Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe
Resource
win10v2004-20220812-en
General
-
Target
7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe
-
Size
216KB
-
MD5
92173112929b4a082498a0ba57575010
-
SHA1
3b17271247525639190378a10c4afe4522707ef7
-
SHA256
7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb
-
SHA512
561dec7468d8e51896d97e05cd5a37386d822adbb857bb468b07a826b1526911ce7a326d1614b39a1046f71f48ce468916edb7d7d12af9d89643a004487ec1f7
-
SSDEEP
768:G/raHM782f9rvs2Zg5nicskQzTGfxgzh3emu4v/eB4z7VP7LdGSu2HyTAzfMgTA1:G/roM7ZJfUQWgY54v
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" msng.exe -
Executes dropped EXE 1 IoCs
pid Process 1472 msng.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe 2020 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" msng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run msng.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: msng.exe File opened (read-only) \??\e: msng.exe File opened (read-only) \??\a: msng.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundII32.exe msng.exe File opened for modification C:\Windows\SysWOW64\rundII32.exe msng.exe File created C:\Windows\SysWOW64\rundll32.exe msng.exe File created C:\Windows\SysWOW64\msng.exe 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe File opened for modification C:\Windows\SysWOW64\msng.exe 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe File created C:\Windows\SysWOW64\rundII32.exe 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe File created C:\Windows\SysWOW64\rundll32.exe 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a3000000000200000000001066000000010000200000005142d4e7b47109ee05f047cf5d75db3f9d6c0323bc39e1cb6a9dbc71c1491846000000000e80000000020000200000007c62899e7cabbc3e1cc089616c8815bf6620601825a03d647d9ed93b23aa582f20000000f7c81728b7bfd861bf307fa8e41e5b213bfdf92811166d8578f50abdee2995a6400000000efdc86cc91ddd4f40578713602e4bc1d3911fd91bc676cc294a03295d5d0c2c86b10254d128d405ac1050399903af331c783d2369fc00359d93a1e60cf9a495 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373009117" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6775601-5038-11ED-BD84-7E4CDA66D2DC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00fd8d645e4d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000000c556677100041646d696e00380008000400efbe0c55cb700c5566772a00000030000000000004000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000000c55cb70122041707044617461003c0008000400efbe0c55cb700c55cb702a000000eb0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c003100000000000c55ed7210204c6f63616c00380008000400efbe0c55cb700c55ed722a000000fe0100000000020000000000000000000000000000004c006f00630061006c00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = c6003100000000005455652c10203736373043467e310000ae0008000400efbe5455652c5455652c2a0000001523010000000c0000000000000000000000000000003700360037003000630066003700360066003400350064003100370037006300360031003600630065003400300038003000340062003500320061003800320038003900370033006400370035003100340034003300380037003400390030003700350063003500350039003700640063003900360036006600310066006200000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a003100000000005455652c102054656d700000360008000400efbe0c55cb705455652c2a000000ff010000000002000000000000000000000000000000540065006d007000000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000000c55cb701100557365727300600008000400efbeee3a851a0c55cb702a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe 1472 msng.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1472 msng.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1368 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2020 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe 1472 msng.exe 1368 iexplore.exe 1368 iexplore.exe 788 IEXPLORE.EXE 788 IEXPLORE.EXE 788 IEXPLORE.EXE 788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2020 wrote to memory of 612 2020 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe 28 PID 2020 wrote to memory of 612 2020 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe 28 PID 2020 wrote to memory of 612 2020 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe 28 PID 2020 wrote to memory of 612 2020 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe 28 PID 2020 wrote to memory of 1472 2020 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe 29 PID 2020 wrote to memory of 1472 2020 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe 29 PID 2020 wrote to memory of 1472 2020 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe 29 PID 2020 wrote to memory of 1472 2020 7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe 29 PID 1472 wrote to memory of 1880 1472 msng.exe 31 PID 1472 wrote to memory of 1880 1472 msng.exe 31 PID 1472 wrote to memory of 1880 1472 msng.exe 31 PID 1472 wrote to memory of 1880 1472 msng.exe 31 PID 892 wrote to memory of 1368 892 explorer.exe 33 PID 892 wrote to memory of 1368 892 explorer.exe 33 PID 892 wrote to memory of 1368 892 explorer.exe 33 PID 1368 wrote to memory of 788 1368 iexplore.exe 35 PID 1368 wrote to memory of 788 1368 iexplore.exe 35 PID 1368 wrote to memory of 788 1368 iexplore.exe 35 PID 1368 wrote to memory of 788 1368 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe"C:\Users\Admin\AppData\Local\Temp\7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\7670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb2⤵PID:612
-
-
C:\Windows\SysWOW64\msng.exe"C:\Windows\system32\msng.exe" fuckystart2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.OpenClose.ir3⤵PID:1880
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1212
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.openclose.ir/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:788
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD50aa97e005a0d924d9a70ff9bc91f2c6f
SHA110e37336ee2395278c4bb91f4581dd26b56a04af
SHA2560d2ea799b93e10e9e7a6823834fc10992b1faebf6335709ecfe96978cc243021
SHA512b9ed10c431ce41a3011d86c97a4f45ebe39f9d6ec6618b09316dfa4bc86e21a7f743d1f9dd48473da65026caecec5f345f76070d29a3b65b688b90b8e71a8350
-
Filesize
216KB
MD592173112929b4a082498a0ba57575010
SHA13b17271247525639190378a10c4afe4522707ef7
SHA2567670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb
SHA512561dec7468d8e51896d97e05cd5a37386d822adbb857bb468b07a826b1526911ce7a326d1614b39a1046f71f48ce468916edb7d7d12af9d89643a004487ec1f7
-
Filesize
216KB
MD592173112929b4a082498a0ba57575010
SHA13b17271247525639190378a10c4afe4522707ef7
SHA2567670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb
SHA512561dec7468d8e51896d97e05cd5a37386d822adbb857bb468b07a826b1526911ce7a326d1614b39a1046f71f48ce468916edb7d7d12af9d89643a004487ec1f7
-
Filesize
100B
MD5d0d8c5fefcd2389dd0750e91f00f84c3
SHA1a59f368b792aae1da08126a5aa965530e8bdc793
SHA256f0bf1d6b03b9d116886aa09c297f0f71278bd32b605c43554ff413dfb1955f10
SHA512d1adf78d02842a0928f1f10d3fd30115ab396d7bfc74e0c9a916e90f52da80b7c204cae84198934e478c2a24e00ec4edeec8ce94497650364a6039edcdebf681
-
Filesize
216KB
MD592173112929b4a082498a0ba57575010
SHA13b17271247525639190378a10c4afe4522707ef7
SHA2567670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb
SHA512561dec7468d8e51896d97e05cd5a37386d822adbb857bb468b07a826b1526911ce7a326d1614b39a1046f71f48ce468916edb7d7d12af9d89643a004487ec1f7
-
Filesize
216KB
MD592173112929b4a082498a0ba57575010
SHA13b17271247525639190378a10c4afe4522707ef7
SHA2567670cf76f45d177c616ce40804b52a828973d7514438749075c5597dc966f1fb
SHA512561dec7468d8e51896d97e05cd5a37386d822adbb857bb468b07a826b1526911ce7a326d1614b39a1046f71f48ce468916edb7d7d12af9d89643a004487ec1f7