Analysis
-
max time kernel
330s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-07-2022 14:57
Static task
static1
Behavioral task
behavioral1
Sample
2a00d95b47cb04f233ce7351b842234410ec89c455f7515e8234b4d350b99406.html
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2a00d95b47cb04f233ce7351b842234410ec89c455f7515e8234b4d350b99406.html
Resource
win10v2004-20220414-en
General
-
Target
2a00d95b47cb04f233ce7351b842234410ec89c455f7515e8234b4d350b99406.html
-
Size
839KB
-
MD5
6742059d39462d81438ef4d97af53d43
-
SHA1
f6441fe1691cc77b400fadf210db421ada166b18
-
SHA256
2a00d95b47cb04f233ce7351b842234410ec89c455f7515e8234b4d350b99406
-
SHA512
ba92c3fbcb62c15008f146fde736fea857da02d776b13b8992ab8cbfce62d1ab1046e0cb0b1373d5092a4f9040853268df8bfda5e6faa14c970ce2e2a1a43ba5
Malware Config
Extracted
qakbot
403.780
obama199
1657265474
121.7.223.45:2222
67.209.195.198:443
148.64.96.100:443
92.132.132.81:2222
217.128.122.65:2222
47.180.172.159:443
173.174.216.62:443
70.46.220.114:443
32.221.224.140:995
69.14.172.24:443
117.248.109.38:21
94.59.15.180:2222
38.70.253.226:2222
217.165.157.202:995
41.228.22.180:443
67.165.206.193:993
172.115.177.204:2222
186.90.153.162:2222
47.23.89.60:993
120.150.218.241:995
93.48.80.198:995
89.211.209.234:2222
197.89.12.70:443
208.107.221.224:443
24.178.196.158:2222
66.230.104.103:443
118.161.14.242:995
24.158.23.166:995
100.38.242.113:995
37.208.132.76:50010
63.143.92.99:995
182.191.92.203:995
86.97.246.166:1194
74.14.5.179:2222
40.134.246.185:995
111.125.245.116:995
173.21.10.71:2222
76.25.142.196:443
142.186.49.224:2222
118.161.14.242:443
174.69.215.101:443
187.172.164.12:443
129.208.151.177:995
70.51.137.244:2222
190.252.242.69:443
24.55.67.176:443
103.246.242.202:443
89.101.97.139:443
47.156.129.52:443
72.252.157.93:993
72.252.157.93:990
72.252.157.93:995
177.94.65.26:32101
24.139.72.117:443
82.41.63.217:443
179.158.105.44:443
81.132.186.218:2078
201.172.20.167:2222
37.186.58.99:995
37.34.253.233:443
125.25.133.223:443
45.241.254.69:993
39.49.41.221:995
196.203.37.215:80
88.240.59.52:443
39.44.60.200:995
86.97.10.37:443
86.98.157.114:993
109.12.111.14:443
81.193.30.90:443
39.52.59.221:995
39.41.16.210:995
106.51.48.188:50001
86.97.209.138:2222
104.34.212.7:32103
86.213.75.30:2078
45.46.53.140:2222
39.57.56.11:995
84.241.8.23:32103
2.178.166.220:61202
24.43.99.75:443
101.50.67.155:995
41.13.224.28:443
108.56.213.219:995
189.253.167.141:443
5.32.41.45:443
120.61.1.141:443
177.189.180.214:32101
94.36.193.176:2222
39.53.124.57:995
80.11.74.81:2222
41.84.224.109:443
103.116.178.85:995
209.15.76.228:443
184.97.29.26:443
102.65.66.66:443
39.52.221.9:995
191.112.26.57:443
210.246.4.69:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 468 regsvr32.exe 1548 regsvr32.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = d0ab05d3a297d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f00b79e9a297d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "364582831" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F5E7621-0396-11ED-BA7D-66DE0394A5F7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e22113735f0a1f4cbb35e0cafcd63bd30000000002000000000010660000000100002000000034a69961a420f1c1f0dfcbe0ec34b9715f22920fb68311f5c9780c8e0769b76e000000000e80000000020000200000004f30361eb023d8a349ae224746967eeddbe85b87971c815a8a98b7e7d843bb7a200000001c7880420507406ab5bf2d397cad119b323af1e70fd0831c34eb8524eb1815724000000052d577e51044a1a86b06d8a55af7b16c2477d3d07e2a57088af53382f3acb8521ecfa7e0c5cf8c8858ef9545645710198080d45f888f4e9b5f516667bfcb3ccd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = f042fd4ba397d801 powershell.exe -
Modifies registry class 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exeexplorer.exeregsvr32.exepowershell.exepid process 468 regsvr32.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1548 regsvr32.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1516 powershell.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe 1876 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 468 regsvr32.exe 1548 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
AUDIODG.EXE7zG.exepowershell.exedescription pid process Token: 33 1224 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1224 AUDIODG.EXE Token: 33 1224 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1224 AUDIODG.EXE Token: SeRestorePrivilege 432 7zG.exe Token: 35 432 7zG.exe Token: SeSecurityPrivilege 432 7zG.exe Token: SeSecurityPrivilege 432 7zG.exe Token: SeDebugPrivilege 1516 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exe7zG.exepid process 1084 iexplore.exe 1084 iexplore.exe 432 7zG.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEAcroRd32.exepid process 1084 iexplore.exe 1084 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 528 AcroRd32.exe 528 AcroRd32.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
iexplore.exerundll32.exeregsvr32.exeregsvr32.exeexplorer.exeregsvr32.exeregsvr32.exetaskeng.exedescription pid process target process PID 1084 wrote to memory of 1704 1084 iexplore.exe IEXPLORE.EXE PID 1084 wrote to memory of 1704 1084 iexplore.exe IEXPLORE.EXE PID 1084 wrote to memory of 1704 1084 iexplore.exe IEXPLORE.EXE PID 1084 wrote to memory of 1704 1084 iexplore.exe IEXPLORE.EXE PID 1084 wrote to memory of 1064 1084 iexplore.exe rundll32.exe PID 1084 wrote to memory of 1064 1084 iexplore.exe rundll32.exe PID 1084 wrote to memory of 1064 1084 iexplore.exe rundll32.exe PID 1064 wrote to memory of 528 1064 rundll32.exe AcroRd32.exe PID 1064 wrote to memory of 528 1064 rundll32.exe AcroRd32.exe PID 1064 wrote to memory of 528 1064 rundll32.exe AcroRd32.exe PID 1064 wrote to memory of 528 1064 rundll32.exe AcroRd32.exe PID 1292 wrote to memory of 468 1292 regsvr32.exe regsvr32.exe PID 1292 wrote to memory of 468 1292 regsvr32.exe regsvr32.exe PID 1292 wrote to memory of 468 1292 regsvr32.exe regsvr32.exe PID 1292 wrote to memory of 468 1292 regsvr32.exe regsvr32.exe PID 1292 wrote to memory of 468 1292 regsvr32.exe regsvr32.exe PID 1292 wrote to memory of 468 1292 regsvr32.exe regsvr32.exe PID 1292 wrote to memory of 468 1292 regsvr32.exe regsvr32.exe PID 468 wrote to memory of 1876 468 regsvr32.exe explorer.exe PID 468 wrote to memory of 1876 468 regsvr32.exe explorer.exe PID 468 wrote to memory of 1876 468 regsvr32.exe explorer.exe PID 468 wrote to memory of 1876 468 regsvr32.exe explorer.exe PID 468 wrote to memory of 1876 468 regsvr32.exe explorer.exe PID 468 wrote to memory of 1876 468 regsvr32.exe explorer.exe PID 1876 wrote to memory of 1956 1876 explorer.exe schtasks.exe PID 1876 wrote to memory of 1956 1876 explorer.exe schtasks.exe PID 1876 wrote to memory of 1956 1876 explorer.exe schtasks.exe PID 1876 wrote to memory of 1956 1876 explorer.exe schtasks.exe PID 1824 wrote to memory of 1548 1824 regsvr32.exe regsvr32.exe PID 1824 wrote to memory of 1548 1824 regsvr32.exe regsvr32.exe PID 1824 wrote to memory of 1548 1824 regsvr32.exe regsvr32.exe PID 1824 wrote to memory of 1548 1824 regsvr32.exe regsvr32.exe PID 1824 wrote to memory of 1548 1824 regsvr32.exe regsvr32.exe PID 1824 wrote to memory of 1548 1824 regsvr32.exe regsvr32.exe PID 1824 wrote to memory of 1548 1824 regsvr32.exe regsvr32.exe PID 1548 wrote to memory of 1488 1548 regsvr32.exe explorer.exe PID 1548 wrote to memory of 1488 1548 regsvr32.exe explorer.exe PID 1548 wrote to memory of 1488 1548 regsvr32.exe explorer.exe PID 1548 wrote to memory of 1488 1548 regsvr32.exe explorer.exe PID 1548 wrote to memory of 1488 1548 regsvr32.exe explorer.exe PID 1548 wrote to memory of 1488 1548 regsvr32.exe explorer.exe PID 884 wrote to memory of 1516 884 taskeng.exe powershell.exe PID 884 wrote to memory of 1516 884 taskeng.exe powershell.exe PID 884 wrote to memory of 1516 884 taskeng.exe powershell.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a00d95b47cb04f233ce7351b842234410ec89c455f7515e8234b4d350b99406.html1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Downloads\FXS_59799002⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\FXS_5979900"3⤵
- Suspicious use of SetWindowsHookEx
PID:528
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1916
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5641⤵
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\Downloads\FXS_5979900\1395\FXS_5979900.iso"1⤵PID:1464
-
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\Downloads\FXS_5979900\1395\FXS_5979900.iso"1⤵PID:1696
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\FXS_5979900\1395\" -an -ai#7zMap14821:118:7zEvent171451⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:432
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" data\assets\images\ilHD.dat1⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\regsvr32.exedata\assets\images\ilHD.dat2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:01 /tn jupgyfodj /ET 17:12 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEQAbwB3AG4AbABvAGEAZABzAFwARgBYAFMAXwA1ADkANwA5ADkAMAAwAFwAMQAzADkANQBcAGQAYQB0AGEAXABhAHMAcwBlAHQAcwBcAGkAbQBhAGcAZQBzAFwAaQBsAEgARAAuAGQAYQB0ACIA" /SC ONCE4⤵
- Creates scheduled task(s)
PID:1956
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" data\assets\images\ilHD.dat1⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\regsvr32.exedata\assets\images\ilHD.dat2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:1488
-
C:\Windows\system32\taskeng.exetaskeng.exe {55EBF041-58CB-40D0-87DC-CB4A1063B418} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEQAbwB3AG4AbABvAGEAZABzAFwARgBYAFMAXwA1ADkANwA5ADkAMAAwAFwAMQAzADkANQBcAGQAYQB0AGEAXABhAHMAcwBlAHQAcwBcAGkAbQBhAGcAZQBzAFwAaQBsAEgARAAuAGQAYQB0AC2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5941e4f10a7608ad6cda011f0c8ba7d1d
SHA1b90a13c277e9578673fd2861b62539c38b7ffa2e
SHA256606f5c5ec6f107925c8baeb6b411b4f6d7ff8e253aa9e9f09989387a8cc95c86
SHA512d9e1e68bf4f769b5569296e52dc0e8f80b1967d9ce861906c1c04cee5b591106a0cab57689093ef86c526e0ac65453ad172217ecc3f2e3e79edd0564661430b5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Z0IY7AWK.txtFilesize
604B
MD5617bee706999ddeb84ab8c419e570378
SHA12fce76c3673dfa160a71074f777417078c7b95b9
SHA256fb0865873adcd514262aa9bda74a9b0b0a092d5756673cedf69631c1583662c0
SHA512c9c45a00d228f068a06cf70b642258e1dc70c7dcdc29edbaadfe1b81e0b414427164348309ffb47c505f922f5f423c77fbf710d2d5d18c499de195598e6da144
-
C:\Users\Admin\Downloads\FXS_5979900.3n9i74q.partialFilesize
457KB
MD5f9df78130be1d212ded36a820be9d61b
SHA1e0abc1483e65d83fe3414fc8ecc734473a0d9b78
SHA256d3355c4e4f690977831dbdb223cfb0b861cc6f06cf359e2da88efa6e205d13d0
SHA5120bad7d5ca6fcc6228efbe88eea952cf1cf763c459403f44fae9cc9e0fa3a6709ed1154ddf8183965c32202feb2142291e9f995be7ddcd10258bbcba63390a7ae
-
C:\Users\Admin\Downloads\FXS_5979900\1395\data\assets\images\ilHD.datFilesize
670KB
MD51f7dd197ecf193e23a0c329568c65696
SHA1556615a28102c40f67c9d09c828675bdb950557a
SHA25601090ff0d968128575357b9841a3a8d6837b6e13c7b309f656f4543a2181b551
SHA512221c549f6e9e3f3e96957bcf84085a5882efc394e16a6d9a445c1a806f55f46cabd3ddaf2eafb6f9b6ef7821c0647ee345c27b3b000ec21abe91bf215e73fca8
-
C:\Users\Admin\Downloads\FXS_5979900\1395\data\assets\images\ilHD.datFilesize
670KB
MD51f7dd197ecf193e23a0c329568c65696
SHA1556615a28102c40f67c9d09c828675bdb950557a
SHA25601090ff0d968128575357b9841a3a8d6837b6e13c7b309f656f4543a2181b551
SHA512221c549f6e9e3f3e96957bcf84085a5882efc394e16a6d9a445c1a806f55f46cabd3ddaf2eafb6f9b6ef7821c0647ee345c27b3b000ec21abe91bf215e73fca8
-
\Users\Admin\Downloads\FXS_5979900\1395\DATA\ASSETS\IMAGES\ILHD.DATFilesize
670KB
MD51f7dd197ecf193e23a0c329568c65696
SHA1556615a28102c40f67c9d09c828675bdb950557a
SHA25601090ff0d968128575357b9841a3a8d6837b6e13c7b309f656f4543a2181b551
SHA512221c549f6e9e3f3e96957bcf84085a5882efc394e16a6d9a445c1a806f55f46cabd3ddaf2eafb6f9b6ef7821c0647ee345c27b3b000ec21abe91bf215e73fca8
-
\Users\Admin\Downloads\FXS_5979900\1395\DATA\ASSETS\IMAGES\ILHD.DATFilesize
670KB
MD51f7dd197ecf193e23a0c329568c65696
SHA1556615a28102c40f67c9d09c828675bdb950557a
SHA25601090ff0d968128575357b9841a3a8d6837b6e13c7b309f656f4543a2181b551
SHA512221c549f6e9e3f3e96957bcf84085a5882efc394e16a6d9a445c1a806f55f46cabd3ddaf2eafb6f9b6ef7821c0647ee345c27b3b000ec21abe91bf215e73fca8
-
memory/468-74-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/468-80-0x00000000002D0000-0x00000000002F2000-memory.dmpFilesize
136KB
-
memory/468-70-0x0000000001E70000-0x0000000001F1A000-memory.dmpFilesize
680KB
-
memory/468-71-0x00000000002D0000-0x00000000002F2000-memory.dmpFilesize
136KB
-
memory/468-73-0x00000000002D0000-0x00000000002F2000-memory.dmpFilesize
136KB
-
memory/468-72-0x00000000002D0000-0x00000000002F2000-memory.dmpFilesize
136KB
-
memory/468-75-0x00000000002D0000-0x00000000002F2000-memory.dmpFilesize
136KB
-
memory/468-76-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/468-67-0x0000000000000000-mapping.dmp
-
memory/528-58-0x0000000075CF1000-0x0000000075CF3000-memory.dmpFilesize
8KB
-
memory/528-57-0x0000000000000000-mapping.dmp
-
memory/1064-56-0x000007FEFB8E1000-0x000007FEFB8E3000-memory.dmpFilesize
8KB
-
memory/1064-55-0x0000000000000000-mapping.dmp
-
memory/1488-101-0x00000000000E0000-0x0000000000102000-memory.dmpFilesize
136KB
-
memory/1488-100-0x00000000000E0000-0x0000000000102000-memory.dmpFilesize
136KB
-
memory/1488-96-0x0000000000000000-mapping.dmp
-
memory/1516-105-0x000007FEF2B60000-0x000007FEF36BD000-memory.dmpFilesize
11.4MB
-
memory/1516-106-0x0000000001124000-0x0000000001127000-memory.dmpFilesize
12KB
-
memory/1516-104-0x000007FEF36C0000-0x000007FEF40E3000-memory.dmpFilesize
10.1MB
-
memory/1516-102-0x0000000000000000-mapping.dmp
-
memory/1516-107-0x0000000001124000-0x0000000001127000-memory.dmpFilesize
12KB
-
memory/1548-93-0x00000000001F0000-0x0000000000270000-memory.dmpFilesize
512KB
-
memory/1548-89-0x00000000003A0000-0x000000000044A000-memory.dmpFilesize
680KB
-
memory/1548-92-0x00000000002A0000-0x00000000002C2000-memory.dmpFilesize
136KB
-
memory/1548-94-0x00000000002A0000-0x00000000002C2000-memory.dmpFilesize
136KB
-
memory/1548-95-0x00000000001F0000-0x0000000000270000-memory.dmpFilesize
512KB
-
memory/1548-90-0x00000000002A0000-0x00000000002C2000-memory.dmpFilesize
136KB
-
memory/1548-99-0x00000000002A0000-0x00000000002C2000-memory.dmpFilesize
136KB
-
memory/1548-91-0x00000000002A0000-0x00000000002C2000-memory.dmpFilesize
136KB
-
memory/1548-86-0x0000000000000000-mapping.dmp
-
memory/1876-83-0x00000000000E0000-0x0000000000102000-memory.dmpFilesize
136KB
-
memory/1876-81-0x00000000000E0000-0x0000000000102000-memory.dmpFilesize
136KB
-
memory/1876-79-0x0000000070F61000-0x0000000070F63000-memory.dmpFilesize
8KB
-
memory/1876-77-0x0000000000000000-mapping.dmp
-
memory/1956-82-0x0000000000000000-mapping.dmp