Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 14:01
Static task
static1
Behavioral task
behavioral1
Sample
97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe
Resource
win7-20220901-en
General
-
Target
97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe
-
Size
240KB
-
MD5
6a24d3a2c5eff925493a56cf4badfa40
-
SHA1
d0ac8ce3991435ff4d08eaf214166534c7fedc04
-
SHA256
97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2
-
SHA512
fb6aa516f0f0f85c9f22f54ec0ab8c321bca299b0ee8acfa89267610accd83244d6e8f721f375644f3477d5f0be5bffbb2dc256038ef4b4c42a898dcc2f530d1
-
SSDEEP
3072:bKXSOyTcwFIvP4/5PWCYzTwuq+O/20nfSyk:bUSOyT2C2Tcur
Malware Config
Extracted
njrat
0.7d
HacKed
rawaz.no-ip.biz:1177
e2938176ad4f8955a927d3a3225a361f
-
reg_key
e2938176ad4f8955a927d3a3225a361f
-
splitter
|'|'|
Signatures
-
Processes:
97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Enablelua = "0" 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe -
Drops startup file 2 IoCs
Processes:
97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HKCU.exe 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HKCU.exe 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Local\\Temp\\97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe" 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKCM = "C:\\Users\\Admin\\AppData\\Local\\Temp\\97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe" 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe -
Processes:
97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Enablelua 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Enablelua = "0" 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exedescription ioc process File created C:\autorun.inf 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe File opened for modification C:\autorun.inf 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exedescription pid process target process PID 1388 set thread context of 368 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000195752c42babca3c61e7f618fb6a1244aad6c5956eb8f971ca4dc38d1df295a5000000000e8000000002000020000000e29da47b5e9e7a4ec7cf7f9ad5c0df6a25e029404cfe3334b5a0bf91e6b62ec32000000010cdf554416ba1aeec16adebf7105d530b9f54c04d20bb04ad64392dc47a447b4000000065151a8e6d746e7a02d7ef039083a0cdc4bc2f91a584094b391d9adba390003573060ce7056298a1894f473f6f73b85aec920ea8ce312d668d941d0e285ae5a8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80625aec33d7d801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371572037" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000da6406d830113ee01ac8f88b79a9373ca45d7efc656627fccd8cb5c43f032f3f000000000e800000000200002000000004c26744740a2cbf69d166c11a7239344dcac21096f02f7fb080478c43136a41900000009f3cb0d9d6ff59de1adff8e322a2cb801625f7276b9eacf1d6749ef002520e90c3be25f71ba1c3825202eb2d3cfd6d6be8dfc90b69a1d2395b580b0856c3501daabff58d717bc97efce3514a1163458d0a37a16f426ab091e08b8124c56c1850cd28e69f633602e5905b752048d499f975fefcde32d4de4e06486f9b7a12480d32da315ec6a3850bdce3e299510f04d440000000634c11adda38ac332be5e3e4d3b318bff7f171933a7d1c05be026102a964405e88e43abad3c501a187de819562b08d49d52cec22a82770608889d78c3a599e53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12D3E6C1-4327-11ED-BE8B-FAA138970F28} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exepid process 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exedescription pid process Token: SeDebugPrivilege 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1520 iexplore.exe 1520 iexplore.exe 1320 IEXPLORE.EXE 1320 IEXPLORE.EXE 1320 IEXPLORE.EXE 1320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exesvchost.exeiexplore.exedescription pid process target process PID 1388 wrote to memory of 368 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe svchost.exe PID 1388 wrote to memory of 368 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe svchost.exe PID 1388 wrote to memory of 368 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe svchost.exe PID 1388 wrote to memory of 368 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe svchost.exe PID 1388 wrote to memory of 368 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe svchost.exe PID 1388 wrote to memory of 368 1388 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe svchost.exe PID 368 wrote to memory of 1520 368 svchost.exe iexplore.exe PID 368 wrote to memory of 1520 368 svchost.exe iexplore.exe PID 368 wrote to memory of 1520 368 svchost.exe iexplore.exe PID 368 wrote to memory of 1520 368 svchost.exe iexplore.exe PID 1520 wrote to memory of 1320 1520 iexplore.exe IEXPLORE.EXE PID 1520 wrote to memory of 1320 1520 iexplore.exe IEXPLORE.EXE PID 1520 wrote to memory of 1320 1520 iexplore.exe IEXPLORE.EXE PID 1520 wrote to memory of 1320 1520 iexplore.exe IEXPLORE.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Enablelua = "0" 97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe"C:\Users\Admin\AppData\Local\Temp\97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2.exe"1⤵
- UAC bypass
- Drops startup file
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops autorun.inf file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UE2GR79L.txtFilesize
608B
MD5061eec074466f358ec2ca3098fb18da4
SHA197eb8b98cff8a8bf3e9b8ca2245ac003d2dd70dc
SHA25634675876c10682da047010443a02b040865c8da739aaf1443748b1114bb654b4
SHA51210ada86cde2ec5a45bde7b6e02d8525f40f8ec5f4ba8500534517781b4b9981b7b1c2534b508307365628600ea716d9860b1907c6704bcc63c8568cf6f87d62f
-
memory/368-56-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/368-57-0x000000000040748E-mapping.dmp
-
memory/368-59-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/368-61-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1388-54-0x0000000075711000-0x0000000075713000-memory.dmpFilesize
8KB
-
memory/1388-55-0x0000000074C10000-0x00000000751BB000-memory.dmpFilesize
5.7MB
-
memory/1388-63-0x0000000074C10000-0x00000000751BB000-memory.dmpFilesize
5.7MB