Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
13-05-2021 06:42
Static task
static1
Behavioral task
behavioral1
Sample
f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe
Resource
win7v20210410
General
-
Target
f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe
-
Size
2.2MB
-
MD5
8983ddb0325666653eeed4c2f891256c
-
SHA1
a7b35ffec9e420318076fa9b29a63beeb41b5eb1
-
SHA256
f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f
-
SHA512
bd0441226e0dd6c6837a7721ff1607a0b459c680eaedadf80688a71139525ec608b08f54f49494fb6acfe64b7bedaf6811fefaec8bc1412011186f7cd8442ef8
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exef7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exeDesktopLayer.exepid process 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe 2004 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe 1056 DesktopLayer.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe upx C:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe upx \Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe upx C:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe upx C:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe upx C:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe upx \Program Files (x86)\Microsoft\DesktopLayer.exe upx C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx behavioral1/memory/1160-84-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2004-86-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Loads dropped DLL 3 IoCs
Processes:
f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exef7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exef7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exepid process 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe 2004 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe -
Drops file in Program Files directory 5 IoCs
Processes:
f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exef7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\pxFD9.tmp f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\pxFD9.tmp f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe -
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "327714832" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E2CC101-B446-11EB-B46F-CA719EEEFCCE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E1C1761-B446-11EB-B46F-CA719EEEFCCE} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exeDesktopLayer.exepid process 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe 1056 DesktopLayer.exe 1056 DesktopLayer.exe 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe 1056 DesktopLayer.exe 1056 DesktopLayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 1692 iexplore.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exeiexplore.exeiexplore.exepid process 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 1724 iexplore.exe 1692 iexplore.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exepid process 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe 1692 iexplore.exe 1692 iexplore.exe 1724 iexplore.exe 1724 iexplore.exe 564 IEXPLORE.EXE 564 IEXPLORE.EXE 420 IEXPLORE.EXE 420 IEXPLORE.EXE 564 IEXPLORE.EXE 564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exef7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exef7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exeDesktopLayer.exeiexplore.exeiexplore.exedescription pid process target process PID 788 wrote to memory of 1160 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe PID 788 wrote to memory of 1160 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe PID 788 wrote to memory of 1160 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe PID 788 wrote to memory of 1160 788 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe PID 1160 wrote to memory of 2004 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe PID 1160 wrote to memory of 2004 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe PID 1160 wrote to memory of 2004 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe PID 1160 wrote to memory of 2004 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe PID 2004 wrote to memory of 1056 2004 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe DesktopLayer.exe PID 2004 wrote to memory of 1056 2004 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe DesktopLayer.exe PID 2004 wrote to memory of 1056 2004 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe DesktopLayer.exe PID 2004 wrote to memory of 1056 2004 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe DesktopLayer.exe PID 1160 wrote to memory of 1724 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe iexplore.exe PID 1160 wrote to memory of 1724 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe iexplore.exe PID 1160 wrote to memory of 1724 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe iexplore.exe PID 1160 wrote to memory of 1724 1160 f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe iexplore.exe PID 1056 wrote to memory of 1692 1056 DesktopLayer.exe iexplore.exe PID 1056 wrote to memory of 1692 1056 DesktopLayer.exe iexplore.exe PID 1056 wrote to memory of 1692 1056 DesktopLayer.exe iexplore.exe PID 1056 wrote to memory of 1692 1056 DesktopLayer.exe iexplore.exe PID 1724 wrote to memory of 420 1724 iexplore.exe IEXPLORE.EXE PID 1724 wrote to memory of 420 1724 iexplore.exe IEXPLORE.EXE PID 1724 wrote to memory of 420 1724 iexplore.exe IEXPLORE.EXE PID 1724 wrote to memory of 420 1724 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 564 1692 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 564 1692 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 564 1692 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 564 1692 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe"C:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808f.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exeC:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exeC:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:564 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
MD5
ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0E1C1761-B446-11EB-B46F-CA719EEEFCCE}.dat
MD5216c78c89ce1374f2727822a007dc49e
SHA13a3ae148acb8065a4f7427d8587d1746b7cba9e3
SHA256ede82e4ca8e4eb5c25c3ce32c612c585e8b3eb51d0c87eecc1c94fb28687f060
SHA512625e33c5c850b2a53d8eae49278ba5db84f604d03a9952a60ce9c2465cf3e518d364165c4baf5a8d4e0d7d244add7416779a0ca56b2d902c61ba3f7e1e615231
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0E2CC101-B446-11EB-B46F-CA719EEEFCCE}.dat
MD529393024fbbcbe7dfd9a5e2458d05708
SHA1b7eb0dd214bcc51a0dc6dc640c35629af7a76395
SHA25655a8af5a3d3a578294fa045122333858ce789876f703bede991ccbf1b1a524de
SHA5126e144ce569554d3282eb4c38649139bf053c621da048133000f9593bf0000763a18b00dd597a4eb453846dc02033fe4464a902de8b60bdd5cb730b395af94d5c
-
C:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe
MD594572235866d843f72d75046796c1569
SHA14e6514d9de841f21671abe5655e54f6792ace32b
SHA2567017ea0ae5c525f067a12ca0f84e766ecbc53dfb8f10f5af32a46e0feef9b901
SHA5122a91a6cf112656d389ee388ade79879424ca740b41eb10ad8aeab73fe65297a0de1fc79141997a5e4afeecb94ba3dca88adc589d3585761a8f06e9faec439e4c
-
C:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe
MD594572235866d843f72d75046796c1569
SHA14e6514d9de841f21671abe5655e54f6792ace32b
SHA2567017ea0ae5c525f067a12ca0f84e766ecbc53dfb8f10f5af32a46e0feef9b901
SHA5122a91a6cf112656d389ee388ade79879424ca740b41eb10ad8aeab73fe65297a0de1fc79141997a5e4afeecb94ba3dca88adc589d3585761a8f06e9faec439e4c
-
C:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
MD5
20c2cc35efa64cef68c14c7760ea83a3
SHA190d17ea5d24c84d8b3af3bba2781cacf615351f8
SHA256b997db909f7c2df3a72010e46266aff20d003476f9699541b7d1afb39657f984
SHA512fc688ed5603aa5248e834ad3e58be4ea71a2504c0a72363fab18f584dbf6da602eb26772147239c84690a4eff01956955f68c411b123c04772a7674338508e58
-
MD5
ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrv.exe
MD594572235866d843f72d75046796c1569
SHA14e6514d9de841f21671abe5655e54f6792ace32b
SHA2567017ea0ae5c525f067a12ca0f84e766ecbc53dfb8f10f5af32a46e0feef9b901
SHA5122a91a6cf112656d389ee388ade79879424ca740b41eb10ad8aeab73fe65297a0de1fc79141997a5e4afeecb94ba3dca88adc589d3585761a8f06e9faec439e4c
-
\Users\Admin\AppData\Local\Temp\f7b326008ea924a48820cb19528dfab0fe73f9d3ebc3f5512a6c71e2f5dd808fSrvSrv.exe
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a