Analysis
-
max time kernel
151s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-09-2022 02:55
Static task
static1
Behavioral task
behavioral1
Sample
527f1fa4cfec04ee31ec93960dc7ed50.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
527f1fa4cfec04ee31ec93960dc7ed50.exe
Resource
win10v2004-20220901-en
General
-
Target
527f1fa4cfec04ee31ec93960dc7ed50.exe
-
Size
7.5MB
-
MD5
527f1fa4cfec04ee31ec93960dc7ed50
-
SHA1
03dd789dda5b17469af784df146256552b7a0535
-
SHA256
1985acbf54aade2b89a64da25490a8ddaeb5db6af3d4f64034cdbd6193d6830b
-
SHA512
bf906b984c18cbd491f38d4e9a53be0299afa21b01d61ef99f15453f45a32bdf2d6413439e4beed2fd02e6f0be142c70fe218e58d8f2905163507c8d9dd1e4f9
-
SSDEEP
196608:LtbqGpfawaDA8j+Y5XdFvDy+DQ3Xdj/JCI4ipuFIT2ZajbqGpfawaDA83Q:LtbfI5XLvDtQXh/JP4mib0jbfT
Malware Config
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Loads dropped DLL 4 IoCs
pid Process 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{48E59293-9880-11CF-9754-00AA00C00908} 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{48E59293-9880-11CF-9754-00AA00C00908}\Compatibility Flags = "1024" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{48E59293-9880-11CF-9754-00AA00C00908}\AlternateCLSID = "{E2D211D5-11E4-4D9E-B6DB-1E902C851A49}" 527f1fa4cfec04ee31ec93960dc7ed50.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\CLSID\ = "{48E59293-9880-11CF-9754-00AA00C00908}" 527f1fa4cfec04ee31ec93960dc7ed50.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908} 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\TypeLib\Version = "1.0" 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49}\InprocServer32 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49}\ProgID 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\TypeLib\Version = "1.0" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\ = "Microsoft Internet Transfer Control 6.0 (SP6)" 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Implemented Categories 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49} 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\InprocServer32\ThreadingModel = "Apartment" 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49}\MiscStatus 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\InprocServer32 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59295-9880-11CF-9754-00AA00C00908}\InprocServer32 527f1fa4cfec04ee31ec93960dc7ed50.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49} 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49}\Implemented Categories 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59291-9880-11CF-9754-00AA00C00908} 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49}\Version 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\HELPDIR 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908} 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908} 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49}\Programmable 527f1fa4cfec04ee31ec93960dc7ed50.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908} 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Programmable 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSINET.OCX" 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59291-9880-11CF-9754-00AA00C00908} 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet.1\ = "Microsoft Internet Transfer Control 6.0 (SP6)" 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet.1\CLSID 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\TypeLib\ = "{48E59290-9880-11CF-9754-00AA00C00908}" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ = "IInet" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ = "IInet" 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\VersionIndependentProgID 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908} 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908} 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet.1\CLSID\ = "{48E59293-9880-11CF-9754-00AA00C00908}" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus\1\ = "132497" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\ = "Microsoft Internet Transfer Control 6.0 (SP6)" 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\0\win32 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\TypeLib\ = "{48E59290-9880-11CF-9754-00AA00C00908}" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49}\InprocServer32\ThreadingModel = "Apartment" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49}\Version\ = "1.0" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49}\ToolboxBitmap32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSINET.OCX, 1" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ = "DInetEvents" 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\CLSID 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E2D211D5-11E4-4D9E-B6DB-1E902C851A49}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\ToolboxBitmap32 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59295-9880-11CF-9754-00AA00C00908}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSINET.OCX" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSINET.OCX" 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\TypeLib\ = "{48E59290-9880-11CF-9754-00AA00C00908}" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus\ = "0" 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus\1 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSINET.OCX" 527f1fa4cfec04ee31ec93960dc7ed50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\HELPDIR\ 527f1fa4cfec04ee31ec93960dc7ed50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59292-9880-11CF-9754-00AA00C00908} 527f1fa4cfec04ee31ec93960dc7ed50.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe 900 527f1fa4cfec04ee31ec93960dc7ed50.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 900 527f1fa4cfec04ee31ec93960dc7ed50.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\527f1fa4cfec04ee31ec93960dc7ed50.exe"C:\Users\Admin\AppData\Local\Temp\527f1fa4cfec04ee31ec93960dc7ed50.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5bed46f55af9a7b495ec0f2de0cb5ad3f
SHA1e9c47a7cabbf62e154dca7dba2301cc8eac1047e
SHA256c11615f4561755632da7469e6c5fbf3ead40e0d9747030c90077b70115692ce3
SHA5124938f4e4007e63d990d6b18907b71b7108d9f1d5cbeab194bdf3c25226da20b2995102d79daa262b433f6a4479a9cceafea6c8f5b6f86bd190c751e7c0bd788b
-
Filesize
128KB
MD5bed46f55af9a7b495ec0f2de0cb5ad3f
SHA1e9c47a7cabbf62e154dca7dba2301cc8eac1047e
SHA256c11615f4561755632da7469e6c5fbf3ead40e0d9747030c90077b70115692ce3
SHA5124938f4e4007e63d990d6b18907b71b7108d9f1d5cbeab194bdf3c25226da20b2995102d79daa262b433f6a4479a9cceafea6c8f5b6f86bd190c751e7c0bd788b
-
Filesize
128KB
MD5bed46f55af9a7b495ec0f2de0cb5ad3f
SHA1e9c47a7cabbf62e154dca7dba2301cc8eac1047e
SHA256c11615f4561755632da7469e6c5fbf3ead40e0d9747030c90077b70115692ce3
SHA5124938f4e4007e63d990d6b18907b71b7108d9f1d5cbeab194bdf3c25226da20b2995102d79daa262b433f6a4479a9cceafea6c8f5b6f86bd190c751e7c0bd788b
-
Filesize
128KB
MD5bed46f55af9a7b495ec0f2de0cb5ad3f
SHA1e9c47a7cabbf62e154dca7dba2301cc8eac1047e
SHA256c11615f4561755632da7469e6c5fbf3ead40e0d9747030c90077b70115692ce3
SHA5124938f4e4007e63d990d6b18907b71b7108d9f1d5cbeab194bdf3c25226da20b2995102d79daa262b433f6a4479a9cceafea6c8f5b6f86bd190c751e7c0bd788b