Analysis
-
max time kernel
156s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe
Resource
win7-20220812-en
8 signatures
150 seconds
General
-
Target
fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe
-
Size
660KB
-
MD5
0ea34d10f67eb42f7262486ccd475c12
-
SHA1
376ffaa78c03ed48928ef93fc60ba6231268cce6
-
SHA256
fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460
-
SHA512
38559de2512520a1a8ee0da2b01a5a82707d48223fc80e2ef9d0e6d3f722228bba2750ecd71cbaf53916ced287ce9b3f14dbee8083d59ab4ad1ee33e88d1e85b
-
SSDEEP
6144:pcmffCpJipAQeNai17Y56rKnBfWhveajzxwIEUAPS0PeyxTtvUGs:CmfaXiGQeN/7YkrWBfWhvRhQUAbPbZtq
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaws.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\VideoLAN\VLC\vlc.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\visicon.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Maps.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jdk1.8.0_66\db\bin\NetworkServerControl.bat- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\accicons.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Mozilla Firefox\firefox.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Internet Explorer\ielowutil.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pubs.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Mozilla Firefox\crashreporter.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files (x86)\Windows Media Player\wmplayer.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\sscicons.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\pipanel.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jre1.8.0_66\bin\policytool.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\Office16\msoasb.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\grv_icons.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jre1.8.0_66\bin\kinit.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Windows Photo Viewer\ImagingDevices.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Weather.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pj11icon.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Windows Photo Viewer\ImagingDevices.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.165.21\MicrosoftEdgeUpdateOnDemand.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\msouc.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Mozilla Firefox\minidump-analyzer.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\89.0.4389.114\chrome_installer.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\keytool.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Java\jre1.8.0_66\bin\rmid.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe- fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe File created C:\Windows\assembly\GAC_MSIL\dfsvc\2.0.0.0__b03f5f7f11d50a3a\dfsvc.exe_ fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2728ad8693e804caf0ad2c227b14216000000000200000000001066000000010000200000004a640dc6550c7656dbc3508785fb586223b649da0477155e54c25cf711e56297000000000e80000000020000200000008c3e008e2e4e1e56ebed2909ff5560109787ee6510d58aa5a9ac2d91610c85c22000000083947c3d8763cf5e34f3e4e6842f67dc2470de40947e4e18daed2f4f4f4d8e3740000000288496a126d111dca2c3ae12111cf1a5c577518039b9d61da5021f391f9a157ac848f4b441ff83e451bf6b73864e0f8c0805fcc66bee667e8efc61ff1bd93859 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3192386333" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3192386333" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30995056" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2728ad8693e804caf0ad2c227b14216000000000200000000001066000000010000200000008c6fd67eee2ded8d8c6cfb64ac0cce3488ffe0eb7c42de56c861ac020e9bd550000000000e800000000200002000000066a68f397987d943ca967ac15d0f8518042ece7b3291aaeec24393389797ceda2000000071cc1b5c63d8bf0ce49eda936b854d2411e04bf8ddbb4703fa379a7f49cd615940000000cedf1a29824e40978d11c7c729b7f621b0d39338fc2dcea0f58d001e42fe34bc1b1fec2b9e4e452f5c443770f2a1b22aedb0bcc558db479228b934e39effc5db IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103fd1bf70f2d801 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373963733" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30995056" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e2a1cc70f2d801 IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{DC79EDED-5E63-11ED-B696-D2D0017C8629} = "0" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4112 IEXPLORE.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4112 IEXPLORE.exe 4112 IEXPLORE.exe 4860 IEXPLORE.EXE 4860 IEXPLORE.EXE 4860 IEXPLORE.EXE 4860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1096 wrote to memory of 4112 1096 fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe 83 PID 1096 wrote to memory of 4112 1096 fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe 83 PID 4112 wrote to memory of 4860 4112 IEXPLORE.exe 84 PID 4112 wrote to memory of 4860 4112 IEXPLORE.exe 84 PID 4112 wrote to memory of 4860 4112 IEXPLORE.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe"C:\Users\Admin\AppData\Local\Temp\fa69de56cd31f9dde63dc240d1b3d3f7a7888aadf102227e50b30b06d1691460.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE" 212.33.237.86/images/1/report.php2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4112 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4860
-
-