Analysis
-
max time kernel
573s -
max time network
561s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-02-2021 13:55
Static task
static1
Behavioral task
behavioral1
Sample
32b2d32af004b6039b73f4ccd73df2bafe7a0343.dll
Resource
win10v20201028
General
-
Target
32b2d32af004b6039b73f4ccd73df2bafe7a0343.dll
-
Size
539KB
-
MD5
d31c0491f522d6b9f2102109bd2420af
-
SHA1
dc1cccf0e43ec5a68326ae4faf1a8cbc5ac00708
-
SHA256
f7c79c0c3feb7c0032424f5f6a9bcdf78d1815ee53f807cc192c2c1f8f21270f
-
SHA512
48d659660654800da4eb3909a06572dfcf5f05ebdfb8629fafdfeab601673e3377d9a3a241f4bd36c3f4f912ac838dbc73926f734bfa8a76ec43fa726b28c3bd
Malware Config
Extracted
gozi_rm3
201193207
https://topitophug.xyz
-
build
300932
-
exe_type
loader
-
non_target_locale
RU
-
server_id
12
-
url_path
index.htm
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
rundll32.exeflow pid process 16 2024 rundll32.exe 42 2024 rundll32.exe 54 2024 rundll32.exe 67 2024 rundll32.exe 80 2024 rundll32.exe -
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53FF4EC1-67C3-11EB-824D-DA78EDA9FF87} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 1640 iexplore.exe 1196 iexplore.exe 1312 iexplore.exe 1192 iexplore.exe 1896 iexplore.exe 1956 iexplore.exe 1768 iexplore.exe 2012 iexplore.exe 292 iexplore.exe 1704 iexplore.exe 2032 iexplore.exe 1388 iexplore.exe 2000 iexplore.exe 1236 iexplore.exe 908 iexplore.exe 1864 iexplore.exe 1900 iexplore.exe 628 iexplore.exe 1960 iexplore.exe 1940 iexplore.exe 1716 iexplore.exe 1160 iexplore.exe 1160 iexplore.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 1640 iexplore.exe 1640 iexplore.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1196 iexplore.exe 1196 iexplore.exe 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1312 iexplore.exe 1312 iexplore.exe 1000 IEXPLORE.EXE 1000 IEXPLORE.EXE 1192 iexplore.exe 1192 iexplore.exe 1196 IEXPLORE.EXE 1196 IEXPLORE.EXE 1896 iexplore.exe 1896 iexplore.exe 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1956 iexplore.exe 1956 iexplore.exe 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 1768 iexplore.exe 1768 iexplore.exe 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 2012 iexplore.exe 2012 iexplore.exe 1180 IEXPLORE.EXE 1180 IEXPLORE.EXE 292 iexplore.exe 292 iexplore.exe 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE 1704 iexplore.exe 1704 iexplore.exe 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 2032 iexplore.exe 2032 iexplore.exe 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1388 iexplore.exe 1388 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 2000 iexplore.exe 2000 iexplore.exe 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1236 iexplore.exe 1236 iexplore.exe 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 908 iexplore.exe 908 iexplore.exe 848 IEXPLORE.EXE 848 IEXPLORE.EXE 1864 iexplore.exe 1864 iexplore.exe 740 IEXPLORE.EXE 740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 1656 wrote to memory of 2024 1656 rundll32.exe rundll32.exe PID 1656 wrote to memory of 2024 1656 rundll32.exe rundll32.exe PID 1656 wrote to memory of 2024 1656 rundll32.exe rundll32.exe PID 1656 wrote to memory of 2024 1656 rundll32.exe rundll32.exe PID 1656 wrote to memory of 2024 1656 rundll32.exe rundll32.exe PID 1656 wrote to memory of 2024 1656 rundll32.exe rundll32.exe PID 1656 wrote to memory of 2024 1656 rundll32.exe rundll32.exe PID 1640 wrote to memory of 1512 1640 iexplore.exe IEXPLORE.EXE PID 1640 wrote to memory of 1512 1640 iexplore.exe IEXPLORE.EXE PID 1640 wrote to memory of 1512 1640 iexplore.exe IEXPLORE.EXE PID 1640 wrote to memory of 1512 1640 iexplore.exe IEXPLORE.EXE PID 1196 wrote to memory of 1504 1196 iexplore.exe IEXPLORE.EXE PID 1196 wrote to memory of 1504 1196 iexplore.exe IEXPLORE.EXE PID 1196 wrote to memory of 1504 1196 iexplore.exe IEXPLORE.EXE PID 1196 wrote to memory of 1504 1196 iexplore.exe IEXPLORE.EXE PID 1312 wrote to memory of 1000 1312 iexplore.exe IEXPLORE.EXE PID 1312 wrote to memory of 1000 1312 iexplore.exe IEXPLORE.EXE PID 1312 wrote to memory of 1000 1312 iexplore.exe IEXPLORE.EXE PID 1312 wrote to memory of 1000 1312 iexplore.exe IEXPLORE.EXE PID 1192 wrote to memory of 1196 1192 iexplore.exe IEXPLORE.EXE PID 1192 wrote to memory of 1196 1192 iexplore.exe IEXPLORE.EXE PID 1192 wrote to memory of 1196 1192 iexplore.exe IEXPLORE.EXE PID 1192 wrote to memory of 1196 1192 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 1544 1896 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 1544 1896 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 1544 1896 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 1544 1896 iexplore.exe IEXPLORE.EXE PID 1956 wrote to memory of 2020 1956 iexplore.exe IEXPLORE.EXE PID 1956 wrote to memory of 2020 1956 iexplore.exe IEXPLORE.EXE PID 1956 wrote to memory of 2020 1956 iexplore.exe IEXPLORE.EXE PID 1956 wrote to memory of 2020 1956 iexplore.exe IEXPLORE.EXE PID 1768 wrote to memory of 1636 1768 iexplore.exe IEXPLORE.EXE PID 1768 wrote to memory of 1636 1768 iexplore.exe IEXPLORE.EXE PID 1768 wrote to memory of 1636 1768 iexplore.exe IEXPLORE.EXE PID 1768 wrote to memory of 1636 1768 iexplore.exe IEXPLORE.EXE PID 2012 wrote to memory of 1180 2012 iexplore.exe IEXPLORE.EXE PID 2012 wrote to memory of 1180 2012 iexplore.exe IEXPLORE.EXE PID 2012 wrote to memory of 1180 2012 iexplore.exe IEXPLORE.EXE PID 2012 wrote to memory of 1180 2012 iexplore.exe IEXPLORE.EXE PID 292 wrote to memory of 1232 292 iexplore.exe IEXPLORE.EXE PID 292 wrote to memory of 1232 292 iexplore.exe IEXPLORE.EXE PID 292 wrote to memory of 1232 292 iexplore.exe IEXPLORE.EXE PID 292 wrote to memory of 1232 292 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 1992 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 1992 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 1992 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 1992 1704 iexplore.exe IEXPLORE.EXE PID 2032 wrote to memory of 1744 2032 iexplore.exe IEXPLORE.EXE PID 2032 wrote to memory of 1744 2032 iexplore.exe IEXPLORE.EXE PID 2032 wrote to memory of 1744 2032 iexplore.exe IEXPLORE.EXE PID 2032 wrote to memory of 1744 2032 iexplore.exe IEXPLORE.EXE PID 1388 wrote to memory of 1708 1388 iexplore.exe IEXPLORE.EXE PID 1388 wrote to memory of 1708 1388 iexplore.exe IEXPLORE.EXE PID 1388 wrote to memory of 1708 1388 iexplore.exe IEXPLORE.EXE PID 1388 wrote to memory of 1708 1388 iexplore.exe IEXPLORE.EXE PID 2000 wrote to memory of 1092 2000 iexplore.exe IEXPLORE.EXE PID 2000 wrote to memory of 1092 2000 iexplore.exe IEXPLORE.EXE PID 2000 wrote to memory of 1092 2000 iexplore.exe IEXPLORE.EXE PID 2000 wrote to memory of 1092 2000 iexplore.exe IEXPLORE.EXE PID 1236 wrote to memory of 1496 1236 iexplore.exe IEXPLORE.EXE PID 1236 wrote to memory of 1496 1236 iexplore.exe IEXPLORE.EXE PID 1236 wrote to memory of 1496 1236 iexplore.exe IEXPLORE.EXE PID 1236 wrote to memory of 1496 1236 iexplore.exe IEXPLORE.EXE PID 908 wrote to memory of 848 908 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32b2d32af004b6039b73f4ccd73df2bafe7a0343.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32b2d32af004b6039b73f4ccd73df2bafe7a0343.dll,#12⤵
- Blocklisted process makes network request
PID:2024
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1512
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1000
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1192 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1196
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1896 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:292 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1232
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1744
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1388 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1092
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1236 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1496
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:908 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:848
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1864 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:740
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵PID:1896
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:628 CREDAT:275457 /prefetch:22⤵PID:1432
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵PID:2036
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵PID:1292
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵PID:1644
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Suspicious use of FindShellTrayWindow
PID:1160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1160 CREDAT:275457 /prefetch:22⤵PID:1420
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1160 CREDAT:1192975 /prefetch:22⤵PID:1204
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9bc7c66842ce55fb615785434a1e4ae2
SHA10841bba8f45cc927201dab1668d7de43c808f3a8
SHA256cdf81a744d87fcc80a9593edceb9103d9eb19ee8023da16b26c17844ffa88eaa
SHA512e85136f1da80428111ce2f626f6e90dff88d11f2de62f461d292104f2807b08ae2c625397d6c889544566c15cd772e1ed45b2fa18d89489140d59b6bb7fc9eba
-
MD5
0cb6aff7f00ffdce23877e0fd80f88d5
SHA17cb46bde95f4e57c108100dff3786dc9d6169389
SHA256fb6bd4558196dad5d2767534f435159f7ce7d69f8e0bb21d73af02b8778f5ad0
SHA51204bfc5e5430709750613273778c7fc3a5d9eedc618fc60b6db2a55247c3a30609fbb0758f8923e3a84984ecae4903e68ee165f3c8515b8e922b70dceb9f402b2
-
MD5
a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\61F95D72644321B3AD7A1D512B8D6E8B
MD52052cd3e7ca49ea9032439565ef540f0
SHA1b42b387d5842441ebe4d38fd015cfb449d162665
SHA25611a4a0446e741e0ce520e157649c7b6e1890eac5f747d2caba76e19f1b2cb81b
SHA51229e6aa83a7c0ea2842f18222657308500f494bcce879bcdb0bef63b912f4d83b319050aeb6e43c4f3dbcbdf604f9015ae25f3c13530e25839516e2c2d36b01f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4
MD520af76ae940966fb0fa04dc44d5fe7f6
SHA119fd23f665fa6619bd28224baaf5d22c6ec5f9a3
SHA25680371e7ddd9479e67984e403c369e5da9b05f678c7fe374763fefff05d3dd770
SHA512f3e7e30c6691460193f0dcb6e7994a2d5271d9479ca241fe1517489c352df04af5d9495ef8e1b57629da4a46a31009ce7406d2b90c8d2f0b42d64db8fe40e9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
MD5e991738a0ab5abcf3ef4932f8848bde5
SHA150305153012f59692a8c76994a2a89429bf57cd2
SHA2564f1f3997e3e1e53a1a3c0be288476aca445ca58c5a2e4ae4b8aaaa7203d42ad7
SHA512ac44d16d11bbb86281fed2dfd6aa1dbb5d97caec116525be786c54e0ad33c81c5e48640d8d140f04410ee02ce33bddbce9babb61686212bc5bf123702340dec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
MD5cde65eb978684d55642a7b61a98ba85c
SHA15d6b5ea2ed2e3a8ffaabc143b08ddc756fc77b74
SHA2569da79b92275011659d4d6cc0ba72ce299c11211fc6f14eae617e3188b4f0d9c6
SHA51223e886b42af0727cf5de446188762e16915a99450f5cbe90d59f4f30426ed7e9fe656b2ffa81756f04ed3276ccdadc54fd25870bd6f67953be4697f73928f56e
-
MD5
26540c997b6526bbd01950c067dc4e1c
SHA1f5ac96bb2aad57f12ff1878eb8c9cdfd7c7c1296
SHA25693fdcb4ddc8b9e6d58bc5c7029b09989d77ca130b52c1eacf1c413ad19ee1f3b
SHA5122e88306e8afbafc9d89da3ca5890adcbe4549a238a7a55397880be97e4c042e0bcc624b482dd7e998515349d23e4ce1dc6e9d4d1f185c828932891277bbba0e9