Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
24-06-2021 04:00
Static task
static1
Behavioral task
behavioral1
Sample
31b94c5a94aa8ce7e187360b0dc702b473d1c5d498d4de26f137b272ccbadaed.exe
Resource
win7v20210410
General
-
Target
31b94c5a94aa8ce7e187360b0dc702b473d1c5d498d4de26f137b272ccbadaed.exe
-
Size
315KB
-
MD5
99246958839423b9af0d2ea872c505d9
-
SHA1
6aba8c858610174bcff3c9cee57d8f7bc5d11564
-
SHA256
31b94c5a94aa8ce7e187360b0dc702b473d1c5d498d4de26f137b272ccbadaed
-
SHA512
b72cc152f2bb3799d678b4b371a85167ba441483a17d9a1c736df2a111abb0ad4ef7494939ed557ab25931a7fa35db52d0211f6899ed5a92f7e98756dfc0337e
Malware Config
Extracted
gozi_rm3
-
build
300974
-
exe_type
loader
Extracted
gozi_rm3
202106191
https://gogorobest.xyz
-
build
300974
-
exe_type
loader
-
non_target_locale
RU
-
server_id
12
-
url_path
index.htm
Signatures
-
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74913938-D4A1-11EB-A11C-7EF74584969E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E0E9575-D4A1-11EB-A11C-7EF74584969E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a85721ae68d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0397429ae68d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f091d440ae68d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30894254" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30894254" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40179a14ae68d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "311737725" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d64619ae68d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "311737725" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ad98e1c4c5c1f64cbad3c833b8884b2700000000020000000000106600000001000020000000aa69d2b0251c0455753b6094b3d6cf1cc3a7ae33401acf063ae1404b37893d6b000000000e80000000020000200000001ce0a970192c05c87e8ef9bda66e4fe4061a0bf04f90f27cbe24c0546f8f9c0a20000000e6217b9ca4dd1b13df29bbe72a56c4b58d17691fb0191c448381226b1ab1476f40000000e405e4814d577c5689f160c5d70851dfaf8eb49a7ecffa5e5e3af7cc757be36aed74d31a6fb4b49946d5e40445064e075d766e57d207e2afbe7a506ae15d4f7a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ad98e1c4c5c1f64cbad3c833b8884b27000000000200000000001066000000010000200000008b6f4083707cb7c86212d0fd47963239080e925be445f73cdd21b26e440d56f2000000000e80000000020000200000005ea217555c20118c6d4f8ec3ac37f3054ccd6b29490ad1a30a46eca16f8ef29b20000000c819f041d53c727f0d849469a89666a1da2ce4d4795142e61d433a9524d03a994000000035d1d33911626e79509924685256a31ac20c7ee0cc76e4c26419bbf2cb60e1b8930e7eb4573f61210cad07ada42580899a96a76369fd07078c18ecae0762f13b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ad98e1c4c5c1f64cbad3c833b8884b27000000000200000000001066000000010000200000009ca586b173f3aee4da66c5e9291a1bdfa43ebacdce0a3d2acac482a0b5423b5c000000000e80000000020000200000003b7863a3ba6d2e65b8281803cb65c6eee45b4325a53f54b08e9431586092393320000000614e4f1893c1fc8f33cf70768449ce2841006d1764cccdc349746bf59a1e24b040000000c0fa7909f86dd387c82b845031a15cb5bc1be49dcbd4f6b4c647b9b005b3cafc390d427166cf84aa9b5f94a609170b798a238befd7d41044b474365e5177797c iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20136d51ae68d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 3572 iexplore.exe 2628 iexplore.exe 2704 iexplore.exe 2196 iexplore.exe 208 iexplore.exe 2288 iexplore.exe 4012 iexplore.exe 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 3572 iexplore.exe 3572 iexplore.exe 1340 IEXPLORE.EXE 1340 IEXPLORE.EXE 2628 iexplore.exe 2628 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2704 iexplore.exe 2704 iexplore.exe 3836 IEXPLORE.EXE 3836 IEXPLORE.EXE 2196 iexplore.exe 2196 iexplore.exe 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 208 iexplore.exe 208 iexplore.exe 3640 IEXPLORE.EXE 3640 IEXPLORE.EXE 2288 iexplore.exe 2288 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 4012 iexplore.exe 4012 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 2664 iexplore.exe 2664 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 3572 wrote to memory of 1340 3572 iexplore.exe IEXPLORE.EXE PID 3572 wrote to memory of 1340 3572 iexplore.exe IEXPLORE.EXE PID 3572 wrote to memory of 1340 3572 iexplore.exe IEXPLORE.EXE PID 2628 wrote to memory of 2348 2628 iexplore.exe IEXPLORE.EXE PID 2628 wrote to memory of 2348 2628 iexplore.exe IEXPLORE.EXE PID 2628 wrote to memory of 2348 2628 iexplore.exe IEXPLORE.EXE PID 2704 wrote to memory of 3836 2704 iexplore.exe IEXPLORE.EXE PID 2704 wrote to memory of 3836 2704 iexplore.exe IEXPLORE.EXE PID 2704 wrote to memory of 3836 2704 iexplore.exe IEXPLORE.EXE PID 2196 wrote to memory of 1724 2196 iexplore.exe IEXPLORE.EXE PID 2196 wrote to memory of 1724 2196 iexplore.exe IEXPLORE.EXE PID 2196 wrote to memory of 1724 2196 iexplore.exe IEXPLORE.EXE PID 208 wrote to memory of 3640 208 iexplore.exe IEXPLORE.EXE PID 208 wrote to memory of 3640 208 iexplore.exe IEXPLORE.EXE PID 208 wrote to memory of 3640 208 iexplore.exe IEXPLORE.EXE PID 2288 wrote to memory of 2788 2288 iexplore.exe IEXPLORE.EXE PID 2288 wrote to memory of 2788 2288 iexplore.exe IEXPLORE.EXE PID 2288 wrote to memory of 2788 2288 iexplore.exe IEXPLORE.EXE PID 4012 wrote to memory of 1664 4012 iexplore.exe IEXPLORE.EXE PID 4012 wrote to memory of 1664 4012 iexplore.exe IEXPLORE.EXE PID 4012 wrote to memory of 1664 4012 iexplore.exe IEXPLORE.EXE PID 2664 wrote to memory of 2652 2664 iexplore.exe IEXPLORE.EXE PID 2664 wrote to memory of 2652 2664 iexplore.exe IEXPLORE.EXE PID 2664 wrote to memory of 2652 2664 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\31b94c5a94aa8ce7e187360b0dc702b473d1c5d498d4de26f137b272ccbadaed.exe"C:\Users\Admin\AppData\Local\Temp\31b94c5a94aa8ce7e187360b0dc702b473d1c5d498d4de26f137b272ccbadaed.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3572 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:208 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4012 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
0675c0d0da9a6eac284a10c2ddda636a
SHA16c7856ef6be6b6fce283423cf9d48e7d101d7fa7
SHA2567852903b2b3bd59c816aa0a74272a4c51bae13f38bb72a67f3fd04b50d061b50
SHA51209a3f652bd943a7cc3def436c9fe769bf5c30499b78d63598fc2fc23fa15932a08d545354129fc346133efbda456edfe8d4a10bab5a50abe7d132c2228815232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4MD5
33903bc82111f229f0d3253b54e7dc56
SHA13c251b0440960195337ed9608a786a5aa44adea5
SHA256a5599d4d4c3755410c3f394e1351e788375e8e487b9b4525e2e671ce9a9262c5
SHA512a374919bb96e04dcd17038ef8638c22602e8969e2b6ace2060beec85dc39781bfcaa1bf31ab54898e1279d05c71d37a78d92c43d3679ce1df890d08799419795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9E1A1F5F9038B3A725570AC643199BE3MD5
1f2bc239e5eaee908952ee78fc85d40a
SHA11c6ec44ebf112b4114d88a4cb9481d8256560bcc
SHA25658cc42d2628227c13950db87d60e23784bcef3e10be7ab198afc854923feee15
SHA5128b1a1d18693e94a75bf09aa2de7e832ad1caf08eb558897fcfa5ba5c3c5b3111dd027171bfe6f695558ba2ae2e8e13f98d9389dd8282d56b6f6244385e26ba3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
fdef5c11ee92b462052c1c2facf26aaf
SHA192b66da10004c8f3a999472632d44f2955616e61
SHA2569904144e4ebbc8f5a0cd15bd6d6809a86c1eabc36e380671408945348a589a5f
SHA51257615bbf82c8e0b11d1ee15b3ab0a6a654e39e8d892bfa647a2f793238f843075f4a580d2b7565d27967fba8bf15e5830dca36947102439f66ad40d0b8621007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4MD5
d01fb56de6abe5685bbfb53ba3141cc7
SHA1d511a76d72841814c22e3981709ab7800e3c97ea
SHA256fbade0dcd6b3625d5a9c3cfa9ac5ab62ccc72602689d1b3ad28eb405183bfb28
SHA5123375b2c0216fc74dede95a29303926d6e04ca316c74f86b2688e7717b4ba21a0fac30645a68988260b1a834fcdbad8155362f2cc58d314206eccd56a94422170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9E1A1F5F9038B3A725570AC643199BE3MD5
ea28d40a1076ccf0ac5c3df1519adb1e
SHA177d71cfaaf58be98894798d24404ee5f567b94e6
SHA256ddfbde88bca64727ba692fc7f186391f15e0f444dc0eeb36c7600816a8234d14
SHA51206d1323145a7f59c7e1b5a1f16c240d947af7042f2e64c2923bfcedf0976832bc8382a807a6881474d0263f3dc37e9d1815aad40e318070f61359dfed1349719
-
memory/208-133-0x00007FF97CB60000-0x00007FF97CBCB000-memory.dmpFilesize
428KB
-
memory/1340-120-0x0000000000000000-mapping.dmp
-
memory/1664-138-0x0000000000000000-mapping.dmp
-
memory/1724-132-0x0000000000000000-mapping.dmp
-
memory/2196-131-0x00007FF97CB60000-0x00007FF97CBCB000-memory.dmpFilesize
428KB
-
memory/2288-135-0x00007FF97CB60000-0x00007FF97CBCB000-memory.dmpFilesize
428KB
-
memory/2348-122-0x0000000000000000-mapping.dmp
-
memory/2628-121-0x00007FF97BEB0000-0x00007FF97BF1B000-memory.dmpFilesize
428KB
-
memory/2652-140-0x0000000000000000-mapping.dmp
-
memory/2664-139-0x00007FF97D330000-0x00007FF97D39B000-memory.dmpFilesize
428KB
-
memory/2704-129-0x00007FF97BEB0000-0x00007FF97BF1B000-memory.dmpFilesize
428KB
-
memory/2788-136-0x0000000000000000-mapping.dmp
-
memory/3572-119-0x00007FF96C9B0000-0x00007FF96CA1B000-memory.dmpFilesize
428KB
-
memory/3640-134-0x0000000000000000-mapping.dmp
-
memory/3836-130-0x0000000000000000-mapping.dmp
-
memory/3904-114-0x0000000000560000-0x0000000000570000-memory.dmpFilesize
64KB
-
memory/3904-118-0x0000000001000000-0x00000000014EC000-memory.dmpFilesize
4.9MB
-
memory/3904-117-0x0000000000400000-0x00000000004AE000-memory.dmpFilesize
696KB
-
memory/4012-137-0x00007FF97CB60000-0x00007FF97CBCB000-memory.dmpFilesize
428KB