Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 01:38
Static task
static1
Behavioral task
behavioral1
Sample
05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe
Resource
win10v2004-20220901-en
General
-
Target
05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe
-
Size
536KB
-
MD5
4ab05f44a4ee4aeef3fffd08cf3897d0
-
SHA1
51b28c7b2f16458ef3a86e50014902c02a9e5001
-
SHA256
05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0
-
SHA512
fb5a8399c8275a1ab1c355e6daf1a3ae5c565bcf44d52a02ea1f4e2cf66db59249942acc49a2a84368fee685e793a334c00b7fe63cdc974d23f36cab9c8641c0
-
SSDEEP
12288:YqXg1EBXgR86OJqW3o8p8BS0TPt9yJLFk6A/sJJeio:YqFBwODYW3Vp8MA0
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" chkdsk.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\chkdsk.exe\"" 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\chkdsk.exe\"" chkdsk.exe -
Executes dropped EXE 11 IoCs
pid Process 2108 chkdsk.exe 4576 tmpD1AC.exe 3984 tmpD1AC.exe 2704 chkdsk.exe 712 chkdsk.exe 1068 chkdsk.exe 2416 chkdsk.exe 4240 chkdsk.exe 2708 chkdsk.exe 724 chkdsk.exe 5012 chkdsk.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation chkdsk.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\chkdsk.lnk 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\chkdsk = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\chkdsk.exe\"" 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chkdsk = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\chkdsk.exe\"" chkdsk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\chkdsk = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\chkdsk.exe\"" chkdsk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chkdsk = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\chkdsk.exe\"" 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4844 set thread context of 2168 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 83 PID 4576 set thread context of 3984 4576 tmpD1AC.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\chkdsk.exe\"" 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\chkdsk.exe\"" chkdsk.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" chkdsk.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 14 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" chkdsk.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\chkdsk.exe = "11000" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\chkdsk.exe = "1" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\GlobalUserOffline = "0" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\GlobalUserOffline = "0" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\GlobalUserOffline = "0" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\chkdsk.exe = "11000" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\GlobalUserOffline = "0" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\chkdsk.exe = "1" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\GlobalUserOffline = "0" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\chkdsk.exe = "1" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\chkdsk.exe = "11000" chkdsk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\chkdsk.exe = "11000" chkdsk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING chkdsk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\AdvancedOptions\MULTIMEDIA\PICTS\CheckedValue = "yes" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\AdvancedOptions\MULTIMEDIA\PICTS\CheckedValue = "yes" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Display Inline Images = "yes" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\AdvancedOptions\MULTIMEDIA\PICTS\CheckedValue = "yes" chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Display Inline Images = "yes" chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Display Inline Images = "yes" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\GlobalUserOffline = "0" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Display Inline Images = "yes" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Display Inline Images = "yes" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\GlobalUserOffline = "0" chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\AdvancedOptions\MULTIMEDIA\PICTS\CheckedValue = "yes" chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Display Inline Images = "yes" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\chkdsk.exe = "11000" chkdsk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\GlobalUserOffline = "0" chkdsk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\chkdsk.exe = "11000" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\GlobalUserOffline = "0" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\GlobalUserOffline = "0" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\GlobalUserOffline = "0" chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\GlobalUserOffline = "0" chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Display Inline Images = "yes" chkdsk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\chkdsk.exe = "1" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\AdvancedOptions\MULTIMEDIA\PICTS\CheckedValue = "yes" chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Display Inline Images = "yes" chkdsk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION chkdsk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\GlobalUserOffline = "0" chkdsk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING chkdsk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\chkdsk.exe = "1" chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\AdvancedOptions\MULTIMEDIA\PICTS\CheckedValue = "yes" chkdsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" chkdsk.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1612 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 4576 tmpD1AC.exe 4576 tmpD1AC.exe 4576 tmpD1AC.exe 4576 tmpD1AC.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2108 chkdsk.exe 2108 chkdsk.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 chkdsk.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2108 chkdsk.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1068 chkdsk.exe 1068 chkdsk.exe 712 chkdsk.exe 2416 chkdsk.exe 2416 chkdsk.exe 4240 chkdsk.exe 4240 chkdsk.exe 2708 chkdsk.exe 2708 chkdsk.exe 724 chkdsk.exe 724 chkdsk.exe 5012 chkdsk.exe 5012 chkdsk.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4844 wrote to memory of 2168 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 83 PID 4844 wrote to memory of 2168 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 83 PID 4844 wrote to memory of 2168 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 83 PID 4844 wrote to memory of 2168 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 83 PID 4844 wrote to memory of 2168 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 83 PID 4844 wrote to memory of 2168 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 83 PID 4844 wrote to memory of 2168 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 83 PID 4844 wrote to memory of 2168 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 83 PID 4844 wrote to memory of 2168 4844 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 83 PID 2168 wrote to memory of 2108 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 85 PID 2168 wrote to memory of 2108 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 85 PID 2168 wrote to memory of 4576 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 87 PID 2168 wrote to memory of 4576 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 87 PID 2168 wrote to memory of 4576 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 87 PID 2168 wrote to memory of 4144 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 88 PID 2168 wrote to memory of 4144 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 88 PID 2168 wrote to memory of 4144 2168 05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe 88 PID 4576 wrote to memory of 3984 4576 tmpD1AC.exe 89 PID 4576 wrote to memory of 3984 4576 tmpD1AC.exe 89 PID 4576 wrote to memory of 3984 4576 tmpD1AC.exe 89 PID 4576 wrote to memory of 3984 4576 tmpD1AC.exe 89 PID 4576 wrote to memory of 3984 4576 tmpD1AC.exe 89 PID 4576 wrote to memory of 3984 4576 tmpD1AC.exe 89 PID 4576 wrote to memory of 3984 4576 tmpD1AC.exe 89 PID 4576 wrote to memory of 3984 4576 tmpD1AC.exe 89 PID 4576 wrote to memory of 3984 4576 tmpD1AC.exe 89 PID 4144 wrote to memory of 2704 4144 cmd.exe 91 PID 4144 wrote to memory of 2704 4144 cmd.exe 91 PID 4144 wrote to memory of 1612 4144 cmd.exe 92 PID 4144 wrote to memory of 1612 4144 cmd.exe 92 PID 4144 wrote to memory of 1612 4144 cmd.exe 92 PID 2108 wrote to memory of 712 2108 chkdsk.exe 93 PID 2108 wrote to memory of 712 2108 chkdsk.exe 93 PID 2108 wrote to memory of 1068 2108 chkdsk.exe 94 PID 2108 wrote to memory of 1068 2108 chkdsk.exe 94 PID 2108 wrote to memory of 2416 2108 chkdsk.exe 107 PID 2108 wrote to memory of 2416 2108 chkdsk.exe 107 PID 2108 wrote to memory of 4240 2108 chkdsk.exe 115 PID 2108 wrote to memory of 4240 2108 chkdsk.exe 115 PID 2108 wrote to memory of 2708 2108 chkdsk.exe 117 PID 2108 wrote to memory of 2708 2108 chkdsk.exe 117 PID 2108 wrote to memory of 724 2108 chkdsk.exe 118 PID 2108 wrote to memory of 724 2108 chkdsk.exe 118 PID 2108 wrote to memory of 5012 2108 chkdsk.exe 119 PID 2108 wrote to memory of 5012 2108 chkdsk.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe"C:\Users\Admin\AppData\Local\Temp\05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe"C:\Users\Admin\AppData\Local\Temp\05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Looks for VirtualBox Guest Additions in registry
- Adds policy Run key to start application
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-update_flash"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:712
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-new_session oCHi5REMERgesJsRZKBNsaNf9Rk3c"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-new_session vRvDJi5XQrvWJC7mn7o0yQNWQl5Fr"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-new_session zPhxTabLyHmEghDdnbeezHrDtd0UK"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4240
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-new_session L6rQuma9VwjgE5HmXye1dX5draZFd"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-new_session GZ9rnt4bR2Xuz0BPoTMIrzy7gvZkb"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:724
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-new_session xljmp7JNoBadcswvWxJzxSk3nNMXr"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5012
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpD1AC.exe"C:\Users\Admin\AppData\Local\Temp\tmpD1AC.exe" "C:\Users\Admin\AppData\Local\Temp\05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\tmpD1AC.exe"C:\Users\Admin\AppData\Local\Temp\tmpD1AC.exe" "C:\Users\Admin\AppData\Local\Temp\05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe"4⤵
- Executes dropped EXE
PID:3984
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 >> nul3⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
PID:2704
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:1612
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.bin\S-1-5-21-929662420-1054238289-2961194603-1000\$ast-S-1-5-21-929662420-1054238289-2961194603-1000\VRjtUqVreS-cuxsFcGaxRX.dat
Filesize418B
MD5d9530ba83b86167130cb24ca6feac323
SHA1964e3c5391d77b494ea0808c6829406410142e21
SHA256af936cc3f1984c4d6ef2ce69d9173b83ba43620018f27efbaadfbc15d6248909
SHA512becd847b79d3a34acc993baa1cd501f3c5a5e885bb145781fbe1ff0c6599d1304d23ce9308eaa3770ed089464d24923a4f41837e735bbb2ddd30e24af461a13e
-
C:\$Recycle.bin\S-1-5-21-929662420-1054238289-2961194603-1000\$ast-S-1-5-21-929662420-1054238289-2961194603-1000\VpbTA236JZZ2nvhifFEnIqZByu.dat
Filesize6KB
MD5a4052bdcf80bee0f23722e80e6c8d1e9
SHA1c75d4c259a3e812880e88e9b5cefba08aff00108
SHA2563998abd9420d2471469d5a90467b80d9997a5a4c258dbcb803b77c54db815605
SHA512c41a492f34b694fe5770e6cd1b0eed1bf5c3310aa3cb28e6eebd46d6a7768dc59a2bf61afeaf878c9bc250b3a2f3ee65157acb048f25c2fc55bd82cce5ff1e38
-
C:\$Recycle.bin\S-1-5-21-929662420-1054238289-2961194603-1000\$ast-S-1-5-21-929662420-1054238289-2961194603-1000\X-Jc7X5QmTq9NE.dat
Filesize130KB
MD5c50ebde27a37043adfc02088d0e1df0c
SHA1a91412fc3b8da190220ce391ac31b101a3e9e2b7
SHA25643da1b1079db22dd00fa51436e564756efddcdd700d478cbf7bf11558135bb29
SHA512e8d72da6c4ab7d3c8858dd31849ccb56cde470822656928b4a9b002afc1c20bf4a9781e589a8bc1acfebed9a4de9eaa2c8bcc1f3707c2bb08d4bf4c6513e732f
-
C:\$Recycle.bin\S-1-5-21-929662420-1054238289-2961194603-1000\$ast-S-1-5-21-929662420-1054238289-2961194603-1000\prPr05wBhQtWzGzEF.dat
Filesize21KB
MD55cac788b63d3b05256d740ae100f7b0a
SHA10d208e75b0c5f2bb754c88bd1d9e921b2a0d49c8
SHA2569677ed3bca1487fef56589350d0552ccf8b19fab1e9a1ef6a54b5b11ce9e9435
SHA51252b126ad8538d6e08bc7fd5cf956b49e4364116419f454880cb7bc45d15a3ae1f1693a51b91e35d223685915b45e70e5669735e13d4fd3d793614a16ec3885d4
-
C:\$Recycle.bin\S-1-5-21-929662420-1054238289-2961194603-1000\$ast-S-1-5-21-929662420-1054238289-2961194603-1000\wk4mJZgF0PAQBkF7Ov.dat
Filesize48KB
MD50795a4f9c08083a96043ed4d35170e62
SHA1b72d342a98550125067f5e3a6d54ef8acf8038e9
SHA256a265443dcded8bcf82a0297739cbb92fa2942dcb0718dcd3ed8dc79a6336cdb7
SHA512e10f71133e6cba31c61e5e8ede44485762b3771f6eafe07d43594ef2653f5eab4b9545095a6595ee4ccb9cb8847c4cc95aba520212cf477ab938325a6852a86f
-
C:\$Recycle.bin\S-1-5-21-929662420-1054238289-2961194603-1000\$ast-S-1-5-21-929662420-1054238289-2961194603-1000\ybNshNp3RqZxUn-r07Cw0BIiqGq.dat
Filesize423B
MD525a981d9f0b12c3ba6060d2d3bdd3d9a
SHA1374f07dd3dfae18d4eb7513b134bddf77b531662
SHA256d13ef927e28df4bfa0030c381a8a51681d58cfd602d1d9a49a5484bb30aa8ae3
SHA512483ee193dceb400f9f8efc5a1582d4a4a14ebdcee4d179f0d270b0377bb07bff558d4b4110c979699f799374826e70b15880c8c13a89002366574593b026474e
-
Filesize
536KB
MD54ab05f44a4ee4aeef3fffd08cf3897d0
SHA151b28c7b2f16458ef3a86e50014902c02a9e5001
SHA25605c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0
SHA512fb5a8399c8275a1ab1c355e6daf1a3ae5c565bcf44d52a02ea1f4e2cf66db59249942acc49a2a84368fee685e793a334c00b7fe63cdc974d23f36cab9c8641c0
-
Filesize
536KB
MD54ab05f44a4ee4aeef3fffd08cf3897d0
SHA151b28c7b2f16458ef3a86e50014902c02a9e5001
SHA25605c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0
SHA512fb5a8399c8275a1ab1c355e6daf1a3ae5c565bcf44d52a02ea1f4e2cf66db59249942acc49a2a84368fee685e793a334c00b7fe63cdc974d23f36cab9c8641c0
-
Filesize
536KB
MD54ab05f44a4ee4aeef3fffd08cf3897d0
SHA151b28c7b2f16458ef3a86e50014902c02a9e5001
SHA25605c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0
SHA512fb5a8399c8275a1ab1c355e6daf1a3ae5c565bcf44d52a02ea1f4e2cf66db59249942acc49a2a84368fee685e793a334c00b7fe63cdc974d23f36cab9c8641c0
-
Filesize
131KB
MD5565610e8824c6d659cf326d10c43a57e
SHA199f064329cc6a775b6e79053cfeade56ca732c91
SHA25616974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee
SHA5124d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48
-
Filesize
131KB
MD5565610e8824c6d659cf326d10c43a57e
SHA199f064329cc6a775b6e79053cfeade56ca732c91
SHA25616974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee
SHA5124d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48
-
Filesize
131KB
MD5565610e8824c6d659cf326d10c43a57e
SHA199f064329cc6a775b6e79053cfeade56ca732c91
SHA25616974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee
SHA5124d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48
-
Filesize
131KB
MD5565610e8824c6d659cf326d10c43a57e
SHA199f064329cc6a775b6e79053cfeade56ca732c91
SHA25616974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee
SHA5124d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48
-
Filesize
131KB
MD5565610e8824c6d659cf326d10c43a57e
SHA199f064329cc6a775b6e79053cfeade56ca732c91
SHA25616974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee
SHA5124d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48
-
Filesize
131KB
MD5565610e8824c6d659cf326d10c43a57e
SHA199f064329cc6a775b6e79053cfeade56ca732c91
SHA25616974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee
SHA5124d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48
-
Filesize
131KB
MD5565610e8824c6d659cf326d10c43a57e
SHA199f064329cc6a775b6e79053cfeade56ca732c91
SHA25616974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee
SHA5124d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48
-
Filesize
131KB
MD5565610e8824c6d659cf326d10c43a57e
SHA199f064329cc6a775b6e79053cfeade56ca732c91
SHA25616974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee
SHA5124d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48
-
Filesize
131KB
MD5565610e8824c6d659cf326d10c43a57e
SHA199f064329cc6a775b6e79053cfeade56ca732c91
SHA25616974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee
SHA5124d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48
-
Filesize
131KB
MD5565610e8824c6d659cf326d10c43a57e
SHA199f064329cc6a775b6e79053cfeade56ca732c91
SHA25616974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee
SHA5124d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48
-
Filesize
1KB
MD5f65c54aaee86c19a7259eef0d49f9a85
SHA1a31f68c2801230595654128654ed93f03f31bfe8
SHA256eb49ebd4a4ed258a4b0fd1940f214580c3eb924a7c714f89bd016f46fe1338eb
SHA5129a45c6405da905ee6c31c78946e7257c166bf53a3791d74e39683fd93cbab89e558fa94a0efffa8b4629085c80d56f7882d9ac6e5f71d4d4d00c859b2a990b36