v20201028
Behavioral task
behavioral26
Sample
Endermanch@PCDefender.exe
Resource
win10v20201028
Behavioral task
behavioral27
Sample
Endermanch@PCDefenderv2.msi
Resource
win10v20201028
Behavioral task
behavioral28
Sample
Endermanch@PolyRansom.exe
Resource
win10v20201028
Behavioral task
behavioral29
Sample
Endermanch@PowerPoint.exe
Resource
win10v20201028
Behavioral task
behavioral30
Sample
Endermanch@ProgramOverflow.exe
Resource
win10v20201028
Behavioral task
behavioral31
Sample
Endermanch@RegistrySmart.exe
Resource
win10v20201028
Behavioral task
behavioral32
Sample
Endermanch@SE2011.exe
Resource
win10v20201028
General
-
Target
Endermanch@LPS2019.exe
-
Size
1.1MB
-
MD5
2eb3ce80b26345bd139f7378330b19c1
-
SHA1
10122bd8dd749e20c132d108d176794f140242b0
-
SHA256
8abed3ea04d52c42bdd6c9169c59212a7d8c649c12006b8278eda5aa91154cd2
-
SHA512
e3223cd07d59cd97893304a3632b3a66fd91635848160c33011c103cca2badbfe9b78fe258666b634e455872f3a98889ede5a425d8fae91cae6983da1ea1190a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
lpsprt.exepid process 1084 lpsprt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
lpsprt.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\SoftProz = "C:\\Program Files (x86)\\HjuTygFcvX\\lpsprt.exe" lpsprt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Drops file in Program Files directory 4 IoCs
Processes:
Endermanch@LPS2019.exedescription ioc process File created C:\Program Files (x86)\HjuTygFcvX\lpsprt.exe Endermanch@LPS2019.exe File opened for modification C:\Program Files (x86)\HjuTygFcvX\lpsprt.exe Endermanch@LPS2019.exe File opened for modification C:\Program Files (x86)\HjuTygFcvX Endermanch@LPS2019.exe File created C:\Program Files (x86)\HjuTygFcvX\__tmp_rar_sfx_access_check_259308578 Endermanch@LPS2019.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1255976574" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "231" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30865955" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\porntube.com\Total = "35" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "91" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.porntube.com\ = "112" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.porntube.com\ = "231" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001eebd433a1277743b105dfc1aab8d57400000000020000000000106600000001000020000000e2a3fb9cf9cc806903b25491a6f88c08a19acccfcb14c77af23650966ea8534c000000000e8000000002000020000000376d468f2835cbf39bc785062aeaf35de4e60d3b0ce1f08c3e5a34fcb840bb3420000000e1623c30c7361293269a1a538ac68042da5b644ac75bd91fb5ae6ae2027607ce4000000058859d1a048828ac2ddcc58be3dc93defd9078b40c64140d8442a949cd1cabb021e69cb9c77c65220f9a839a98f60193924fa881067467b7fd009d40e153df45 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\porntube.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\porntube.com\Total = "112" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.porntube.com\ = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d2184d23fad601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.porntube.com\ = "856" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\porntube.com\Total = "1034" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1255976574" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.porntube.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "112" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30865955" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\hotjar.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.porntube.com\ = "91" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.porntube.com\ = "35" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\porntube.com\Total = "91" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1259101488" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30865955" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001eebd433a1277743b105dfc1aab8d57400000000020000000000106600000001000020000000fa9d67cd624b99fca2afa73c8ac1ad9a05a63430377b951e5e3ec201714dc497000000000e8000000002000020000000dbd59a0baac1a16e48a0438886dcaab73e19b6f51ec91a27cc88a13c7d56a2b62000000052c89150e968614318de373f1da6430a4053571d0bb8be33154a819156d3168840000000b5db24f97c66ad5f3d0a3bdd547cb5bbb2511a846eb69bcea07c8bce1c2cb2b3c70c8963aebb7d5c870bda203f3fec979705076762af8a3f655596bb4fdec2d9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{766089BA-6616-11EB-BEBD-F6A5F321BADB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "856" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\porntube.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "71" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.porntube.com\ = "71" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\hotjar.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\porntube.com\Total = "231" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1034" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1074294d23fad601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "35" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\porntube.com\Total = "71" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\porntube.com\Total = "856" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.porntube.com\ = "1034" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\DOMStorage\porntube.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
lpsprt.exepid process 1084 lpsprt.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
Processes:
lpsprt.exeiexplore.exepid process 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 2084 iexplore.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe -
Suspicious use of SendNotifyMessage 37 IoCs
Processes:
lpsprt.exepid process 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe 1084 lpsprt.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2084 iexplore.exe 2084 iexplore.exe 3176 IEXPLORE.EXE 3176 IEXPLORE.EXE 3176 IEXPLORE.EXE 3176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Endermanch@LPS2019.exelpsprt.exeiexplore.exedescription pid process target process PID 1320 wrote to memory of 1084 1320 Endermanch@LPS2019.exe lpsprt.exe PID 1320 wrote to memory of 1084 1320 Endermanch@LPS2019.exe lpsprt.exe PID 1084 wrote to memory of 2084 1084 lpsprt.exe iexplore.exe PID 1084 wrote to memory of 2084 1084 lpsprt.exe iexplore.exe PID 2084 wrote to memory of 3176 2084 iexplore.exe IEXPLORE.EXE PID 2084 wrote to memory of 3176 2084 iexplore.exe IEXPLORE.EXE PID 2084 wrote to memory of 3176 2084 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Endermanch@LPS2019.exe"C:\Users\Admin\AppData\Local\Temp\Endermanch@LPS2019.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\HjuTygFcvX\lpsprt.exe"C:\Program Files (x86)\HjuTygFcvX\lpsprt.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.porntube.com3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:82945 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\HjuTygFcvX\lpsprt.exeMD5
2e6360eeebcafd207ad6f4cfc81afdb3
SHA16d85d48c8c809ad0ee5f7b1b20ef79e871466072
SHA2563a31f386f4a68827d8cbfeb087c017f871d80ab4565a2266f692fbe6cfea9c3b
SHA51236e1cadeff91158c0e96585d7550dc193a6470f5fccf3cf98845c4291becc6dae39609771cc8157493bc6cb405446ac55a1790108c6c213293bf4a56ecf381e4
-
C:\Program Files (x86)\HjuTygFcvX\lpsprt.exeMD5
2e6360eeebcafd207ad6f4cfc81afdb3
SHA16d85d48c8c809ad0ee5f7b1b20ef79e871466072
SHA2563a31f386f4a68827d8cbfeb087c017f871d80ab4565a2266f692fbe6cfea9c3b
SHA51236e1cadeff91158c0e96585d7550dc193a6470f5fccf3cf98845c4291becc6dae39609771cc8157493bc6cb405446ac55a1790108c6c213293bf4a56ecf381e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771MD5
dc471d66d8d39980f4cc48e0f9ebef4b
SHA10568c3e7ab864a6231397d5d8b564f59a95926f9
SHA256d843ad22a2227147f68a0aaa10000e3bd1393834585d9c327dd01ba8e8a7d0f9
SHA5125f3afd3aa359859aa41a64e625096ac566c1b35cbace865bcf17fcac068cea34d684285a4c4e3e2a8ff0a662048fa2aa52bb7121d78550e972b70978a712944e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\31E633C8E5ED10E55A221F8495D79731_D54F8269420A91D55073E6A828D9BBF4MD5
78779334bdb955d20c8df9d8c310a5f1
SHA1f247f0e91d8d92de6858813ce58e79748f9ed021
SHA256db8cfacdf3991b5d7559104d319087ded494a8c4d9bd4536b1658416158c18dd
SHA5120f41698a69182d2b0844bce6a4fbb6c209e52a8f82c8472bbe8f437e6043142a75a7f1cb2ea5664e3dfd88e8d7b10c6055c7342f06dff6565303e790417f7891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
e30f24f9ca1fd9dca05e0c1a3ab3a390
SHA17386c5807a111e41e7d8bb7b913c1a1da5f2171c
SHA2563244ee6bfa745395ab664bf04f2efd22090b1ccdd4184b29a7bd3db4e6f03667
SHA512756e2a1dcffb02a8f8931efacf163e3b8223e56ee6994f5a16b49726dc56ef2a9b707e55f4eae86065f454241e68beac4a5b36e0a8c4d122cf2d5c58ab020d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DMD5
9e41c5ca971105e16df1f908dc7815a8
SHA175d6a55bcda138c4f5df58741015aab9647b676c
SHA2567caed1f44b14dc4c9f2eb038cf78ee8386554fbc69d98e3733ec995b864a1a67
SHA512d34865f3ed741499f356e92eedb87d2bbb01c694e11b05e3749541579d5ceb2fc4335a45004106301a8719e58bd9cf91d257b5ca1ab41f851b3967bb856a418e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771MD5
60e4247b68cac2984e9328284e0c2665
SHA1933fc9e01f3836851de2a650c22e462c981e93d1
SHA2561960186f8d3d10770030c8a50fc2983c312818da2aae561ebcb004e88c7cb0fe
SHA5129698e04a72d19a4fbd94c4eea6438c6b4a2c25d13fcbbd3ea65e12171a28951a76e50b9421e0ae4a15e4cb5635d33bf63464cd8c0a299ba4216c44f35bf96f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\31E633C8E5ED10E55A221F8495D79731_D54F8269420A91D55073E6A828D9BBF4MD5
4bee0d3765559f8b4689a13d8fde748b
SHA1a46cd0c762d7dd71f82374b42232e3013739b499
SHA2564fec2dbcb369463918cdf26609f708705ce57a03cd6eb1cc39e58880fd97aeab
SHA51290c05c2296731d77efce3a9c2a538c883e17e548d5b8b7b60c5d6fa9c0bbc01b0e41ebca279259fb8ff801df296d6628bfbafa53334a0a655cbce73f0560b8a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
86960371dbd98d3193b80cb537abbcfb
SHA1ea237cd61bea7c05bb1b6206a372322e1d8167c7
SHA256d5f267140ee225d993abf8059550a9fe696361a66d5ba28457497527efa0aa8f
SHA5122edcf5d5c53e48f6a0792a3c305b06be2e3b70adf1b057866d20564556cb57667b03603b4f5f105c6204c1fac9f185fff7882821c603cbd188c893746f93574c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DMD5
eafdfa049ea15af177d16e8af590e8c4
SHA105d5003387ec51f5b48c182b6d417c5bd69d5c74
SHA2568c605c1a91fdf5de8055170b1203453c64c8b4686d5b0a4314e7f0c2fa167972
SHA51215ceaaa5509bb4cde5a9eebd95c63b89db39b49cb039ff53894232b46a5d2f42e12b39b78e669bd74c2a7498912d87d89f4ca2cda847b30e27645dc9c2ed2554
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\4FQX0M3Q.cookieMD5
1a2c1cd420f6541211b501788e68f2cc
SHA1974ef2e94baa47fc6abe136281c32e745dd2b15f
SHA2563082d5dfdae80278e41086aec9ee379f3883454f7a6b85f5090112409fb31b87
SHA512720d6eb5783c53a0ac7f4bc990c0d199e9103bcef10194c74af0345388cdfe7c4052fb737cfd2133f5a3a6b40b8e0fa01251092f7d688f0d19752174e9268082
-
memory/1084-8-0x00000000022B0000-0x00000000022B2000-memory.dmpFilesize
8KB
-
memory/1084-11-0x00000000022B6000-0x00000000022B8000-memory.dmpFilesize
8KB
-
memory/1084-10-0x00000000022B5000-0x00000000022B6000-memory.dmpFilesize
4KB
-
memory/1084-9-0x00000000022B4000-0x00000000022B5000-memory.dmpFilesize
4KB
-
memory/1084-3-0x0000000000000000-mapping.dmp
-
memory/1084-7-0x00007FF8DA490000-0x00007FF8DAE30000-memory.dmpFilesize
9.6MB
-
memory/1084-6-0x00007FF8F09C0000-0x00007FF8F0A3E000-memory.dmpFilesize
504KB
-
memory/2084-12-0x0000000000000000-mapping.dmp
-
memory/3176-13-0x0000000000000000-mapping.dmp