Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe
Resource
win10v2004-20220812-en
General
-
Target
38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe
-
Size
1.8MB
-
MD5
96c7c646dc9e6d9a7aa2c7a9b429d9c5
-
SHA1
b95bbd0d5385d15d592ab5a52afdb33e5bdc00f5
-
SHA256
38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337
-
SHA512
0a98b466927a4652b12e7f0347b75a96856d51a2f0c0cf8f64c17849bbfcb11d48f41668f6ebfd7715ac3a1fac0f7a84eca6df0090f014015b0a0b21c7dedc44
-
SSDEEP
24576:BIYog+WVlH6r4vh5e9VsfulBUSPfA6ywcQIaJUqpuuPkdY8iIwTNrpV4hLW7HI5:+gdlHE9sC+SjyOzpnkdY8iDTNrpqhLwM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe -
Loads dropped DLL 1 IoCs
pid Process 2044 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c000000000200000000001066000000010000200000007ec546daf4ee6e90effe5dcd74f18e268533b05cb8de13aa9991e00aaa02a61b000000000e80000000020000200000001a419a4209f5542c01638ad3db5d0bc2b03bb3cbe1a82fee5b89abfe49f2743e90000000f7a3a0aa49db2d03ae448a134593af94c19ce4cd596135a7a4227201b77fff8ac49488ff6b7ac027d051443299d8c2383466a7032a779b393147d9c91ba157886073b72b41880aae277cbccfabbad3129fed67fe9fb1a52e585a1260b2c2a55e25c1363e1f4539caeb0ceae4e3f1ddf138d4a8f159bf39419aec244ac96bc997408dc23a71c490258b615dc4961d05d640000000783fac07f3e05e0fbca3749e93fa6b777f028e02443bc8334d183835f6793e80bb9a77de8409b0182e0ddf35e76a63972678f1cc8c18e99411e545eaeb8af783 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\safejy.com 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\safejy.com\NumberOfSubdomains = "1" 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.safejy.com\ = "63" 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373843212" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.safejy.com 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\safejy.com\Total = "63" 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d0feebdbebd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F7A3F31-57CF-11ED-B40B-E20468906380} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c000000000200000000001066000000010000200000005331c663aa60f1805127434631dd8c3a98965e4ed08685ef23024fd39c913e93000000000e8000000002000020000000aa7a2c4adc643dc149a64b827659f46c51cbb8d6fb4aa67394971f3e3976905c20000000b70f0bbaa5e4240a8e619b3ba8b66d30c5b2879028f1c0abff23f5637743c58940000000e334b7b5c4663673816578f8801bac60271b6e5c91719c6f5a2f5dd4e288f9a85006dbd8d8e134c3eba0c10c4c5d3479ebd4268115e7883b3bdf4ed69be81fe7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 2044 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 2044 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 536 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 536 AUDIODG.EXE Token: 33 536 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 536 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1756 copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 2044 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 2044 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 1960 iexplore.exe 1960 iexplore.exe 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1756 2044 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 26 PID 2044 wrote to memory of 1756 2044 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 26 PID 2044 wrote to memory of 1756 2044 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 26 PID 2044 wrote to memory of 1756 2044 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 26 PID 2044 wrote to memory of 1960 2044 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 30 PID 2044 wrote to memory of 1960 2044 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 30 PID 2044 wrote to memory of 1960 2044 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 30 PID 2044 wrote to memory of 1960 2044 38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe 30 PID 1960 wrote to memory of 1464 1960 iexplore.exe 31 PID 1960 wrote to memory of 1464 1960 iexplore.exe 31 PID 1960 wrote to memory of 1464 1960 iexplore.exe 31 PID 1960 wrote to memory of 1464 1960 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe"C:\Users\Admin\AppData\Local\Temp\38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe"C:\Users\Admin\AppData\Local\Temp\copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe" C:\Users\Admin\AppData\Local\Temp\copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://jc.110160.com/ad.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1464
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
PID:536
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5cdeba4bb829e682e7d7246f9ced3d4e7
SHA157961522df7efa5071297dc184ee027e7a1533b7
SHA256ce735f69ac45a32749e4c723c107a8ab90efb9d6ecc54c34afe29c2ad621da5a
SHA512ed9ef46d70082647bdff42f2544c1dc7fe3cd617c4fde9ed11fa59df5fd45d916266cccacb4a309cc2067beb858d9e5d7dd6be5694aa9de9a6a32414bea1c73d
-
C:\Users\Admin\AppData\Local\Temp\copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe
Filesize1.8MB
MD596c7c646dc9e6d9a7aa2c7a9b429d9c5
SHA1b95bbd0d5385d15d592ab5a52afdb33e5bdc00f5
SHA25638255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337
SHA5120a98b466927a4652b12e7f0347b75a96856d51a2f0c0cf8f64c17849bbfcb11d48f41668f6ebfd7715ac3a1fac0f7a84eca6df0090f014015b0a0b21c7dedc44
-
Filesize
606B
MD552701f2bba85727cdecfe2dd7e4faa82
SHA1b0d6722db0e325eb3fea1191d8f888cb17640034
SHA256ca5c21dfaa387586cb3806a7998219e145846135147155266d901badcc9d9ffc
SHA512fe47445eef0121e3b907d1b1cf8a19a3891c437370eb23431442657d110b18ea07bc7018f74fd4af9ed69ee06eeeea659b06f80cd1eaf817e1ea47af381141d6
-
\Users\Admin\AppData\Local\Temp\copy38255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337.exe
Filesize1.8MB
MD596c7c646dc9e6d9a7aa2c7a9b429d9c5
SHA1b95bbd0d5385d15d592ab5a52afdb33e5bdc00f5
SHA25638255e8641de7f8364cc6caa02abdb203675871f96aa7ebb98a8e5b5a2b1a337
SHA5120a98b466927a4652b12e7f0347b75a96856d51a2f0c0cf8f64c17849bbfcb11d48f41668f6ebfd7715ac3a1fac0f7a84eca6df0090f014015b0a0b21c7dedc44