Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
08-08-2022 03:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://141.98.6.236/TPBActivetor/ZvfejoxpnTPBA-1.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
http://141.98.6.236/TPBActivetor/ZvfejoxpnTPBA-1.exe
Resource
win10v2004-20220721-en
General
-
Target
http://141.98.6.236/TPBActivetor/ZvfejoxpnTPBA-1.exe
Malware Config
Extracted
redline
TPB-ACTIVATOR
amrican-sport-live-stream.cc:4581
-
auth_value
df7c91432437b11d8f25d54ba7832b8d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/276-62-0x0000000000400000-0x0000000000444000-memory.dmp family_redline behavioral1/memory/276-63-0x0000000000400000-0x0000000000444000-memory.dmp family_redline behavioral1/memory/276-64-0x0000000000400000-0x0000000000444000-memory.dmp family_redline behavioral1/memory/276-65-0x000000000043E6BE-mapping.dmp family_redline behavioral1/memory/276-67-0x0000000000400000-0x0000000000444000-memory.dmp family_redline behavioral1/memory/276-69-0x0000000000400000-0x0000000000444000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
ZvfejoxpnTPBA-1.exepid process 1912 ZvfejoxpnTPBA-1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ZvfejoxpnTPBA-1.exedescription pid process target process PID 1912 set thread context of 276 1912 ZvfejoxpnTPBA-1.exe RegAsm.exe -
Drops file in Windows directory 2 IoCs
Processes:
iexplore.exedescription ioc process File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe iexplore.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe iexplore.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = f0b02b6debaad801 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ee7c7febaad801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A595C481-16DE-11ED-A2C6-4A5220D6602E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "366703079" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004281fce5e1fefc478c7ba169937a5e5f00000000020000000000106600000001000020000000999ef2efbe45869303117f5831b893225b57f3ea605069d2d4cfcb91bd80fe3b000000000e80000000020000200000005f96741828fb5510aebc7e828398c88a9f07b2fa96888bb4b694da13e90b995e90000000af06808a07f9fc8d683e1a90df73f8258e7bf199eb5a024684966582dcc22c3a90f0b03b0202de0914a2c52ef6434f9d05e2b5cae2a74c8d2a834c65e299cfd4168e645233a0db6ce232f5e07f1aba2f90a2142ce66798c19f7241d24c5878546dd3309498ed0d684f802f33e0f4b8eee9c6c364e39e772bab1809378f27e17bce5bc04fddaa3123137c32d7c1d8fdcb40000000f6972407f963fef5e7c3e7948ecb4539dbfa97881ecb989fdee789375065108e6b8bef57891f73f9c970f73c05e0d1b67987f2d88ec5fed525c821b329520fda iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004281fce5e1fefc478c7ba169937a5e5f000000000200000000001066000000010000200000002d9f367877f8a22071f9e3d82baf23271328c5ba76685648adabe0a09d28d9a8000000000e8000000002000020000000ca8dfd93646b394878bb850b8ad13d12ba49d6fc0472f107f1ea78e2d8c9394d2000000089299defbd8b781a4546bdffb57aa7ea043e51f2c69d9ad38a02137271c5435340000000316ecf3b1dffe615415e7c336560c8ab4bd933b57ebe96d31d390881e170742858edbea39589d210559235824a3850e21e7c0161b4c1a1f8d5f1ed13bb1d18b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Modifies registry class 48 IoCs
Processes:
iexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_Classes\Local Settings iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0c00000050000000a66a63283d95d211b5d600c04fd918d00b0000007800000030f125b7ef471a10a5f102608c9eebac0e00000078000000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 200000001a00eebbfe230000100090e24d373f126545916439c4925e467b00000000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlot = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
ZvfejoxpnTPBA-1.exepid process 1912 ZvfejoxpnTPBA-1.exe 1912 ZvfejoxpnTPBA-1.exe 1912 ZvfejoxpnTPBA-1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ZvfejoxpnTPBA-1.exedescription pid process Token: SeDebugPrivilege 1912 ZvfejoxpnTPBA-1.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 640 iexplore.exe 640 iexplore.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 640 iexplore.exe 640 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 640 iexplore.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
iexplore.exeZvfejoxpnTPBA-1.exedescription pid process target process PID 640 wrote to memory of 1988 640 iexplore.exe IEXPLORE.EXE PID 640 wrote to memory of 1988 640 iexplore.exe IEXPLORE.EXE PID 640 wrote to memory of 1988 640 iexplore.exe IEXPLORE.EXE PID 640 wrote to memory of 1988 640 iexplore.exe IEXPLORE.EXE PID 1912 wrote to memory of 276 1912 ZvfejoxpnTPBA-1.exe RegAsm.exe PID 1912 wrote to memory of 276 1912 ZvfejoxpnTPBA-1.exe RegAsm.exe PID 1912 wrote to memory of 276 1912 ZvfejoxpnTPBA-1.exe RegAsm.exe PID 1912 wrote to memory of 276 1912 ZvfejoxpnTPBA-1.exe RegAsm.exe PID 1912 wrote to memory of 276 1912 ZvfejoxpnTPBA-1.exe RegAsm.exe PID 1912 wrote to memory of 276 1912 ZvfejoxpnTPBA-1.exe RegAsm.exe PID 1912 wrote to memory of 276 1912 ZvfejoxpnTPBA-1.exe RegAsm.exe PID 1912 wrote to memory of 276 1912 ZvfejoxpnTPBA-1.exe RegAsm.exe PID 1912 wrote to memory of 276 1912 ZvfejoxpnTPBA-1.exe RegAsm.exe PID 1912 wrote to memory of 276 1912 ZvfejoxpnTPBA-1.exe RegAsm.exe PID 1912 wrote to memory of 276 1912 ZvfejoxpnTPBA-1.exe RegAsm.exe PID 1912 wrote to memory of 276 1912 ZvfejoxpnTPBA-1.exe RegAsm.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://141.98.6.236/TPBActivetor/ZvfejoxpnTPBA-1.exe1⤵
- Drops file in Windows directory
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\ZvfejoxpnTPBA-1.exe"C:\Users\Admin\Desktop\ZvfejoxpnTPBA-1.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IPWD9PJW.txtFilesize
608B
MD5269049ed74dd3630e49fa63a55f22d02
SHA177baa0b13649ab3297f2e44c95b0b4c509927893
SHA2565dfaf376adb4b0a45c3be3ebd59ff1a0f809a2c58e87e7a4ecab780c9f281fa3
SHA512fef79902c636dd87805b66d06ec929f219fcab3b2298bedabcb7acff3deb52f33ff4ad0e76fbb4e0a84afcbc26346ecede63b5eda0e15c3439ed75cb3439a37e
-
C:\Users\Admin\Desktop\ZvfejoxpnTPBA-1.exeFilesize
783KB
MD5f84905c8ef2f1a66d371f78f5eef018c
SHA1db9b70232eec3d62d2c7bb6a2ae2bdb637286760
SHA256dcf6833e580432fec0174bdb64dced1e9e9abf086a77a5799138d807499a22f7
SHA512ffe297457c73e1497a7dea57ede5ad4b2c694c6b785d7981454b860aae72a176f656ab6903d931a76fabe26f7ae12c6eb547b179402a1cb9d934701fe214140f
-
C:\Users\Admin\Desktop\ZvfejoxpnTPBA-1.exe.3igqf70.partialFilesize
783KB
MD5f84905c8ef2f1a66d371f78f5eef018c
SHA1db9b70232eec3d62d2c7bb6a2ae2bdb637286760
SHA256dcf6833e580432fec0174bdb64dced1e9e9abf086a77a5799138d807499a22f7
SHA512ffe297457c73e1497a7dea57ede5ad4b2c694c6b785d7981454b860aae72a176f656ab6903d931a76fabe26f7ae12c6eb547b179402a1cb9d934701fe214140f
-
memory/276-69-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/276-59-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/276-60-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/276-62-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/276-63-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/276-64-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/276-65-0x000000000043E6BE-mapping.dmp
-
memory/276-67-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/276-70-0x0000000076921000-0x0000000076923000-memory.dmpFilesize
8KB
-
memory/276-71-0x00000000003C0000-0x00000000003C6000-memory.dmpFilesize
24KB
-
memory/1912-58-0x0000000000800000-0x0000000000892000-memory.dmpFilesize
584KB
-
memory/1912-57-0x0000000000300000-0x0000000000370000-memory.dmpFilesize
448KB
-
memory/1912-56-0x00000000008A0000-0x000000000096A000-memory.dmpFilesize
808KB