Analysis
-
max time kernel
77s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 23:07
Behavioral task
behavioral1
Sample
a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe
Resource
win7-20220812-en
General
-
Target
a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe
-
Size
111KB
-
MD5
a1a03d75d1740f39b913884980cddd60
-
SHA1
30aed1d2ec4e6f690e899a493d675204a3a9e259
-
SHA256
a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79
-
SHA512
135a3779384dfd724c940f72d0f4d2d096e8e879f42fd9dd26dd10de71d264408cae82ad6852cbb7c707edf1e11391207ec9c29987010c8ecba15b7e5e35b839
-
SSDEEP
1536:4+hzRsibKplyXTq8OGRnsPFG+RODTb7MXL5uXZnzEdkvLQZ8Eq9jdNFChPEX9ua2:TROzoTq0+RO7IwnY+x/mJnaYW8dBHb
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1376 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe 1892 DesktopLayer.exe 944 DesktopLayerSrv.exe 1996 DesktopLayer.exe -
resource yara_rule behavioral1/files/0x000c0000000054a8-55.dat upx behavioral1/files/0x000c0000000054a8-57.dat upx behavioral1/files/0x000c0000000054a8-59.dat upx behavioral1/files/0x000a0000000122ff-60.dat upx behavioral1/memory/1376-65-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x000a0000000122ff-63.dat upx behavioral1/memory/832-62-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x0009000000012303-66.dat upx behavioral1/files/0x000a0000000122ff-69.dat upx behavioral1/files/0x0009000000012303-68.dat upx behavioral1/memory/1892-71-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x0009000000012303-72.dat upx behavioral1/files/0x000a0000000122ff-73.dat upx behavioral1/memory/944-76-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x000a0000000122ff-75.dat upx behavioral1/files/0x000a0000000122ff-78.dat upx behavioral1/memory/1996-79-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 832 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe 832 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe 1892 DesktopLayer.exe 944 DesktopLayerSrv.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe File opened for modification C:\Program Files (x86)\Microsoft\px13A.tmp a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe DesktopLayer.exe File opened for modification C:\Program Files (x86)\Microsoft\px214.tmp DesktopLayerSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe DesktopLayerSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\px12A.tmp a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B06DFD1-594A-11ED-8AB9-FAB5137186BE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6AEAA541-594A-11ED-8AB9-FAB5137186BE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6AF18311-594A-11ED-8AB9-FAB5137186BE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374006150" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1376 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe 1376 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe 1376 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe 1376 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe 1892 DesktopLayer.exe 1892 DesktopLayer.exe 1892 DesktopLayer.exe 1892 DesktopLayer.exe 1996 DesktopLayer.exe 1996 DesktopLayer.exe 1996 DesktopLayer.exe 1996 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1936 iexplore.exe 1956 iexplore.exe 996 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 1956 iexplore.exe 1956 iexplore.exe 996 iexplore.exe 996 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 832 wrote to memory of 1376 832 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe 28 PID 832 wrote to memory of 1376 832 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe 28 PID 832 wrote to memory of 1376 832 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe 28 PID 832 wrote to memory of 1376 832 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe 28 PID 832 wrote to memory of 1892 832 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe 29 PID 832 wrote to memory of 1892 832 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe 29 PID 832 wrote to memory of 1892 832 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe 29 PID 832 wrote to memory of 1892 832 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe 29 PID 1376 wrote to memory of 996 1376 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe 30 PID 1376 wrote to memory of 996 1376 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe 30 PID 1376 wrote to memory of 996 1376 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe 30 PID 1376 wrote to memory of 996 1376 a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe 30 PID 1892 wrote to memory of 944 1892 DesktopLayer.exe 31 PID 1892 wrote to memory of 944 1892 DesktopLayer.exe 31 PID 1892 wrote to memory of 944 1892 DesktopLayer.exe 31 PID 1892 wrote to memory of 944 1892 DesktopLayer.exe 31 PID 1892 wrote to memory of 1956 1892 DesktopLayer.exe 32 PID 1892 wrote to memory of 1956 1892 DesktopLayer.exe 32 PID 1892 wrote to memory of 1956 1892 DesktopLayer.exe 32 PID 1892 wrote to memory of 1956 1892 DesktopLayer.exe 32 PID 944 wrote to memory of 1996 944 DesktopLayerSrv.exe 33 PID 944 wrote to memory of 1996 944 DesktopLayerSrv.exe 33 PID 944 wrote to memory of 1996 944 DesktopLayerSrv.exe 33 PID 944 wrote to memory of 1996 944 DesktopLayerSrv.exe 33 PID 1996 wrote to memory of 1936 1996 DesktopLayer.exe 34 PID 1996 wrote to memory of 1936 1996 DesktopLayer.exe 34 PID 1996 wrote to memory of 1936 1996 DesktopLayer.exe 34 PID 1996 wrote to memory of 1936 1996 DesktopLayer.exe 34 PID 1936 wrote to memory of 1688 1936 iexplore.exe 38 PID 1936 wrote to memory of 1688 1936 iexplore.exe 38 PID 1936 wrote to memory of 1688 1936 iexplore.exe 38 PID 1936 wrote to memory of 1688 1936 iexplore.exe 38 PID 996 wrote to memory of 1272 996 iexplore.exe 36 PID 996 wrote to memory of 1272 996 iexplore.exe 36 PID 996 wrote to memory of 1272 996 iexplore.exe 36 PID 996 wrote to memory of 1272 996 iexplore.exe 36 PID 1956 wrote to memory of 1520 1956 iexplore.exe 37 PID 1956 wrote to memory of 1520 1956 iexplore.exe 37 PID 1956 wrote to memory of 1520 1956 iexplore.exe 37 PID 1956 wrote to memory of 1520 1956 iexplore.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe"C:\Users\Admin\AppData\Local\Temp\a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exeC:\Users\Admin\AppData\Local\Temp\a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:996 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
-
-
-
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe"C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD5a1a03d75d1740f39b913884980cddd60
SHA130aed1d2ec4e6f690e899a493d675204a3a9e259
SHA256a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79
SHA512135a3779384dfd724c940f72d0f4d2d096e8e879f42fd9dd26dd10de71d264408cae82ad6852cbb7c707edf1e11391207ec9c29987010c8ecba15b7e5e35b839
-
Filesize
111KB
MD5a1a03d75d1740f39b913884980cddd60
SHA130aed1d2ec4e6f690e899a493d675204a3a9e259
SHA256a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79
SHA512135a3779384dfd724c940f72d0f4d2d096e8e879f42fd9dd26dd10de71d264408cae82ad6852cbb7c707edf1e11391207ec9c29987010c8ecba15b7e5e35b839
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6AEAA541-594A-11ED-8AB9-FAB5137186BE}.dat
Filesize5KB
MD588686614d15bd9c36cf19053dcd3d590
SHA1f66b66b04c13687001883aeb65c0976bf6102ffe
SHA256af67d2ddd439d09208f584767b95e814ab69a824706c0f7ef219d819a1640252
SHA512c9230935be02ac123adda5acc2afcc202095a9865d181fc1d759807d5bf67fca97622d9a9f322da38ffb7fd299f310cf71bb7bee0ae2fc4f6bca5a746dc814d1
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6AF18311-594A-11ED-8AB9-FAB5137186BE}.dat
Filesize5KB
MD5fa0026ffc4614517c6e1c797817df0f7
SHA172ef5e2647d26a7c92a19e8fa839afb2983b31a5
SHA2566e96f2093a7c7382aac9bfea643238a64b76f38c735ea6e9dcb81f99f1bf54b4
SHA5123f2e3f500880ab8d2dcaf7bf2c025e25575e13c61af7ab0f08afb270ddea88d8dd026af7e94aa0e8252ad849d0a140d267051cc21da976b8de8ec563b0d99f7a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6B06DFD1-594A-11ED-8AB9-FAB5137186BE}.dat
Filesize3KB
MD5787006b534b5df15f9668a53b5d87d90
SHA1e95e4e650aa9ed298996241cf51236dfc50c17ff
SHA256c6b602641de003e71e340868fa3c926292007de247d1456c70218542f3ee428f
SHA512ce7c42fa56ee587ff4a94f6ddda57072015e2769a49b65e6521f01153b3c8834faa716a1f2e3867ce56e5f09aea5a0bce271c0b8e004b951d2024c261f0bd9f5
-
C:\Users\Admin\AppData\Local\Temp\a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\Local\Temp\a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
608B
MD5e549db8d4c13214c9c74beb64d97afdb
SHA1f36a7e13b0a05fc2d72a7df40e1cdb56ce41b450
SHA256a105da9a6a256e5978d3a231f52ae4008c343c531869af361adb29538d72ac12
SHA512258a074c8c1fcb8ad59641a4681df72462d397cb1a5e0d45e4333b5d63f9a74617f4378a563d3efde17685f3c2289798a542359554eca19061fee1a66d78a544
-
Filesize
111KB
MD5a1a03d75d1740f39b913884980cddd60
SHA130aed1d2ec4e6f690e899a493d675204a3a9e259
SHA256a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79
SHA512135a3779384dfd724c940f72d0f4d2d096e8e879f42fd9dd26dd10de71d264408cae82ad6852cbb7c707edf1e11391207ec9c29987010c8ecba15b7e5e35b839
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
\Users\Admin\AppData\Local\Temp\a23f6867bcbd8fd25c2b2abb6451314aefddc0cbca8053bd8ce6e61a9a24aa79Srv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a