Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 20:48
Behavioral task
behavioral1
Sample
aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe
Resource
win7-20220901-en
General
-
Target
aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe
-
Size
111KB
-
MD5
0528fe938aaf7d057836ef38fc544600
-
SHA1
8b5509a6684ce0f65b8cbb4c644d9d9b01587306
-
SHA256
aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d
-
SHA512
ffdf46731aa4aae9b286bd38b1a45d696049cbd7ed95fa182a4ac24d1322360878f4142f4b130bbcdb6a11c123145e6fa961f9db8116e88ccb1a8f6d55aac630
-
SSDEEP
3072:TROzoTq0+RO7IwnYY1z3kggaPhVDs8F5FGTS:1kdNwB3nDbG
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1332 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe 840 DesktopLayer.exe 1268 DesktopLayerSrv.exe 1716 DesktopLayer.exe -
resource yara_rule behavioral1/files/0x000500000000b2d2-55.dat upx behavioral1/files/0x000500000000b2d2-57.dat upx behavioral1/files/0x000500000000b2d2-59.dat upx behavioral1/files/0x00090000000126c8-60.dat upx behavioral1/files/0x00090000000126c8-64.dat upx behavioral1/memory/1332-63-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1760-62-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x00080000000126f1-66.dat upx behavioral1/memory/840-70-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x00080000000126f1-69.dat upx behavioral1/files/0x00090000000126c8-68.dat upx behavioral1/files/0x00080000000126f1-72.dat upx behavioral1/files/0x00090000000126c8-73.dat upx behavioral1/files/0x00090000000126c8-76.dat upx behavioral1/memory/1268-75-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x00090000000126c8-78.dat upx behavioral1/memory/1716-79-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1760 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe 1760 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe 840 DesktopLayer.exe 1268 DesktopLayerSrv.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxFCA.tmp DesktopLayerSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe DesktopLayerSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\pxE54.tmp aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe File opened for modification C:\Program Files (x86)\Microsoft\pxE73.tmp aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe DesktopLayer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BB2A671-5E51-11ED-9ECC-C253C434FFA8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BF777A1-5E51-11ED-9ECC-C253C434FFA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374558886" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1332 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe 1332 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe 1332 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe 1332 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe 840 DesktopLayer.exe 840 DesktopLayer.exe 840 DesktopLayer.exe 840 DesktopLayer.exe 1716 DesktopLayer.exe 1716 DesktopLayer.exe 1716 DesktopLayer.exe 1716 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 856 iexplore.exe 380 iexplore.exe 1064 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1064 iexplore.exe 1064 iexplore.exe 380 iexplore.exe 380 iexplore.exe 856 iexplore.exe 856 iexplore.exe 1660 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 1660 IEXPLORE.EXE 772 IEXPLORE.EXE 772 IEXPLORE.EXE 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1332 1760 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe 27 PID 1760 wrote to memory of 1332 1760 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe 27 PID 1760 wrote to memory of 1332 1760 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe 27 PID 1760 wrote to memory of 1332 1760 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe 27 PID 1760 wrote to memory of 840 1760 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe 29 PID 1760 wrote to memory of 840 1760 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe 29 PID 1760 wrote to memory of 840 1760 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe 29 PID 1760 wrote to memory of 840 1760 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe 29 PID 1332 wrote to memory of 1064 1332 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe 28 PID 1332 wrote to memory of 1064 1332 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe 28 PID 1332 wrote to memory of 1064 1332 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe 28 PID 1332 wrote to memory of 1064 1332 aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe 28 PID 840 wrote to memory of 1268 840 DesktopLayer.exe 30 PID 840 wrote to memory of 1268 840 DesktopLayer.exe 30 PID 840 wrote to memory of 1268 840 DesktopLayer.exe 30 PID 840 wrote to memory of 1268 840 DesktopLayer.exe 30 PID 840 wrote to memory of 856 840 DesktopLayer.exe 31 PID 840 wrote to memory of 856 840 DesktopLayer.exe 31 PID 840 wrote to memory of 856 840 DesktopLayer.exe 31 PID 840 wrote to memory of 856 840 DesktopLayer.exe 31 PID 1268 wrote to memory of 1716 1268 DesktopLayerSrv.exe 32 PID 1268 wrote to memory of 1716 1268 DesktopLayerSrv.exe 32 PID 1268 wrote to memory of 1716 1268 DesktopLayerSrv.exe 32 PID 1268 wrote to memory of 1716 1268 DesktopLayerSrv.exe 32 PID 1716 wrote to memory of 380 1716 DesktopLayer.exe 33 PID 1716 wrote to memory of 380 1716 DesktopLayer.exe 33 PID 1716 wrote to memory of 380 1716 DesktopLayer.exe 33 PID 1716 wrote to memory of 380 1716 DesktopLayer.exe 33 PID 856 wrote to memory of 2024 856 iexplore.exe 35 PID 856 wrote to memory of 2024 856 iexplore.exe 35 PID 856 wrote to memory of 2024 856 iexplore.exe 35 PID 856 wrote to memory of 2024 856 iexplore.exe 35 PID 380 wrote to memory of 772 380 iexplore.exe 36 PID 380 wrote to memory of 772 380 iexplore.exe 36 PID 380 wrote to memory of 772 380 iexplore.exe 36 PID 380 wrote to memory of 772 380 iexplore.exe 36 PID 1064 wrote to memory of 1660 1064 iexplore.exe 37 PID 1064 wrote to memory of 1660 1064 iexplore.exe 37 PID 1064 wrote to memory of 1660 1064 iexplore.exe 37 PID 1064 wrote to memory of 1660 1064 iexplore.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe"C:\Users\Admin\AppData\Local\Temp\aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exeC:\Users\Admin\AppData\Local\Temp\aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1064 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1660
-
-
-
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe"C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:380 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:772
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD50528fe938aaf7d057836ef38fc544600
SHA18b5509a6684ce0f65b8cbb4c644d9d9b01587306
SHA256aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d
SHA512ffdf46731aa4aae9b286bd38b1a45d696049cbd7ed95fa182a4ac24d1322360878f4142f4b130bbcdb6a11c123145e6fa961f9db8116e88ccb1a8f6d55aac630
-
Filesize
111KB
MD50528fe938aaf7d057836ef38fc544600
SHA18b5509a6684ce0f65b8cbb4c644d9d9b01587306
SHA256aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d
SHA512ffdf46731aa4aae9b286bd38b1a45d696049cbd7ed95fa182a4ac24d1322360878f4142f4b130bbcdb6a11c123145e6fa961f9db8116e88ccb1a8f6d55aac630
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5BC4F5F1-5E51-11ED-9ECC-C253C434FFA8}.dat
Filesize3KB
MD56278ee11f0777f5f01cb0f9d631ab055
SHA186280c2411579f1f691c03997ddbe6675a80608b
SHA256e3612f852e4a6be64b01ef42f392f79f583bed2cdcd0f97d3ac5c819a32c3701
SHA512d604d1ac9fd209dd0b8d62dce1449033b73230a715f1401a7eec23c54dc6e5a01cf23993045b3fe5075ee1d0e3e70611b26c988507600d523e76a29d89f6b696
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5BF777A1-5E51-11ED-9ECC-C253C434FFA8}.dat
Filesize3KB
MD57f6e8747af10920881aa9e65fb43e085
SHA11a0b20d5aafe395abe5c62f2d8565175fa8e190f
SHA256ac073de116108735c5c58c69edab97bd45d236d84f5398061402e16b5c632dc8
SHA51265bb17998ca369a857cc75624ab0f3ef13b323bc47a46325314bb2ed48b8881d1fa7eedfc10a5e05dad9d04e8b7441041ab8a06548098e21c6cb14697ba3ddf7
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5BF777A1-5E51-11ED-9ECC-C253C434FFA8}.dat
Filesize5KB
MD5db64e082b73fb8263cd94ef58a8a6bd9
SHA1d76d1167536f5af6531483c0bc306ceed1445b46
SHA256e71f3c6fe983aac0e07394709d9414b32b9d62db6e03eb12d0a218ab8b49d9c1
SHA512ac56097a6edace46ee1af528cfb4316a21ed1ac5a040b6f51954395d8c80bdbdd836173c3592d27efecab2bd893953e16aa7f6787304804968755969cdb182a6
-
C:\Users\Admin\AppData\Local\Temp\aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\Local\Temp\aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
608B
MD5fc885c2e348babab9d88bdf0a0e5f304
SHA1f361dc8b65481543f1748cc4e3893c314339bed8
SHA256de9d35c8f5d3dbaaee4171048b2d0ef45322a8e830d374d742e9bc27044ad98c
SHA512f1404e8b4d1d2291252ecaff71c4af7cf486108825d1197412ddc8caa10f9823026e5a9ea4ff2027a762a0246bdd72212c5776391ce5aa17eeb83d5a4db82892
-
Filesize
111KB
MD50528fe938aaf7d057836ef38fc544600
SHA18b5509a6684ce0f65b8cbb4c644d9d9b01587306
SHA256aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740d
SHA512ffdf46731aa4aae9b286bd38b1a45d696049cbd7ed95fa182a4ac24d1322360878f4142f4b130bbcdb6a11c123145e6fa961f9db8116e88ccb1a8f6d55aac630
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
\Users\Admin\AppData\Local\Temp\aa42b46d10c0f7817bde4ae103d536f9c25244b460313716d9fb05d713e4740dSrv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a