Analysis
-
max time kernel
161s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe
Resource
win10v2004-20220812-en
General
-
Target
4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe
-
Size
20KB
-
MD5
01d53cb917902d0716b0bb89c4070950
-
SHA1
f469be4edc10c15bc8a54289e27fce183f37067b
-
SHA256
4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008
-
SHA512
bcf01146b7b1a8f94696a69f46fd2bd52832e79829c8923f17eeb245abf7960a8156e49816b520fd8bddf41790c7b722c203b4fbb431bec8d6925dbf44b6e5a9
-
SSDEEP
192:1l5E3krTuntKy0peHDfCpHfBv+I4QwXt9V+jqu0G5KDJBdq:1M3PnQoHDCpHf4I4Qwdc0G5KDJXq
Malware Config
Signatures
-
Drops file in Drivers directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe 4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe -
Executes dropped EXE 4 IoCs
pid Process 2616 winlogon.exe 3936 AE 0124 BE.exe 2180 winlogon.exe 3452 winlogon.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation AE 0124 BE.exe -
Loads dropped DLL 3 IoCs
pid Process 3936 AE 0124 BE.exe 2180 winlogon.exe 3452 winlogon.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Downloaded Program Files\desktop.ini AE 0124 BE.exe -
Drops autorun.inf file 1 TTPs 27 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\F:\Autorun.inf winlogon.exe File opened for modification \??\O:\Autorun.inf winlogon.exe File opened for modification \??\S:\Autorun.inf winlogon.exe File opened for modification \??\R:\Autorun.inf winlogon.exe File opened for modification \??\W:\Autorun.inf winlogon.exe File opened for modification \??\Z:\Autorun.inf winlogon.exe File opened for modification \??\U:\Autorun.inf winlogon.exe File opened for modification \??\V:\Autorun.inf winlogon.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf AE 0124 BE.exe File opened for modification \??\A:\Autorun.inf winlogon.exe File opened for modification C:\Autorun.inf winlogon.exe File opened for modification \??\K:\Autorun.inf winlogon.exe File opened for modification \??\L:\Autorun.inf winlogon.exe File opened for modification \??\P:\Autorun.inf winlogon.exe File opened for modification \??\Y:\Autorun.inf winlogon.exe File opened for modification \??\E:\Autorun.inf winlogon.exe File opened for modification \??\M:\Autorun.inf winlogon.exe File opened for modification D:\Autorun.inf winlogon.exe File opened for modification \??\I:\Autorun.inf winlogon.exe File opened for modification \??\G:\Autorun.inf winlogon.exe File opened for modification \??\J:\Autorun.inf winlogon.exe File opened for modification \??\N:\Autorun.inf winlogon.exe File opened for modification \??\T:\Autorun.inf winlogon.exe File opened for modification \??\B:\Autorun.inf winlogon.exe File opened for modification \??\H:\Autorun.inf winlogon.exe File opened for modification \??\Q:\Autorun.inf winlogon.exe File opened for modification \??\X:\Autorun.inf winlogon.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\regedit.exe AE 0124 BE.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\INF\.NET Data Provider for SqlServer\040C\_dataperfcounters_shared12_neutral_d.ini AE 0124 BE.exe File opened for modification C:\Windows\ja-JP\regedit.exe.mui AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands.Resources AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.AppV.AppVClientWmi.Resources\v4.0_10.0.0.0_de_31bf3856ad364e35\Microsoft.AppV.AppVClientWmi.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.Services.Resources\3.5.0.0_it_b77a5c561934e089\System.Data.Services.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.P08ac43d5#\28965f332c6eb08558a6f5eb76540d9f AE 0124 BE.exe File opened for modification C:\Windows\INF\mdmdcm5.inf AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationCFFRasterizer AE 0124 BE.exe File opened for modification C:\Windows\INF\ksfilter.inf AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.DynamicData.Resources\3.5.0.0_ja_31bf3856ad364e35\System.Web.DynamicData.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Boot\EFI\lv-LV\bootmgfw.efi.mui AE 0124 BE.exe File opened for modification C:\Windows\INF\mdmgl008.inf AE 0124 BE.exe File opened for modification C:\Windows\Fonts\cga80866.fon AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.11.0.Microsoft.Vbe.Interop\15.0.0.0__71e9bce111e9429c\Policy.11.0.Microsoft.Vbe.Interop.config AE 0124 BE.exe File opened for modification C:\Windows\INF\TAPISRV\040C AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Extensions.Resources\3.5.0.0_de_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Power\fr-FR\RS_ChangeProcessorState.psd1 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\v4.0_10.0.0.0_fr_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.ConfigCI.Commands.Resources\v4.0_10.0.0.0_de_31bf3856ad364e35\Microsoft.ConfigCI.Commands.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationUI\3.0.0.0__31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\fr-FR\regedit.exe.mui AE 0124 BE.exe File opened for modification C:\Windows\INF\vstxraid.inf AE 0124 BE.exe File opened for modification C:\Windows\INF\monitor.PNF AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.resources AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Serialization AE 0124 BE.exe File opened for modification C:\Windows\Cursors\arrow_r.cur AE 0124 BE.exe File opened for modification C:\Windows\INF\.NET CLR Networking 4.0.0.0\0000 AE 0124 BE.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\icudt40.dll AE 0124 BE.exe File opened for modification C:\Windows\Globalization\ELS\Transliteration\decompose-hangul.nlt AE 0124 BE.exe File opened for modification C:\Windows\INF\pmem.inf AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.Entity.Design.resources AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\Microsoft.P08ac43d5#\c22867030e5bfe64cd2f01ea2a121306\Microsoft.PowerShell.Utility.Activities.ni.dll.aux AE 0124 BE.exe File opened for modification C:\Windows\Boot\Resources\en-US\bootres.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Power\de-DE\RS_DisableUSBSelective.psd1 AE 0124 BE.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\JSByteCodeWin.bin AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\445e1976593e6b3b2072e606af9be0ae\System.Xml.ni.dll AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\PCW\fr-FR\CL_LocalizationData.psd1 AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Search\DiagPackage.diagpkg AE 0124 BE.exe File opened for modification C:\Windows\Logs\HomeGroup AE 0124 BE.exe File opened for modification C:\Windows\Boot\PCAT\qps-ploc\memtest.exe.mui AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\WindowsMediaPlayerPlayDVD\de-DE\DiagPackage.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\Fonts\constanb.ttf AE 0124 BE.exe File opened for modification C:\Windows\INF\mdmpn1.inf AE 0124 BE.exe File opened for modification C:\Windows\Logs\waasmedic\waasmedic.20220812_194033_082.etl AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\WindowsBase.Resources\3.0.0.0_fr_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Boot\EFI\sv-SE\bootmgr.efi.mui AE 0124 BE.exe File opened for modification C:\Windows\DiagTrack\analyticsevents.dat AE 0124 BE.exe File opened for modification C:\Windows\Cursors\move_m.cur AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Reflection.Primitives AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Runtime.Serialization.Formatters.Soap\2.0.0.0__b03f5f7f11d50a3a\System.Runtime.Serialization.Formatters.Soap.dll AE 0124 BE.exe File opened for modification C:\Windows\Media\Hide_48000Hz.raw AE 0124 BE.exe File opened for modification C:\Windows\WinSxS AE 0124 BE.exe File opened for modification C:\Windows\Cursors\size4_im.cur AE 0124 BE.exe File opened for modification C:\Windows\INF\disk.inf AE 0124 BE.exe File opened for modification C:\Windows\INF\sensorsalsdriver.inf AE 0124 BE.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\_4bitmapibroker.exe AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.ApplicationId.Framework.Resources\v4.0_10.0.0.0_fr_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\apppatch\frxmain.sdb AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.SqlXml.Resources\2.0.0.0_fr_b77a5c561934e089\system.data.sqlxml.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Dired13b18a9# AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Windows.Presentation.Resources AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Power\en-US\RS_AdjustDimDisplay.psd1 AE 0124 BE.exe File opened for modification C:\Windows\Fonts\BOOKOS.TTF AE 0124 BE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373775186" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00edd933debd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A6ABFB1B-5730-11ED-AECB-DAE60F07E07D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d912000000000020000000000106600000001000020000000198a7c8e3e40975b2d2d05601ee9c3e501e1519ae63e6cdb7a336ee627ea23c7000000000e80000000020000200000001c087ba56d79b87238539f74a7c5178631f2fe0298166f01a15a76b878bf8cd52000000080cb7dab955493efcdf31134d0c59b6ae9f23b17d89cc8706c5319a3d38c388c4000000009c97e97e0e2b29d4e95d0f42d4ea7a8bd6ed42465223b41516b32d831f817a196f6be433b4f5d73dede4e8cbd98f730b84809c4a1db868614e04cd63e032573 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3047a6933debd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d91200000000002000000000010660000000100002000000056cd0511e08ee207c7a0b22d472362447679a48ccd86568b35e1f21c8bc387c9000000000e8000000002000020000000b570f3d6adcea4c497668acfee2d22ae1dbdc04bf1a0ae87b8ae8bd4973954ab20000000291b510864f931e7354d822ea9459d165b47fe964cae04fee7bed6c64cfd61834000000048033a06cbcee02f9ab4cec3b8f4ac7c64b3a7d118770ae80bc867dd9a5ca244c2f36975abb8ac7db788adc0abff727398c16e0d86dc181a2797783102ed9a5f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ AE 0124 BE.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4320 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2276 4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe 4320 iexplore.exe 4320 iexplore.exe 2616 winlogon.exe 3936 AE 0124 BE.exe 2180 winlogon.exe 3452 winlogon.exe 4884 IEXPLORE.EXE 4884 IEXPLORE.EXE 4884 IEXPLORE.EXE 4884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2276 wrote to memory of 4320 2276 4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe 81 PID 2276 wrote to memory of 4320 2276 4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe 81 PID 4320 wrote to memory of 4884 4320 iexplore.exe 84 PID 4320 wrote to memory of 4884 4320 iexplore.exe 84 PID 4320 wrote to memory of 4884 4320 iexplore.exe 84 PID 2276 wrote to memory of 2616 2276 4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe 85 PID 2276 wrote to memory of 2616 2276 4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe 85 PID 2276 wrote to memory of 2616 2276 4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe 85 PID 2616 wrote to memory of 3936 2616 winlogon.exe 86 PID 2616 wrote to memory of 3936 2616 winlogon.exe 86 PID 2616 wrote to memory of 3936 2616 winlogon.exe 86 PID 2616 wrote to memory of 2180 2616 winlogon.exe 87 PID 2616 wrote to memory of 2180 2616 winlogon.exe 87 PID 2616 wrote to memory of 2180 2616 winlogon.exe 87 PID 3936 wrote to memory of 3452 3936 AE 0124 BE.exe 88 PID 3936 wrote to memory of 3452 3936 AE 0124 BE.exe 88 PID 3936 wrote to memory of 3452 3936 AE 0124 BE.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe"C:\Users\Admin\AppData\Local\Temp\4cde289924a8db3153190cfe925ec67548b17ff5a86c837ced2db2613cd8a008.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Windows\AE 0124 BE.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4320 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4884
-
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Drops autorun.inf file
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\AE 0124 BE.exe"C:\Windows\AE 0124 BE.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2180
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5e75adc60d403afc686e3f14da82db07e
SHA1d51e33e1311c66761b49f5935404fec419381e1d
SHA256394770afa1f40aaa9a8ab81e9886cdd44da25d976759a2391d790bb9ebe3c993
SHA512a60179f6217d798c7397d74b82791ffa31d76d74d8027eca49f5b8b317b58117789a98127a120a62889ed4f79b6eac767d09d71c8e99d2dd512c41a99c055410
-
Filesize
40KB
MD5e75adc60d403afc686e3f14da82db07e
SHA1d51e33e1311c66761b49f5935404fec419381e1d
SHA256394770afa1f40aaa9a8ab81e9886cdd44da25d976759a2391d790bb9ebe3c993
SHA512a60179f6217d798c7397d74b82791ffa31d76d74d8027eca49f5b8b317b58117789a98127a120a62889ed4f79b6eac767d09d71c8e99d2dd512c41a99c055410
-
Filesize
40KB
MD514f9e67d0af0c13c88b753a1f4ee6b3f
SHA1321f4bdfc538aa835900a78e960fad6d5dcb5f7c
SHA2560a11dd2c3404340eead0fbf9d0af8d5e33b81bc1bceff02449c4e9efd7705617
SHA512d97d63e6e922acffa46619c4a29b99e4d42f8fd85558bbeca5b53b47bb288b7dbe24ca26b9ae6ddf3545a18826d8ae124d8801be755b4af508fbbfb4a81ee565
-
Filesize
40KB
MD514f9e67d0af0c13c88b753a1f4ee6b3f
SHA1321f4bdfc538aa835900a78e960fad6d5dcb5f7c
SHA2560a11dd2c3404340eead0fbf9d0af8d5e33b81bc1bceff02449c4e9efd7705617
SHA512d97d63e6e922acffa46619c4a29b99e4d42f8fd85558bbeca5b53b47bb288b7dbe24ca26b9ae6ddf3545a18826d8ae124d8801be755b4af508fbbfb4a81ee565
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
40KB
MD5e75adc60d403afc686e3f14da82db07e
SHA1d51e33e1311c66761b49f5935404fec419381e1d
SHA256394770afa1f40aaa9a8ab81e9886cdd44da25d976759a2391d790bb9ebe3c993
SHA512a60179f6217d798c7397d74b82791ffa31d76d74d8027eca49f5b8b317b58117789a98127a120a62889ed4f79b6eac767d09d71c8e99d2dd512c41a99c055410
-
Filesize
40KB
MD5e75adc60d403afc686e3f14da82db07e
SHA1d51e33e1311c66761b49f5935404fec419381e1d
SHA256394770afa1f40aaa9a8ab81e9886cdd44da25d976759a2391d790bb9ebe3c993
SHA512a60179f6217d798c7397d74b82791ffa31d76d74d8027eca49f5b8b317b58117789a98127a120a62889ed4f79b6eac767d09d71c8e99d2dd512c41a99c055410
-
Filesize
40KB
MD5e75adc60d403afc686e3f14da82db07e
SHA1d51e33e1311c66761b49f5935404fec419381e1d
SHA256394770afa1f40aaa9a8ab81e9886cdd44da25d976759a2391d790bb9ebe3c993
SHA512a60179f6217d798c7397d74b82791ffa31d76d74d8027eca49f5b8b317b58117789a98127a120a62889ed4f79b6eac767d09d71c8e99d2dd512c41a99c055410
-
Filesize
40KB
MD5e75adc60d403afc686e3f14da82db07e
SHA1d51e33e1311c66761b49f5935404fec419381e1d
SHA256394770afa1f40aaa9a8ab81e9886cdd44da25d976759a2391d790bb9ebe3c993
SHA512a60179f6217d798c7397d74b82791ffa31d76d74d8027eca49f5b8b317b58117789a98127a120a62889ed4f79b6eac767d09d71c8e99d2dd512c41a99c055410
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb