Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
11-05-2021 11:11
Static task
static1
Behavioral task
behavioral1
Sample
7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe
-
Size
590KB
-
MD5
c239adfb4505f89d70669cec4dc1364c
-
SHA1
a47b03163f78c21242d0eaff14c0fc2238037659
-
SHA256
7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa
-
SHA512
f44f99039fa3b0d2ebade04afdeccc578f578f351f02f67afaa472359eb5c4f3896720dc46b336a7f84e9e42a5865a1b7aff9cb35b2297d7b2fc4b6b600c17d1
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3728 wmpscfgs.exe 3648 wmpscfgs.exe 3788 wmpscfgs.exe 752 wmpscfgs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\users\\admin\\appdata\\local\\temp\\\\wmpscfgs.exe" 7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\users\\admin\\appdata\\local\\temp\\\\wmpscfgs.exe" wmpscfgs.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created \??\c:\program files (x86)\internet explorer\wmpscfgs.exe wmpscfgs.exe File created \??\c:\program files (x86)\adobe\acrotray .exe 7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe File created \??\c:\program files (x86)\adobe\acrotray.exe 7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe File created \??\c:\program files (x86)\internet explorer\wmpscfgs.exe 7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe File created C:\Program Files (x86)\259312765.dat wmpscfgs.exe File created C:\Program Files (x86)\259312796.dat wmpscfgs.exe File opened for modification \??\c:\program files (x86)\adobe\acrotray .exe wmpscfgs.exe File opened for modification \??\c:\program files (x86)\adobe\acrotray.exe wmpscfgs.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.supernetforme.com\ = "1158" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\supernetforme.com\Total = "2311" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3963206805" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007c369e1f7dd80e4a838305ff88bb1ffa00000000020000000000106600000001000020000000e349ea20ed5b2ac81db863e33f78f715317e1e5bb871e350d5e714ab1c15a63c000000000e80000000020000200000005542761cc7c399781cc82bab1f7c9b816368e6acfce407107ec3d5665d04f23420000000d4ed64025c8c825d79eddb0fb71ca56186ce193de77567fdf3c949a7f18a831c400000009569a3122f96d78abca30d4132c0d28fdf63aadbdfe4f437e04ef8f97426c47cd774ce7761fa4b8a19d09e7d0da80c0ae4771ebbc605941d530cb0f571020adf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff720000001a000000f80400007f020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.superwebbysearch.com\ = "1168" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4242653692" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007c369e1f7dd80e4a838305ff88bb1ffa00000000020000000000106600000001000020000000d33373dcd662a41398b2b37b79cf778032956df80c03ab0aeedf41cf4ae3f273000000000e8000000002000020000000084e677502ec0cfdc51f9f36a60324f736922412103f0f4a7693240f52369fd620000000e7bd7571e229f6b4fb43ae9eab3dd7b61d8b5edf9a69cc2d120a48f6bb8f8cb2400000005dc52b27a5b9deef5fe8b8f610413da0cb17038b26c159437abf3fdb556f06e7dedb2c1c272bded003fc7a66f1597fd09afa7fd6161d73664ba8835e2109d504 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\supernetforme.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.superwebbysearch.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30885514" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\supernetforme.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "3479" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\superwebbysearch.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.supernetforme.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\superwebbysearch.com\Total = "1168" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007c369e1f7dd80e4a838305ff88bb1ffa000000000200000000001066000000010000200000009d7e2578fc34990aa2f283cacb7ada58a02ac7a354e7af92a3391106c26b3f29000000000e800000000200002000000008d8d9f593015b93a4dd03a5d9d0a93b8f641fb3a44c54f4d56d03845deb62ad200000000c72bdf040c746ed0835998364153646503f5611a054228396b1b32ce371e01a40000000d153f20990e620e3f01f83c8a3fc2859bc2634ad30b58e32459b7c9ee43f42f64dc93d47ba3f3d44db58fb8d8768be37a721a505e51af732dc6c6d9a8b01760b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16E61AF7-B27E-11EB-B2DB-5A4A21AC7400} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\supernetforme.com\Total = "1158" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3963206805" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30885514" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1158" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30885514" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "2311" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4005081936" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a185f78a46d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ca20e28a46d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.supernetforme.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.supernetforme.com\ = "2311" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4033831624" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30885514" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\supernetforme.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30885514" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DOMStorage\superwebbysearch.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a691ef8a46d701 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 900 7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe 900 7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe 3728 wmpscfgs.exe 3728 wmpscfgs.exe 3728 wmpscfgs.exe 3728 wmpscfgs.exe 3648 wmpscfgs.exe 3648 wmpscfgs.exe 3648 wmpscfgs.exe 3648 wmpscfgs.exe 752 wmpscfgs.exe 752 wmpscfgs.exe 3788 wmpscfgs.exe 3788 wmpscfgs.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 900 7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe Token: SeDebugPrivilege 3728 wmpscfgs.exe Token: SeDebugPrivilege 3648 wmpscfgs.exe Token: SeDebugPrivilege 752 wmpscfgs.exe Token: SeDebugPrivilege 3788 wmpscfgs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1260 iexplore.exe 1260 iexplore.exe 1260 iexplore.exe 1260 iexplore.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1260 iexplore.exe 1260 iexplore.exe 3864 IEXPLORE.EXE 3864 IEXPLORE.EXE 1260 iexplore.exe 1260 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 1260 iexplore.exe 1260 iexplore.exe 3112 IEXPLORE.EXE 3112 IEXPLORE.EXE 1260 iexplore.exe 1260 iexplore.exe 3864 IEXPLORE.EXE 3864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 900 wrote to memory of 3728 900 7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe 75 PID 900 wrote to memory of 3728 900 7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe 75 PID 900 wrote to memory of 3728 900 7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe 75 PID 900 wrote to memory of 3648 900 7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe 76 PID 900 wrote to memory of 3648 900 7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe 76 PID 900 wrote to memory of 3648 900 7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe 76 PID 3728 wrote to memory of 3788 3728 wmpscfgs.exe 80 PID 3728 wrote to memory of 3788 3728 wmpscfgs.exe 80 PID 3728 wrote to memory of 3788 3728 wmpscfgs.exe 80 PID 3728 wrote to memory of 752 3728 wmpscfgs.exe 81 PID 3728 wrote to memory of 752 3728 wmpscfgs.exe 81 PID 3728 wrote to memory of 752 3728 wmpscfgs.exe 81 PID 1260 wrote to memory of 3864 1260 iexplore.exe 83 PID 1260 wrote to memory of 3864 1260 iexplore.exe 83 PID 1260 wrote to memory of 3864 1260 iexplore.exe 83 PID 1260 wrote to memory of 2248 1260 iexplore.exe 84 PID 1260 wrote to memory of 2248 1260 iexplore.exe 84 PID 1260 wrote to memory of 2248 1260 iexplore.exe 84 PID 1260 wrote to memory of 3112 1260 iexplore.exe 85 PID 1260 wrote to memory of 3112 1260 iexplore.exe 85 PID 1260 wrote to memory of 3112 1260 iexplore.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe"C:\Users\Admin\AppData\Local\Temp\7f94769671451d108e8e00e38c5b65dc793ec4213069a6d419cfc3116c0191fa.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:900 -
\??\c:\users\admin\appdata\local\temp\wmpscfgs.exec:\users\admin\appdata\local\temp\\wmpscfgs.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3728 -
\??\c:\users\admin\appdata\local\temp\wmpscfgs.exec:\users\admin\appdata\local\temp\\wmpscfgs.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
C:\Program Files (x86)\Internet Explorer\wmpscfgs.exeC:\Program Files (x86)\Internet Explorer\wmpscfgs.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
-
C:\Program Files (x86)\Internet Explorer\wmpscfgs.exeC:\Program Files (x86)\Internet Explorer\wmpscfgs.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1260 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3864
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1260 CREDAT:82946 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2248
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1260 CREDAT:82949 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3112
-