Analysis
-
max time kernel
154s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe
Resource
win10v2004-20220812-en
General
-
Target
9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe
-
Size
20KB
-
MD5
80c6ce70c7ffbff0e31ba2ffba3eae90
-
SHA1
bee1c99942873ab031200148e1ed1afb0a0d9d72
-
SHA256
9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764
-
SHA512
960ae899797529da329f30d18b2152cf71b35bf7b13af55fcb30ebf191a7489098e25f930337b81dc7917ef37b0885fef20bc954466e2b633a9f4be5157bcc44
-
SSDEEP
192:1l5E3krTuntKy0peHDfCpHfBv+I4QwXt9V+jqu0G5KDJBX:1M3PnQoHDCpHf4I4Qwdc0G5KDJZ
Malware Config
Signatures
-
Drops file in Drivers directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe 9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe -
Executes dropped EXE 4 IoCs
pid Process 2348 winlogon.exe 1464 AE 0124 BE.exe 220 winlogon.exe 4148 winlogon.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation AE 0124 BE.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 1464 AE 0124 BE.exe 4148 winlogon.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Windows\Media\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Downloaded Program Files\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Fonts\desktop.ini AE 0124 BE.exe -
Drops autorun.inf file 1 TTPs 27 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\B:\Autorun.inf winlogon.exe File opened for modification \??\M:\Autorun.inf winlogon.exe File opened for modification \??\O:\Autorun.inf winlogon.exe File opened for modification \??\V:\Autorun.inf winlogon.exe File opened for modification \??\F:\Autorun.inf winlogon.exe File opened for modification \??\H:\Autorun.inf winlogon.exe File opened for modification \??\J:\Autorun.inf winlogon.exe File opened for modification \??\L:\Autorun.inf winlogon.exe File opened for modification \??\T:\Autorun.inf winlogon.exe File opened for modification \??\A:\Autorun.inf winlogon.exe File opened for modification \??\G:\Autorun.inf winlogon.exe File opened for modification \??\I:\Autorun.inf winlogon.exe File opened for modification \??\P:\Autorun.inf winlogon.exe File opened for modification D:\Autorun.inf winlogon.exe File opened for modification \??\S:\Autorun.inf winlogon.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf AE 0124 BE.exe File opened for modification \??\K:\Autorun.inf winlogon.exe File opened for modification \??\N:\Autorun.inf winlogon.exe File opened for modification \??\Q:\Autorun.inf winlogon.exe File opened for modification \??\W:\Autorun.inf winlogon.exe File opened for modification \??\Y:\Autorun.inf winlogon.exe File opened for modification C:\Autorun.inf winlogon.exe File opened for modification \??\Z:\Autorun.inf winlogon.exe File opened for modification \??\E:\Autorun.inf winlogon.exe File opened for modification \??\R:\Autorun.inf winlogon.exe File opened for modification \??\U:\Autorun.inf winlogon.exe File opened for modification \??\X:\Autorun.inf winlogon.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\regedit.exe AE 0124 BE.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.Services.Design.Resources AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runtc259d85b#\3edee8dff35bc9d4cb38e892ca0bf3a0\System.Runtime.WindowsRuntime.UI.Xaml.ni.dll.aux AE 0124 BE.exe File opened for modification C:\Windows\Boot\EFI\ja-JP\bootmgr.efi.mui AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Speech\RS_CalibrationRequired.ps1 AE 0124 BE.exe File opened for modification C:\Windows\INF\TAPISRV\0407\tapiperf.ini AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml.ReaderWriter AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Collections\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Collections.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.ServiceModel.Resources\3.0.0.0_ja_b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security.Resources\v4.0_3.0.0.0_de_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install.resources\v4.0_4.0.0.0_es_b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\UIAutomationProvider.Resources\3.0.0.0_it_31bf3856ad364e35\UIAutomationProvider.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Printer\TS_SpoolerService.ps1 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\sysglobl\v4.0_4.0.0.0__b03f5f7f11d50a3a\sysglobl.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ComponentModel.Composition.Registration.resources\v4.0_4.0.0.0_ja_b77a5c561934e089\System.ComponentModel.Composition.Registration.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\es-ES\hh.exe.mui AE 0124 BE.exe File opened for modification C:\Windows\Fonts\calibrili.ttf AE 0124 BE.exe File opened for modification C:\Windows\INF\MSDTC Bridge 3.0.0.0\0410\_TransactionBridgePerfCounters_D.ini AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.ManagementConsole.Resources\3.0.0.0_en_31bf3856ad364e35\Microsoft.ManagementConsole.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management.Resources\1.0.0.0_es_31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.Services.Design.Resources\3.5.0.0_ja_b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Routing.Resources\3.5.0.0_es_31bf3856ad364e35\System.Web.Routing.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Apps\TS_Main.ps1 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\XsdBuildTask AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\UIAutomationClient.Resources AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.12.0.Microsoft.Office.Interop.Graph\15.0.0.0__71e9bce111e9429c\Policy.12.0.Microsoft.Office.Interop.Graph.dll AE 0124 BE.exe File opened for modification C:\Windows\Cursors\size3_rl.cur AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Device\it-IT AE 0124 BE.exe File opened for modification C:\Windows\Help\mui\0410\msdasc.chm AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Conversion.v3.5\3.5.0.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\WindowsFormsIntegration\3.0.0.0__31bf3856ad364e35\WindowsFormsIntegration.dll AE 0124 BE.exe File opened for modification C:\Windows\Fonts\msyhl.ttc AE 0124 BE.exe File opened for modification C:\Windows\INF\genericusbfn.inf AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Configuration.Install.Resources AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Speech.Resources AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Transactions.Bridge.Dtc.Resources\3.0.0.0_fr_b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\Accessibility AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Policy.3.0.Microsoft.BackgroundIntelligentTransfer.Management\v4.0_10.0.0.0__31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualBasic.Compatibility.Data.Resources\8.0.0.0_de_b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\Cursors\size4_r.cur AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Apps\ja-JP AE 0124 BE.exe File opened for modification C:\Windows\IME\IMEKR\HELP AE 0124 BE.exe File opened for modification C:\Windows\INF\TAPISRV\0000 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.Contract.v9.0 AE 0124 BE.exe File opened for modification C:\Windows\INF\errata.inf AE 0124 BE.exe File opened for modification C:\Windows\INF\uefi.inf AE 0124 BE.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180660} AE 0124 BE.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\Annots.api AE 0124 BE.exe File opened for modification C:\Windows\INF\npsvctrig.PNF AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost.Resources\v4.0_3.0.0.0_ja_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.Commands.GetDiagInput.Resources\v4.0_1.0.0.0_es_31bf3856ad364e35\Microsoft.Windows.Diagnosis.Commands.GetDiagInput.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\AE 0124 BE.exe AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.W2ded559f#\6ea76b3934a3bd6c2282aa35e16dae8c\Microsoft.WindowsAuthenticationProtocols.Commands.ni.dll AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Audio\fr-FR AE 0124 BE.exe File opened for modification C:\Windows\Fonts\trebuc.ttf AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ComponentModel.DataAnnotations.resources\v4.0_4.0.0.0_it_31bf3856ad364e35\System.ComponentModel.DataAnnotations.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\INF\ServiceModelOperation 3.0.0.0\0410 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Cmdletization.OData\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Cmdletization.OData.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic.Compatibility.Data.resources\v4.0_10.0.0.0_de_b03f5f7f11d50a3a\Microsoft.VisualBasic.Compatibility.Data.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_32 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Extensions.Resources\3.5.0.0_it_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\en-US\helppane.exe.mui AE 0124 BE.exe File opened for modification C:\Windows\ImmersiveControlPanel\images\logo.scale-125_altform-lightunplated.png AE 0124 BE.exe File opened for modification C:\Windows\INF\mdmgsm.inf AE 0124 BE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1996943799" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1996943799" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2728ad8693e804caf0ad2c227b142160000000002000000000010660000000100002000000063437c943aaecb29c4a2ec497ff3c6a7444e0af9706bf8db7efd951bc691d952000000000e800000000200002000000015faac4be8be564f696330b75ac45b7bfc1455471589be6649d37c1dae59686f20000000c3d2de5fc10933868ef6091fb072bd4d13b3506518ef3725f19b453f168d6ad140000000effc540699b69ecbc8d2642114f6aaf9976c522ae44b125efcad7afb6abbcaeda647b9ed7a36b9bbf0d57526d16eb55bbe2607ffdd160f3018ef3b218788e988 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f64b77aae4d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10240d78aae4d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{91E5C81A-509D-11ED-B696-EE6CABA3804C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2728ad8693e804caf0ad2c227b1421600000000020000000000106600000001000020000000f332951200f2bce8faab1f39a4b7d87910f1d52682c037d651c9ef879c4c0278000000000e8000000002000020000000f92a138a17f182badf86ddb7fa37a599b519a19c3eacfc9232acf97597dc352f20000000aeec64538d8214587a70712d675c4e8b2d8e3c7e2917172593def37a2b742a15400000007f6d8a759cf42cac877dfa7c8f81eec68b057d069f69d202529345b819aed36346356c4953642db57460dd7c2d280cc729ec96646e7375c85d86a0e9aee01adb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373052320" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991530" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991530" IEXPLORE.EXE -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ AE 0124 BE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winlogon.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4468 9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe 2348 winlogon.exe 2636 iexplore.exe 2636 iexplore.exe 1464 AE 0124 BE.exe 4148 winlogon.exe 4740 IEXPLORE.EXE 4740 IEXPLORE.EXE 4740 IEXPLORE.EXE 4740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4468 wrote to memory of 2636 4468 9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe 84 PID 4468 wrote to memory of 2636 4468 9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe 84 PID 4468 wrote to memory of 2348 4468 9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe 85 PID 4468 wrote to memory of 2348 4468 9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe 85 PID 4468 wrote to memory of 2348 4468 9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe 85 PID 2636 wrote to memory of 4740 2636 iexplore.exe 86 PID 2636 wrote to memory of 4740 2636 iexplore.exe 86 PID 2636 wrote to memory of 4740 2636 iexplore.exe 86 PID 2348 wrote to memory of 1464 2348 winlogon.exe 87 PID 2348 wrote to memory of 1464 2348 winlogon.exe 87 PID 2348 wrote to memory of 1464 2348 winlogon.exe 87 PID 2348 wrote to memory of 220 2348 winlogon.exe 88 PID 2348 wrote to memory of 220 2348 winlogon.exe 88 PID 2348 wrote to memory of 220 2348 winlogon.exe 88 PID 1464 wrote to memory of 4148 1464 AE 0124 BE.exe 90 PID 1464 wrote to memory of 4148 1464 AE 0124 BE.exe 90 PID 1464 wrote to memory of 4148 1464 AE 0124 BE.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe"C:\Users\Admin\AppData\Local\Temp\9a6d349d3279b7563f812aa2cbc2c80a420cf17a4763bef25a2d118245468764.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Windows\AE 0124 BE.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4740
-
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Drops autorun.inf file
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\AE 0124 BE.exe"C:\Windows\AE 0124 BE.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4148
-
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"3⤵
- Executes dropped EXE
PID:220
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD56727420d5e01f42911ac33e641f31307
SHA159948d4e8234a95ea9e49ca4ae3533f05567c95c
SHA256c1327e2a0a2006b61f3283d21569d1ccc7efd795caefa9e767432a93014cd984
SHA51224d133841ff4e00373df0e484d6cc6df3d7b6e5c68c735d7a73a3b92a8c02f98a39bd8f40e2f88d27fbaed675794b6e35c263cb522beade09556acfed8fad3d5
-
Filesize
40KB
MD56727420d5e01f42911ac33e641f31307
SHA159948d4e8234a95ea9e49ca4ae3533f05567c95c
SHA256c1327e2a0a2006b61f3283d21569d1ccc7efd795caefa9e767432a93014cd984
SHA51224d133841ff4e00373df0e484d6cc6df3d7b6e5c68c735d7a73a3b92a8c02f98a39bd8f40e2f88d27fbaed675794b6e35c263cb522beade09556acfed8fad3d5
-
Filesize
40KB
MD5ab3025aadbf18701225a9e042a92a433
SHA1b8d338f3a1c4b2d6e88d87f4fba3a7979109963f
SHA256caf029d5d4c83ce977906084dc058f066ff7f1b176a8097e73d4367c7f404819
SHA512d0ceb02007be7d00d216813c4f74387fc78f9544917b22a195769583960cca39cc15bba30edafed5ba9e82e7c3137a47b51bb178ae7c8974f89304fdd3607c61
-
Filesize
40KB
MD5ab3025aadbf18701225a9e042a92a433
SHA1b8d338f3a1c4b2d6e88d87f4fba3a7979109963f
SHA256caf029d5d4c83ce977906084dc058f066ff7f1b176a8097e73d4367c7f404819
SHA512d0ceb02007be7d00d216813c4f74387fc78f9544917b22a195769583960cca39cc15bba30edafed5ba9e82e7c3137a47b51bb178ae7c8974f89304fdd3607c61
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
40KB
MD56727420d5e01f42911ac33e641f31307
SHA159948d4e8234a95ea9e49ca4ae3533f05567c95c
SHA256c1327e2a0a2006b61f3283d21569d1ccc7efd795caefa9e767432a93014cd984
SHA51224d133841ff4e00373df0e484d6cc6df3d7b6e5c68c735d7a73a3b92a8c02f98a39bd8f40e2f88d27fbaed675794b6e35c263cb522beade09556acfed8fad3d5
-
Filesize
40KB
MD56727420d5e01f42911ac33e641f31307
SHA159948d4e8234a95ea9e49ca4ae3533f05567c95c
SHA256c1327e2a0a2006b61f3283d21569d1ccc7efd795caefa9e767432a93014cd984
SHA51224d133841ff4e00373df0e484d6cc6df3d7b6e5c68c735d7a73a3b92a8c02f98a39bd8f40e2f88d27fbaed675794b6e35c263cb522beade09556acfed8fad3d5
-
Filesize
40KB
MD56727420d5e01f42911ac33e641f31307
SHA159948d4e8234a95ea9e49ca4ae3533f05567c95c
SHA256c1327e2a0a2006b61f3283d21569d1ccc7efd795caefa9e767432a93014cd984
SHA51224d133841ff4e00373df0e484d6cc6df3d7b6e5c68c735d7a73a3b92a8c02f98a39bd8f40e2f88d27fbaed675794b6e35c263cb522beade09556acfed8fad3d5
-
Filesize
40KB
MD56727420d5e01f42911ac33e641f31307
SHA159948d4e8234a95ea9e49ca4ae3533f05567c95c
SHA256c1327e2a0a2006b61f3283d21569d1ccc7efd795caefa9e767432a93014cd984
SHA51224d133841ff4e00373df0e484d6cc6df3d7b6e5c68c735d7a73a3b92a8c02f98a39bd8f40e2f88d27fbaed675794b6e35c263cb522beade09556acfed8fad3d5
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb