Resubmissions
03-11-2021 15:58
211103-tevassebf4 1002-11-2021 04:23
211102-ez9hwsbfd6 1002-03-2021 13:16
210302-qalv52kwwj 10Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
02-03-2021 13:16
Static task
static1
Behavioral task
behavioral1
Sample
ewgr.png.dll
Resource
win7v20201028
General
-
Target
ewgr.png.dll
-
Size
646KB
-
MD5
cf24c392a94a9bd8f381f0de2926a4f2
-
SHA1
bf5ba2b5f9062b1a99797b593e378a1e59faa142
-
SHA256
b4f98cb2d21258819d8678c29486a2e7854d576efc28b58d930551ca5aa24f20
-
SHA512
ef2707615abb03cdda353d1ed081814fd77b0af78315d410736bb5e989d42f634c75f876c062254c25ec96e5b7fbb78bf41c7651cbd7d2efa68a49de61848ec0
Malware Config
Extracted
gozi_rm3
201193209
https://binobin.xyz
-
build
300932
-
exe_type
loader
-
non_target_locale
RU
-
server_id
12
-
url_path
index.htm
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 13 1488 rundll32.exe -
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEiexplore.exeiexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{346EEED1-7B5A-11EB-8853-EAC4A56BD8AE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40314af5660fd701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000425806acd39120468f2776ac02fff63400000000020000000000106600000001000020000000614214abfaa65ed872848a156135ddef6f5053e9b89d86f243a1ea727a3d75c0000000000e800000000200002000000059ce624028682fc51913c16f093c1ceae2db3208207a865847390a4e756fd4ef90000000e216c9862982c70f735e5e29e426f6d8f0784bbbff40f837f907c46797f4f40205b1a76f45302f6c2cfd79da4c19e6d31dd90e455a4e814dad2d574221bdd6e25513b26109f104a0a5b491ba7a134a335d21f6fa212faedc85b4a1c38d493014c2fca887142541dc1eb13b4a0a26f987a7cbf7970ee33778e28ec94418491c0b8b7ebbd9ee42bca4e96a676084715952400000007d64d70b73c21ff37f0c141b1d73b337fc50b3cd78e2f506e3edfa3966a55b547d8e78f516dcfd2d30df7be2e0e1a1076f38c8e9378f135e712d0a8e6ea2234e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 280 iexplore.exe 1436 iexplore.exe 1956 iexplore.exe 592 iexplore.exe 956 iexplore.exe 1452 iexplore.exe 1752 iexplore.exe 956 iexplore.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 280 iexplore.exe 280 iexplore.exe 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1436 iexplore.exe 1436 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1956 iexplore.exe 1956 iexplore.exe 664 IEXPLORE.EXE 664 IEXPLORE.EXE 592 iexplore.exe 592 iexplore.exe 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE 956 iexplore.exe 956 iexplore.exe 864 IEXPLORE.EXE 864 IEXPLORE.EXE 1452 iexplore.exe 1452 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1752 iexplore.exe 1752 iexplore.exe 912 IEXPLORE.EXE 912 IEXPLORE.EXE 956 iexplore.exe 956 iexplore.exe 740 IEXPLORE.EXE 740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
rundll32.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 1888 wrote to memory of 1488 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1488 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1488 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1488 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1488 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1488 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1488 1888 rundll32.exe rundll32.exe PID 280 wrote to memory of 1924 280 iexplore.exe IEXPLORE.EXE PID 280 wrote to memory of 1924 280 iexplore.exe IEXPLORE.EXE PID 280 wrote to memory of 1924 280 iexplore.exe IEXPLORE.EXE PID 280 wrote to memory of 1924 280 iexplore.exe IEXPLORE.EXE PID 1436 wrote to memory of 1624 1436 iexplore.exe IEXPLORE.EXE PID 1436 wrote to memory of 1624 1436 iexplore.exe IEXPLORE.EXE PID 1436 wrote to memory of 1624 1436 iexplore.exe IEXPLORE.EXE PID 1436 wrote to memory of 1624 1436 iexplore.exe IEXPLORE.EXE PID 1956 wrote to memory of 664 1956 iexplore.exe IEXPLORE.EXE PID 1956 wrote to memory of 664 1956 iexplore.exe IEXPLORE.EXE PID 1956 wrote to memory of 664 1956 iexplore.exe IEXPLORE.EXE PID 1956 wrote to memory of 664 1956 iexplore.exe IEXPLORE.EXE PID 592 wrote to memory of 1576 592 iexplore.exe IEXPLORE.EXE PID 592 wrote to memory of 1576 592 iexplore.exe IEXPLORE.EXE PID 592 wrote to memory of 1576 592 iexplore.exe IEXPLORE.EXE PID 592 wrote to memory of 1576 592 iexplore.exe IEXPLORE.EXE PID 956 wrote to memory of 864 956 iexplore.exe IEXPLORE.EXE PID 956 wrote to memory of 864 956 iexplore.exe IEXPLORE.EXE PID 956 wrote to memory of 864 956 iexplore.exe IEXPLORE.EXE PID 956 wrote to memory of 864 956 iexplore.exe IEXPLORE.EXE PID 1452 wrote to memory of 1988 1452 iexplore.exe IEXPLORE.EXE PID 1452 wrote to memory of 1988 1452 iexplore.exe IEXPLORE.EXE PID 1452 wrote to memory of 1988 1452 iexplore.exe IEXPLORE.EXE PID 1452 wrote to memory of 1988 1452 iexplore.exe IEXPLORE.EXE PID 1752 wrote to memory of 912 1752 iexplore.exe IEXPLORE.EXE PID 1752 wrote to memory of 912 1752 iexplore.exe IEXPLORE.EXE PID 1752 wrote to memory of 912 1752 iexplore.exe IEXPLORE.EXE PID 1752 wrote to memory of 912 1752 iexplore.exe IEXPLORE.EXE PID 956 wrote to memory of 740 956 iexplore.exe IEXPLORE.EXE PID 956 wrote to memory of 740 956 iexplore.exe IEXPLORE.EXE PID 956 wrote to memory of 740 956 iexplore.exe IEXPLORE.EXE PID 956 wrote to memory of 740 956 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ewgr.png.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ewgr.png.dll,#12⤵
- Blocklisted process makes network request
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1436 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:592 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4MD5
0cb6aff7f00ffdce23877e0fd80f88d5
SHA17cb46bde95f4e57c108100dff3786dc9d6169389
SHA256fb6bd4558196dad5d2767534f435159f7ce7d69f8e0bb21d73af02b8778f5ad0
SHA51204bfc5e5430709750613273778c7fc3a5d9eedc618fc60b6db2a55247c3a30609fbb0758f8923e3a84984ecae4903e68ee165f3c8515b8e922b70dceb9f402b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357MD5
a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4MD5
cfdfedc6ea8d57569babb32735084c62
SHA1b0df7678119eef907ddfec71ee11f5f754a9bfd2
SHA256364eede4810864606d7608709a939aeb03b54901a0fc19c8bb26d41eb27cae66
SHA512ebdbedc6855aba9dda47a8b717ed489aa683bc99ebdbed85f867b10d5b04553fd91089342186289ea107b65c92d4b6d944bfdfae7d55a997be9aaf61fb3a68a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
f0efb1e200f773904d651b27577853cc
SHA12d8ad398e8654008bd5c5d54d1ebaa44515fd6fd
SHA2568ed52727369090dd7e6406859c38efe03aab90756e3cc75474679513c7c03b7b
SHA5124846a242b4a8473fd314e797399b71936fb404404a6687205a6bdeb719cebd52553c62c9c77855fbe01f5112dfd9ae25d1bd7fbbd432c193d5004cc6ea9a8641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357MD5
91d1d1180f38eb40a05a9cf654f21ac9
SHA18263431bd5fe61a89e499f8ea6cf27a92d88d8b0
SHA2563a1b046439e1c25183129f8a938b39ecd987a0f237a1ade124bf45e4e31c81a6
SHA512356f0559ccfa5f2342af5d2740ff46c0087d72f1d9225f8b167f1fa5e6bea7969f173f2f22be45e2b83c0fcd48a6acf58dd2f4f8721b3a780a84930b5a608d8a
-
memory/612-8-0x000007FEF6080000-0x000007FEF62FA000-memory.dmpFilesize
2.5MB
-
memory/664-17-0x0000000000000000-mapping.dmp
-
memory/740-31-0x0000000000000000-mapping.dmp
-
memory/864-24-0x0000000000000000-mapping.dmp
-
memory/912-28-0x0000000000000000-mapping.dmp
-
memory/1436-10-0x000007FEFBA71000-0x000007FEFBA73000-memory.dmpFilesize
8KB
-
memory/1436-11-0x0000000000560000-0x0000000000570000-memory.dmpFilesize
64KB
-
memory/1488-7-0x00000000001D0000-0x00000000001E0000-memory.dmpFilesize
64KB
-
memory/1488-2-0x0000000000000000-mapping.dmp
-
memory/1488-6-0x0000000000170000-0x000000000017E000-memory.dmpFilesize
56KB
-
memory/1488-5-0x00000000002E0000-0x00000000002F2000-memory.dmpFilesize
72KB
-
memory/1488-4-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/1488-3-0x0000000075781000-0x0000000075783000-memory.dmpFilesize
8KB
-
memory/1576-22-0x0000000000000000-mapping.dmp
-
memory/1624-12-0x0000000000000000-mapping.dmp
-
memory/1924-9-0x0000000000000000-mapping.dmp
-
memory/1988-25-0x0000000000000000-mapping.dmp