Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-08-2022 16:25
Static task
static1
Behavioral task
behavioral1
Sample
d4216a074263ea8b5346c98fce937390.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4216a074263ea8b5346c98fce937390.exe
Resource
win10v2004-20220812-en
General
-
Target
d4216a074263ea8b5346c98fce937390.exe
-
Size
1.1MB
-
MD5
d4216a074263ea8b5346c98fce937390
-
SHA1
dd53f20dfa19976ec6a0e0ed9519c96e0384f893
-
SHA256
03aa04ba5e33493632300e4eebfa03226d2e1c2154750b373819c2907428892b
-
SHA512
2e8c8ffc9df499f7405d5dbe5eacad37b1eb8e5f68c9f3e15bb0d87a15fbeca691e2708da5ce59eb3e744b70231a7955eb2f8e75c8b09e3d65c628e37a9bc17d
Malware Config
Extracted
redline
nam3
103.89.90.61:34589
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
redline
5
176.113.115.146:9582
-
auth_value
d38b30c1ccd6c1e5088d9e5bd9e51b0f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 8 IoCs
Processes:
resource yara_rule \Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline \Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline behavioral1/memory/1492-84-0x0000000001220000-0x0000000001240000-memory.dmp family_redline behavioral1/memory/1688-83-0x0000000000900000-0x0000000000944000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
F0geI.exekukurzka9000.exenamdoitntn.exesafert44.exereal.exeme.exepid process 820 F0geI.exe 1760 kukurzka9000.exe 1492 namdoitntn.exe 1688 safert44.exe 1712 real.exe 876 me.exe -
Loads dropped DLL 10 IoCs
Processes:
d4216a074263ea8b5346c98fce937390.exepid process 1196 d4216a074263ea8b5346c98fce937390.exe 1196 d4216a074263ea8b5346c98fce937390.exe 1196 d4216a074263ea8b5346c98fce937390.exe 1196 d4216a074263ea8b5346c98fce937390.exe 1196 d4216a074263ea8b5346c98fce937390.exe 1196 d4216a074263ea8b5346c98fce937390.exe 1196 d4216a074263ea8b5346c98fce937390.exe 1196 d4216a074263ea8b5346c98fce937390.exe 1196 d4216a074263ea8b5346c98fce937390.exe 1196 d4216a074263ea8b5346c98fce937390.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 6 IoCs
Processes:
d4216a074263ea8b5346c98fce937390.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\F0geI.exe d4216a074263ea8b5346c98fce937390.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe d4216a074263ea8b5346c98fce937390.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe d4216a074263ea8b5346c98fce937390.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\real.exe d4216a074263ea8b5346c98fce937390.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\safert44.exe d4216a074263ea8b5346c98fce937390.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\me.exe d4216a074263ea8b5346c98fce937390.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
me.exereal.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString me.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 real.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString real.exe -
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "367352887" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98BAEC11-1CC7-11ED-A6E1-52E8C5FCC7C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a30000000002000000000010660000000100002000000042b7f2b5f92e9780a5b51b7b8e44358ae6afa2e7fbe72009f607ca154a748229000000000e8000000002000020000000c57efb31c2a19304caea45ab1cb3fe68d39a93000a1799e8bd3b8e17ec2605f2200000009c72600a1c5b6d9baa5c6579fe23e1be169ab17804cc74dcf5e0d1933b8872db4000000027d6ef8eb423fb50b39dab89b1a2178e092e6d5ab93929f7e0881d15aee4b50d48e379c5f2cb495a6364c163ba8053ed09cdd13e8d02a30b1788d7a66d3a3b4a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98C35081-1CC7-11ED-A6E1-52E8C5FCC7C7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98BAC501-1CC7-11ED-A6E1-52E8C5FCC7C7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98B9DAA1-1CC7-11ED-A6E1-52E8C5FCC7C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
me.exenamdoitntn.exesafert44.exereal.exepid process 876 me.exe 1492 namdoitntn.exe 1688 safert44.exe 1712 real.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
namdoitntn.exesafert44.exedescription pid process Token: SeDebugPrivilege 1492 namdoitntn.exe Token: SeDebugPrivilege 1688 safert44.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 1748 iexplore.exe 824 iexplore.exe 608 iexplore.exe 884 iexplore.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 884 iexplore.exe 884 iexplore.exe 1748 iexplore.exe 1748 iexplore.exe 824 iexplore.exe 824 iexplore.exe 608 iexplore.exe 608 iexplore.exe 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 332 IEXPLORE.EXE 332 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
d4216a074263ea8b5346c98fce937390.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 1196 wrote to memory of 884 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 884 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 884 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 884 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 824 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 824 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 824 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 824 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 1748 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 1748 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 1748 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 1748 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 608 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 608 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 608 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 608 1196 d4216a074263ea8b5346c98fce937390.exe iexplore.exe PID 1196 wrote to memory of 820 1196 d4216a074263ea8b5346c98fce937390.exe F0geI.exe PID 1196 wrote to memory of 820 1196 d4216a074263ea8b5346c98fce937390.exe F0geI.exe PID 1196 wrote to memory of 820 1196 d4216a074263ea8b5346c98fce937390.exe F0geI.exe PID 1196 wrote to memory of 820 1196 d4216a074263ea8b5346c98fce937390.exe F0geI.exe PID 1196 wrote to memory of 1760 1196 d4216a074263ea8b5346c98fce937390.exe kukurzka9000.exe PID 1196 wrote to memory of 1760 1196 d4216a074263ea8b5346c98fce937390.exe kukurzka9000.exe PID 1196 wrote to memory of 1760 1196 d4216a074263ea8b5346c98fce937390.exe kukurzka9000.exe PID 1196 wrote to memory of 1760 1196 d4216a074263ea8b5346c98fce937390.exe kukurzka9000.exe PID 1196 wrote to memory of 1492 1196 d4216a074263ea8b5346c98fce937390.exe namdoitntn.exe PID 1196 wrote to memory of 1492 1196 d4216a074263ea8b5346c98fce937390.exe namdoitntn.exe PID 1196 wrote to memory of 1492 1196 d4216a074263ea8b5346c98fce937390.exe namdoitntn.exe PID 1196 wrote to memory of 1492 1196 d4216a074263ea8b5346c98fce937390.exe namdoitntn.exe PID 1196 wrote to memory of 1712 1196 d4216a074263ea8b5346c98fce937390.exe real.exe PID 1196 wrote to memory of 1712 1196 d4216a074263ea8b5346c98fce937390.exe real.exe PID 1196 wrote to memory of 1712 1196 d4216a074263ea8b5346c98fce937390.exe real.exe PID 1196 wrote to memory of 1712 1196 d4216a074263ea8b5346c98fce937390.exe real.exe PID 1196 wrote to memory of 1688 1196 d4216a074263ea8b5346c98fce937390.exe safert44.exe PID 1196 wrote to memory of 1688 1196 d4216a074263ea8b5346c98fce937390.exe safert44.exe PID 1196 wrote to memory of 1688 1196 d4216a074263ea8b5346c98fce937390.exe safert44.exe PID 1196 wrote to memory of 1688 1196 d4216a074263ea8b5346c98fce937390.exe safert44.exe PID 1196 wrote to memory of 876 1196 d4216a074263ea8b5346c98fce937390.exe me.exe PID 1196 wrote to memory of 876 1196 d4216a074263ea8b5346c98fce937390.exe me.exe PID 1196 wrote to memory of 876 1196 d4216a074263ea8b5346c98fce937390.exe me.exe PID 1196 wrote to memory of 876 1196 d4216a074263ea8b5346c98fce937390.exe me.exe PID 884 wrote to memory of 984 884 iexplore.exe IEXPLORE.EXE PID 884 wrote to memory of 984 884 iexplore.exe IEXPLORE.EXE PID 884 wrote to memory of 984 884 iexplore.exe IEXPLORE.EXE PID 884 wrote to memory of 984 884 iexplore.exe IEXPLORE.EXE PID 1748 wrote to memory of 1304 1748 iexplore.exe IEXPLORE.EXE PID 1748 wrote to memory of 1304 1748 iexplore.exe IEXPLORE.EXE PID 1748 wrote to memory of 1304 1748 iexplore.exe IEXPLORE.EXE PID 1748 wrote to memory of 1304 1748 iexplore.exe IEXPLORE.EXE PID 824 wrote to memory of 2032 824 iexplore.exe IEXPLORE.EXE PID 824 wrote to memory of 2032 824 iexplore.exe IEXPLORE.EXE PID 824 wrote to memory of 2032 824 iexplore.exe IEXPLORE.EXE PID 824 wrote to memory of 2032 824 iexplore.exe IEXPLORE.EXE PID 608 wrote to memory of 332 608 iexplore.exe IEXPLORE.EXE PID 608 wrote to memory of 332 608 iexplore.exe IEXPLORE.EXE PID 608 wrote to memory of 332 608 iexplore.exe IEXPLORE.EXE PID 608 wrote to memory of 332 608 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4216a074263ea8b5346c98fce937390.exe"C:\Users\Admin\AppData\Local\Temp\d4216a074263ea8b5346c98fce937390.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RyjC42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:884 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:824 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:608 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exe"C:\Program Files (x86)\Company\NewProduct\F0geI.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\real.exe"C:\Program Files (x86)\Company\NewProduct\real.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Company\NewProduct\safert44.exe"C:\Program Files (x86)\Company\NewProduct\safert44.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\me.exe"C:\Program Files (x86)\Company\NewProduct\me.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.4MB
MD5ec59f38fa35c0cf3babd976f5f23c74e
SHA12f7600ac9df0869fae48d99afe9569d83efafc8b
SHA2566d0d294e321014a3129d3533ce143f08b0a3639cc50ddaf236396b82a595925e
SHA512d4d2c4078dd40bc57d421750ac26f5467f082f6b4fae422d574ca406b928b6bb1e4f7cbb80a80b11f3908134028c6b7bb3b67c17e02d1899a6cda6e0312c3574
-
C:\Program Files (x86)\Company\NewProduct\me.exeFilesize
281KB
MD50856c11e41b1bf5e5aafb44fa4eaae4e
SHA13bb9039bbe89b2058c7c7d0537d7ddaa8f5d2826
SHA2560721243b2d897a8734838ac4fbd402dab5a247a973f08fc82703a565c516911f
SHA512f5605d5d0ef514dd6f571c30b79608a6ddbb8fb025c2750448a758295a0f3fc47a1b973aab0e061f8361b696c920ebb54073ef109cfd14cd08cdb98b9a1b7726
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
282KB
MD5474861050e6a7b65bc4521096cb05454
SHA14e1aabe27598171a89c219aab860b325a4358b22
SHA256ccd962957659555af7c607deb20a4ec34a1578af037d5310ffd07bd092f0ebc7
SHA51242afff00dd616fc73d1c338184149ddb66376e808cd2da39a94357c8d296a245ab0f1e474aac1789d613efef3c1867e0c3a2e41c07ac21bcc07e00ea08309a79
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
246KB
MD5414ffd7094c0f50662ffa508ca43b7d0
SHA16ec67bd53da2ff3d5538a3afcc6797af1e5a53fb
SHA256d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee
SHA512c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
246KB
MD5414ffd7094c0f50662ffa508ca43b7d0
SHA16ec67bd53da2ff3d5538a3afcc6797af1e5a53fb
SHA256d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee
SHA512c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{98B9DAA1-1CC7-11ED-A6E1-52E8C5FCC7C7}.datFilesize
3KB
MD5e8667afb3e03094855f99c0e0424a0d7
SHA12ef7157d895a82b61d2f37232a9c00622c195608
SHA256ba48092074b5ea1dd70ace0e49943dcb8da8e16d59badbea94a03b7688152bc0
SHA5122e0e7e4cdaa9222999c33e995eb46c11fd47b674350fdcb765bc967f434683e52dbfca8b1358c0e9358ba4ecc4c86ec9aceb92bbc59d1357a24377dd5e03a03f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{98BAC501-1CC7-11ED-A6E1-52E8C5FCC7C7}.datFilesize
3KB
MD53b9e19c8caab52683f1e1bdd8f875fc8
SHA16ae582cef46b4390dc83a05854516491e56b00bf
SHA2569ee2307350e56872e919ea47767e23968a3c7a3262f11f47ef8b4cf0599fad0e
SHA51287f0759d20d5b90be067c0c46fbffd30f853b57eebf43882c731aeced0e697da6ca422605a3edb8058957c8713f9b646c9186acbdaa0c1caeaa08d22c0dd89be
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{98BAEC11-1CC7-11ED-A6E1-52E8C5FCC7C7}.datFilesize
3KB
MD551de651789b8239d999cc3362f233bfa
SHA1f14998d1b6b6aa01a46f84365765b6b61571459d
SHA2565fada1256844c15c494d51e59312f42970ae4dab2896111f887c44b030386e9d
SHA512786f9800a82bc7f8c6ccd22390bd7008330f384235d2ce3d99bce875bd45a21a64f27be9564481ce556ace9241912920a01417446e8c215f3bea1034ed590d89
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{98C35081-1CC7-11ED-A6E1-52E8C5FCC7C7}.datFilesize
5KB
MD51c1ff729e47b4c6cade2c479ca3a0ce5
SHA1cb9f6e63fcc20d7cc75d185a5d05eaf463f0d2ac
SHA256212a22c4af2ba82dd0ce6dd83e86c0fd9541c164bb068f8f6a6dea7856babab7
SHA5129960df67d4861665e348560dcfa647d23f9eaf6ad2d501cc12e734dc40b445d1c655fdc243ea08ed3b5512bc1441752e913c1d97f771b42e7dfa2a80af24acfb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YIBB5L9Q.txtFilesize
608B
MD538eed45337099cf3ea16ec16ef8ee9cb
SHA1854ed9ea5fb51c5100a5ccf4a19ebb55e4850c28
SHA25619ccb12ce171b8ee1aae4406babc6d3a0cfeb3bcb4e369ec7e6139030035fc87
SHA512d8933a6a9d27b778f3b747881933ec920c920b2903c0078fb76a21af1be66bfe4c833a2d1dbd2cbe8d7092712bc0a19db42c3d116da4877493a5cf0631a260a4
-
\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.4MB
MD5ec59f38fa35c0cf3babd976f5f23c74e
SHA12f7600ac9df0869fae48d99afe9569d83efafc8b
SHA2566d0d294e321014a3129d3533ce143f08b0a3639cc50ddaf236396b82a595925e
SHA512d4d2c4078dd40bc57d421750ac26f5467f082f6b4fae422d574ca406b928b6bb1e4f7cbb80a80b11f3908134028c6b7bb3b67c17e02d1899a6cda6e0312c3574
-
\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.4MB
MD5ec59f38fa35c0cf3babd976f5f23c74e
SHA12f7600ac9df0869fae48d99afe9569d83efafc8b
SHA2566d0d294e321014a3129d3533ce143f08b0a3639cc50ddaf236396b82a595925e
SHA512d4d2c4078dd40bc57d421750ac26f5467f082f6b4fae422d574ca406b928b6bb1e4f7cbb80a80b11f3908134028c6b7bb3b67c17e02d1899a6cda6e0312c3574
-
\Program Files (x86)\Company\NewProduct\me.exeFilesize
281KB
MD50856c11e41b1bf5e5aafb44fa4eaae4e
SHA13bb9039bbe89b2058c7c7d0537d7ddaa8f5d2826
SHA2560721243b2d897a8734838ac4fbd402dab5a247a973f08fc82703a565c516911f
SHA512f5605d5d0ef514dd6f571c30b79608a6ddbb8fb025c2750448a758295a0f3fc47a1b973aab0e061f8361b696c920ebb54073ef109cfd14cd08cdb98b9a1b7726
-
\Program Files (x86)\Company\NewProduct\me.exeFilesize
281KB
MD50856c11e41b1bf5e5aafb44fa4eaae4e
SHA13bb9039bbe89b2058c7c7d0537d7ddaa8f5d2826
SHA2560721243b2d897a8734838ac4fbd402dab5a247a973f08fc82703a565c516911f
SHA512f5605d5d0ef514dd6f571c30b79608a6ddbb8fb025c2750448a758295a0f3fc47a1b973aab0e061f8361b696c920ebb54073ef109cfd14cd08cdb98b9a1b7726
-
\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
\Program Files (x86)\Company\NewProduct\real.exeFilesize
282KB
MD5474861050e6a7b65bc4521096cb05454
SHA14e1aabe27598171a89c219aab860b325a4358b22
SHA256ccd962957659555af7c607deb20a4ec34a1578af037d5310ffd07bd092f0ebc7
SHA51242afff00dd616fc73d1c338184149ddb66376e808cd2da39a94357c8d296a245ab0f1e474aac1789d613efef3c1867e0c3a2e41c07ac21bcc07e00ea08309a79
-
\Program Files (x86)\Company\NewProduct\real.exeFilesize
282KB
MD5474861050e6a7b65bc4521096cb05454
SHA14e1aabe27598171a89c219aab860b325a4358b22
SHA256ccd962957659555af7c607deb20a4ec34a1578af037d5310ffd07bd092f0ebc7
SHA51242afff00dd616fc73d1c338184149ddb66376e808cd2da39a94357c8d296a245ab0f1e474aac1789d613efef3c1867e0c3a2e41c07ac21bcc07e00ea08309a79
-
\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
246KB
MD5414ffd7094c0f50662ffa508ca43b7d0
SHA16ec67bd53da2ff3d5538a3afcc6797af1e5a53fb
SHA256d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee
SHA512c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399
-
memory/820-87-0x0000000000230000-0x0000000000240000-memory.dmpFilesize
64KB
-
memory/820-116-0x000000000063B000-0x000000000064C000-memory.dmpFilesize
68KB
-
memory/820-136-0x000000000063B000-0x000000000064C000-memory.dmpFilesize
68KB
-
memory/820-57-0x0000000000000000-mapping.dmp
-
memory/820-86-0x000000000063B000-0x000000000064C000-memory.dmpFilesize
68KB
-
memory/820-88-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/876-97-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/876-78-0x0000000000000000-mapping.dmp
-
memory/1196-54-0x0000000075D01000-0x0000000075D03000-memory.dmpFilesize
8KB
-
memory/1492-64-0x0000000000000000-mapping.dmp
-
memory/1492-84-0x0000000001220000-0x0000000001240000-memory.dmpFilesize
128KB
-
memory/1688-72-0x0000000000000000-mapping.dmp
-
memory/1688-85-0x0000000000380000-0x0000000000386000-memory.dmpFilesize
24KB
-
memory/1688-83-0x0000000000900000-0x0000000000944000-memory.dmpFilesize
272KB
-
memory/1712-70-0x0000000000000000-mapping.dmp
-
memory/1760-61-0x0000000000000000-mapping.dmp
-
memory/1760-96-0x0000000000400000-0x000000000056A000-memory.dmpFilesize
1.4MB
-
memory/1760-95-0x0000000001F80000-0x0000000001F92000-memory.dmpFilesize
72KB