Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe
Resource
win10v2004-20220812-en
General
-
Target
ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe
-
Size
132KB
-
MD5
916bf9f1fc6f0eb72bc2103d86b770a0
-
SHA1
968424f77d62cccb21deb07fbebb7e7cd81d348c
-
SHA256
ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed
-
SHA512
b95d636b9d74b6353387363719417a9b4d1dab3a2f6db2d539001f9f8438422506bd48bf7cedc0a042a05adb2a6e224ff444415f9b0bd2ac700bfe9097e49058
-
SSDEEP
768:KL/raHM782f9rvs2Zg5nicskQzTGfxgzh3emu4v/eB4z7VP7LdGSu2HyTAzfMgT+:KL/roM7ZJfUQWgY54v
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" msng.exe -
Executes dropped EXE 1 IoCs
pid Process 1792 msng.exe -
Loads dropped DLL 2 IoCs
pid Process 1460 ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe 1460 ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run msng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" msng.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: msng.exe File opened (read-only) \??\a: msng.exe File opened (read-only) \??\b: msng.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\msng.exe ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe File opened for modification C:\Windows\SysWOW64\msng.exe ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe File created C:\Windows\SysWOW64\rundII32.exe ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe File created C:\Windows\SysWOW64\rundll32.exe ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe File created C:\Windows\SysWOW64\rundII32.exe msng.exe File opened for modification C:\Windows\SysWOW64\rundII32.exe msng.exe File created C:\Windows\SysWOW64\rundll32.exe msng.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373003153" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf000000000200000000001066000000010000200000008a0159a87f5dea4cd8336c9cb12cdd3157309fd57207b7ee9c73b5e8f6527bbb000000000e80000000020000200000009e28e7119e835d8945fe03fefffea82a8e98d9262b3885d0effaccefe48ebcfa200000004d8450d9d96c06f0a6c17486d252c54c4416d07573c16a47f37499991571f21b400000006027f0c4faef7e6e84334f1add0378250a696e49a1c49a97ac4537de891df7a6c7bb259c128a4fb52a1a189ee15b9d8c946185b09bd460feb38fd36bc21f6c38 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26177A11-502B-11ED-B4BC-4A12BD72B3C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a82f1038e4d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c003100000000000c55e47210204c6f63616c00380008000400efbe0c55cb700c55e4722a000000000200000000020000000000000000000000000000004c006f00630061006c00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000000c55cb70122041707044617461003c0008000400efbe0c55cb700c55cb702a000000ed0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a003100000000005455081f102054656d700000360008000400efbe0c55cb705455081f2a00000001020000000002000000000000000000000000000000540065006d007000000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = c6003100000000005455081f10204546374534397e310000ae0008000400efbe5455081f5455081f2a000000f739010000000a0000000000000000000000000000006500660037006500340039003000360066003900330063003000300065003200300038003200310037003500620038003800340039006600340036006300380063006100640066006400630035003500310035006100330035006500330039003000360032003800360035006500390037003700320031003000350065006400000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000000c55cb701100557365727300600008000400efbeee3a851a0c55cb702a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000000c55a780100041646d696e00380008000400efbe0c55cb700c55a7802a00000030000000000004000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe 1792 msng.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1792 msng.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 472 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1460 ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe 1792 msng.exe 472 iexplore.exe 472 iexplore.exe 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1460 wrote to memory of 968 1460 ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe 28 PID 1460 wrote to memory of 968 1460 ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe 28 PID 1460 wrote to memory of 968 1460 ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe 28 PID 1460 wrote to memory of 968 1460 ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe 28 PID 1460 wrote to memory of 1792 1460 ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe 29 PID 1460 wrote to memory of 1792 1460 ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe 29 PID 1460 wrote to memory of 1792 1460 ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe 29 PID 1460 wrote to memory of 1792 1460 ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe 29 PID 1792 wrote to memory of 1704 1792 msng.exe 31 PID 1792 wrote to memory of 1704 1792 msng.exe 31 PID 1792 wrote to memory of 1704 1792 msng.exe 31 PID 1792 wrote to memory of 1704 1792 msng.exe 31 PID 1652 wrote to memory of 472 1652 explorer.exe 33 PID 1652 wrote to memory of 472 1652 explorer.exe 33 PID 1652 wrote to memory of 472 1652 explorer.exe 33 PID 472 wrote to memory of 1092 472 iexplore.exe 35 PID 472 wrote to memory of 1092 472 iexplore.exe 35 PID 472 wrote to memory of 1092 472 iexplore.exe 35 PID 472 wrote to memory of 1092 472 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe"C:\Users\Admin\AppData\Local\Temp\ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed2⤵PID:968
-
-
C:\Windows\SysWOW64\msng.exe"C:\Windows\system32\msng.exe" fuckystart2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.OpenClose.ir3⤵PID:1704
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1184
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.openclose.ir/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:472 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1092
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD539d255b809204686c0ed94272cc822ad
SHA1f5b99010a82645c33e47bce171ab3b0bfd3cc27e
SHA256f21124e31b8e1535f0f7e8b6b10166745c1f21782fcf7e8f68ebe8bc4ac879f9
SHA5124a410d8b61af7f52316d66779c1f7b69a69e5a6581861c47fb2ae91cbd2a9bc6c636f7271604c639983a837d7e893050a52cc26004e31f6e8ba7c3a9926345cf
-
Filesize
132KB
MD5916bf9f1fc6f0eb72bc2103d86b770a0
SHA1968424f77d62cccb21deb07fbebb7e7cd81d348c
SHA256ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed
SHA512b95d636b9d74b6353387363719417a9b4d1dab3a2f6db2d539001f9f8438422506bd48bf7cedc0a042a05adb2a6e224ff444415f9b0bd2ac700bfe9097e49058
-
Filesize
132KB
MD5916bf9f1fc6f0eb72bc2103d86b770a0
SHA1968424f77d62cccb21deb07fbebb7e7cd81d348c
SHA256ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed
SHA512b95d636b9d74b6353387363719417a9b4d1dab3a2f6db2d539001f9f8438422506bd48bf7cedc0a042a05adb2a6e224ff444415f9b0bd2ac700bfe9097e49058
-
Filesize
100B
MD5dc932370f8304f8ba1a7705693e3f05e
SHA14fd01e4eb547bd6ca281061f5e0e9834a098aa0f
SHA256ad29ff1c13d7f6eac8d36391dc5aac869826d6cc0f83374f12f892829494b344
SHA5129ee92d79900b2bd5d1bce83a8343330bebcfdc6299f31e5c49892cf5dcfdffb90b645808a6fea862c0f5a31449fd62b21e3e515b5c614012517942d499218ed5
-
Filesize
132KB
MD5916bf9f1fc6f0eb72bc2103d86b770a0
SHA1968424f77d62cccb21deb07fbebb7e7cd81d348c
SHA256ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed
SHA512b95d636b9d74b6353387363719417a9b4d1dab3a2f6db2d539001f9f8438422506bd48bf7cedc0a042a05adb2a6e224ff444415f9b0bd2ac700bfe9097e49058
-
Filesize
132KB
MD5916bf9f1fc6f0eb72bc2103d86b770a0
SHA1968424f77d62cccb21deb07fbebb7e7cd81d348c
SHA256ef7e4906f93c00e2082175b8849f46c8cadfdc5515a35e39062865e9772105ed
SHA512b95d636b9d74b6353387363719417a9b4d1dab3a2f6db2d539001f9f8438422506bd48bf7cedc0a042a05adb2a6e224ff444415f9b0bd2ac700bfe9097e49058