Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe
Resource
win10v2004-20220812-en
General
-
Target
c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe
-
Size
20KB
-
MD5
0eb476444927e26b1558507de48778a0
-
SHA1
6a0a7c7a191ca784da5d9906bd4aa77c9dbd17ae
-
SHA256
c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a
-
SHA512
98f233021ff58fe36f4afca1be92fe34a39123f0b8b6dd7f1f289a41e1af95951d8a8501aed44a010b6d9d859b1ab0d744ae376addfa398500d3b07b6752ee9d
-
SSDEEP
192:1l5E3krTuntKy0peHDfCpHfBv+I4QwXt9V+jqu0G5KDJBdq:1M3PnQoHDCpHf4I4Qwdc0G5KDJS
Malware Config
Signatures
-
Drops file in Drivers directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe -
Executes dropped EXE 4 IoCs
pid Process 812 winlogon.exe 808 AE 0124 BE.exe 1992 winlogon.exe 296 winlogon.exe -
Loads dropped DLL 7 IoCs
pid Process 112 c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe 112 c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe 812 winlogon.exe 812 winlogon.exe 808 AE 0124 BE.exe 808 AE 0124 BE.exe 296 winlogon.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini AE 0124 BE.exe -
Drops autorun.inf file 1 TTPs 26 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\K:\Autorun.inf winlogon.exe File opened for modification \??\L:\Autorun.inf winlogon.exe File opened for modification \??\M:\Autorun.inf winlogon.exe File opened for modification \??\O:\Autorun.inf winlogon.exe File opened for modification D:\Autorun.inf winlogon.exe File opened for modification \??\E:\Autorun.inf winlogon.exe File opened for modification \??\F:\Autorun.inf winlogon.exe File opened for modification \??\H:\Autorun.inf winlogon.exe File opened for modification \??\V:\Autorun.inf winlogon.exe File opened for modification \??\R:\Autorun.inf winlogon.exe File opened for modification \??\T:\Autorun.inf winlogon.exe File opened for modification \??\Z:\Autorun.inf winlogon.exe File opened for modification \??\G:\Autorun.inf winlogon.exe File opened for modification \??\J:\Autorun.inf winlogon.exe File opened for modification \??\N:\Autorun.inf winlogon.exe File opened for modification \??\P:\Autorun.inf winlogon.exe File opened for modification \??\X:\Autorun.inf winlogon.exe File opened for modification \??\B:\Autorun.inf winlogon.exe File opened for modification C:\Autorun.inf winlogon.exe File opened for modification \??\I:\Autorun.inf winlogon.exe File opened for modification \??\W:\Autorun.inf winlogon.exe File opened for modification \??\Y:\Autorun.inf winlogon.exe File opened for modification \??\A:\Autorun.inf winlogon.exe File opened for modification \??\Q:\Autorun.inf winlogon.exe File opened for modification \??\S:\Autorun.inf winlogon.exe File opened for modification \??\U:\Autorun.inf winlogon.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\regedit.exe AE 0124 BE.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\assembly\GAC_MSIL\MCESidebarCtrl\6.1.0.0__31bf3856ad364e35\MCESidebarCtrl.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Tools.v9.0\9.0.0.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.Entity.Design.resources\3.5.0.0_ja_b77a5c561934e089\System.Data.Entity.Design.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Management.Automation.Resources\1.0.0.0_es_31bf3856ad364e35\System.Management.Automation.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.DynamicData.Design.resources\3.5.0.0_ja_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_32\ehexthost32\6.1.0.0__31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.DirectoryServices.Protocols.resources AE 0124 BE.exe File opened for modification C:\Windows\AppPatch\es-ES\AcRes.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Mobile.resources\2.0.0.0_ja_b03f5f7f11d50a3a\System.Web.Mobile.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost.Resources\1.0.0.0_it_31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.SDHost.Resources\1.0.0.0_es_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.resources\2.0.0.0_it_b77a5c561934e089\system.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\AppPatch\pcamain.sdb AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Office.BusinessApplications.RuntimeUi.Intl AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.XmlHelper\6.1.0.0__31bf3856ad364e35\Microsoft.Security.ApplicationId.PolicyManagement.XmlHelper.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.12.0.Microsoft.Office.Interop.Publisher\14.0.0.0__71e9bce111e9429c\Policy.12.0.Microsoft.Office.Interop.Publisher.config AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.6.0.Microsoft.MediaCenter.UI\6.1.0.0__31bf3856ad364e35\Policy.6.0.Microsoft.MediaCenter.UI.config AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\ehiExtens\6.1.0.0__31bf3856ad364e35\ehiExtens.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.ApplicationId.Framework.Resources\6.1.0.0_ja_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\1.0.0.0__31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.GPowerShell.Resources\1.0.0.0_fr_31bf3856ad364e35\Microsoft.PowerShell.Gpowershell.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.Services.resources\3.5.0.0_de_b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_64\Policy.1.2.Microsoft.Interop.Security.AzRoles\6.1.7600.16385__31bf3856ad364e35\Policy.1.2.Microsoft.Interop.Security.AzRoles.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Vbe.Interop.Forms AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Applications.ServerDocument.v9.0\9.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualStudio.Tools.Applications.ServerDocument.v9.0.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0\10.0.0.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Deployment.resources\2.0.0.0_de_b03f5f7f11d50a3a\System.Deployment.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost.Resources\1.0.0.0_en_31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.Wizards.AutomaticRuleGenerationWizard\6.1.0.0__31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.EnterpriseServices.resources\2.0.0.0_de_b03f5f7f11d50a3a\System.EnterpriseServices.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Transactions.resources\2.0.0.0_fr_b77a5c561934e089\System.Transactions.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Abstractions.resources\3.5.0.0_ja_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\bfsvc.exe AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC\Microsoft.mshtml\7.0.3300.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Tools.Word.v9.0\9.0.0.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.Cmdlets.Resources\6.1.0.0_it_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationFramework.resources\3.0.0.0_ja_31bf3856ad364e35\PresentationFramework.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\system.workflow.runtime.resources\3.0.0.0_de_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\debug AE 0124 BE.exe File opened for modification C:\Windows\AppPatch\de-DE\AcRes.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\ReachFramework.resources\3.0.0.0_fr_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Transactions.resources\2.0.0.0_it_b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.DynamicData.Design.resources\3.5.0.0_de_31bf3856ad364e35\System.Web.DynamicData.Design.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Tools.Common.v9.0 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Applications.ServerDocument.v10.0 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.Contract.v9.0\9.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\napinit\6.1.0.0__31bf3856ad364e35\NAPINIT.DLL AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Printing.resources\3.0.0.0_es_31bf3856ad364e35\System.Printing.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Speech.resources\3.0.0.0_fr_31bf3856ad364e35\System.Speech.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\rescache AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\EventViewer\6.1.0.0__31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.ApplicationId.RuleWizard.Resources\6.1.0.0_en_31bf3856ad364e35\Microsoft.ApplicationId.RuleWizard.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Interop.InfoPath.Xml\14.0.0.0__71e9bce111e9429c\Microsoft.Office.Interop.InfoPath.Xml.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.DirectoryServices.AccountManagement.resources\3.5.0.0_it_b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\system AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Applications.Adapter AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.Entity AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualBasic.resources\8.0.0.0_fr_b03f5f7f11d50a3a\Microsoft.VisualBasic.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.Linq.resources\3.5.0.0_fr_b77a5c561934e089\System.Data.Linq.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.resources\2.0.0.0_es_b03f5f7f11d50a3a\System.Web.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_32\Policy.6.0.Microsoft.Ink\6.1.0.0__31bf3856ad364e35\Policy.6.0.Microsoft.Ink.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Accessibility\2.0.0.0__b03f5f7f11d50a3a\Accessibility.dll AE 0124 BE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c00000000020000000000106600000001000020000000d4ab24c76582a502093bcef9cfaf389e539d405a091a6f9bb49f612503d237b1000000000e80000000020000200000008e2b8729a0f3e6d5f2e790cf0ebd277968031ffeb0e17e9ae5e1b193ccd10590200000005c9b66cda7a25dd0e15a34f748ead4760b12a557195dae1be41fd0db2d513956400000005e382adc96a791b52da4f709d5126bc7fbf999ffa63db3e38f3b8ae7128aa4c1f1ec6b3bc527d44df670b289aa79e79faa4c33bed39695241978211c845a8ff1 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70866d58a8f2d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c000000000200000000001066000000010000200000004b718558d4773426289afd4d552ff8e73be2301e3aaa6ce5f812362964bc68c0000000000e800000000200002000000047eaab1502f47ca4daa97b084b9438509917ce427c870e1babf2226093d373a990000000f532395a3196a1c6f9be149cfc371b8f4a38447beba1e2ad351068806c60064405294caf158f2ff6420ab0aa4eab03350fb6554f96ace99d8e53b2d4c318f3f9fbaca29c5eb3c3213256ecabde00851fcc006d9b5112414199dd379f884985086a23cafa2be050215f1fd83de2e2dade32d7e1cd3cce52c17353f9309fac809fd8736f1b2b6fb08cb32cbb60320c94074000000040ee011f12ffcf50fdc9983744e74be10df6c4b7688f1589c02571ba06541d479d85d57f943deb314c64375f91794e4d73a789dbe887200e39bde1c4d7103bef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374590725" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71006AE1-5E9B-11ED-AA2C-DE5CC620A9B4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1080 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 112 c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe 1080 iexplore.exe 1080 iexplore.exe 812 winlogon.exe 808 AE 0124 BE.exe 1340 IEXPLORE.EXE 296 winlogon.exe 1340 IEXPLORE.EXE 1340 IEXPLORE.EXE 1340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 112 wrote to memory of 1080 112 c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe 27 PID 112 wrote to memory of 1080 112 c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe 27 PID 112 wrote to memory of 1080 112 c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe 27 PID 112 wrote to memory of 1080 112 c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe 27 PID 1080 wrote to memory of 1340 1080 iexplore.exe 29 PID 1080 wrote to memory of 1340 1080 iexplore.exe 29 PID 1080 wrote to memory of 1340 1080 iexplore.exe 29 PID 1080 wrote to memory of 1340 1080 iexplore.exe 29 PID 112 wrote to memory of 812 112 c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe 30 PID 112 wrote to memory of 812 112 c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe 30 PID 112 wrote to memory of 812 112 c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe 30 PID 112 wrote to memory of 812 112 c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe 30 PID 812 wrote to memory of 808 812 winlogon.exe 31 PID 812 wrote to memory of 808 812 winlogon.exe 31 PID 812 wrote to memory of 808 812 winlogon.exe 31 PID 812 wrote to memory of 808 812 winlogon.exe 31 PID 812 wrote to memory of 1992 812 winlogon.exe 32 PID 812 wrote to memory of 1992 812 winlogon.exe 32 PID 812 wrote to memory of 1992 812 winlogon.exe 32 PID 812 wrote to memory of 1992 812 winlogon.exe 32 PID 808 wrote to memory of 296 808 AE 0124 BE.exe 33 PID 808 wrote to memory of 296 808 AE 0124 BE.exe 33 PID 808 wrote to memory of 296 808 AE 0124 BE.exe 33 PID 808 wrote to memory of 296 808 AE 0124 BE.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe"C:\Users\Admin\AppData\Local\Temp\c02203437779a081a84da1dff52e2b0a2c4b161d37172afd9b97dc2bfcedbc3a.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Windows\AE 0124 BE.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1080 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1340
-
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops autorun.inf file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\AE 0124 BE.exe"C:\Windows\AE 0124 BE.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:296
-
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"3⤵
- Executes dropped EXE
PID:1992
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
537B
MD52db37025df31f51c79db86d10721abe9
SHA10a622fe2b814b48cc11a648c964f481070a6ff78
SHA256b89d0f49788c2f17d6d1062fe0941e4609085afed738f3fca1e1480406640e3a
SHA5121c2005d6126bdb6463f155204a2d45f2ad69a48cd895aa465ef1ac0156082d2cb92db97a74e3206c88e1f5b718a97dc3f619d589c26d041a61d4ac85da53e68c
-
Filesize
40KB
MD528b3eeccb3c572d1e0856d434aa7793a
SHA197fdf7c9c0e4805ab336560d7e3798bfedde52e9
SHA256437e03071877a41d22136d0c0ec67a690ec4fa83a2cb3fc36a0b98ba32ac1078
SHA5129d2d6ccedd319db012b1d0a680ce59b31de413048b966fa66f2206039d41fd6a42f69f052aa23fcc29157d4954cb533c638b92be4dff7cd2e8224b706efaccc4
-
Filesize
40KB
MD528b3eeccb3c572d1e0856d434aa7793a
SHA197fdf7c9c0e4805ab336560d7e3798bfedde52e9
SHA256437e03071877a41d22136d0c0ec67a690ec4fa83a2cb3fc36a0b98ba32ac1078
SHA5129d2d6ccedd319db012b1d0a680ce59b31de413048b966fa66f2206039d41fd6a42f69f052aa23fcc29157d4954cb533c638b92be4dff7cd2e8224b706efaccc4
-
Filesize
40KB
MD59bbef43f4ee9cfe9ee8946967b4e42c1
SHA1b71a02b9f4d7cae4e0cd521e9645f43c84e5b734
SHA25639023d0f0d5f7dd7da48f3be6aa58f2935c4e0a674779f6f617a78574cfac4e3
SHA512754e1f18e638a9496737ae69b7fd0328e58451b56fb9ddd0f7dd494c8503b1e252846d3643d2e86195171b4443e02d07c2dbadeca75b89355081f592d7fe5180
-
Filesize
40KB
MD59bbef43f4ee9cfe9ee8946967b4e42c1
SHA1b71a02b9f4d7cae4e0cd521e9645f43c84e5b734
SHA25639023d0f0d5f7dd7da48f3be6aa58f2935c4e0a674779f6f617a78574cfac4e3
SHA512754e1f18e638a9496737ae69b7fd0328e58451b56fb9ddd0f7dd494c8503b1e252846d3643d2e86195171b4443e02d07c2dbadeca75b89355081f592d7fe5180
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
40KB
MD528b3eeccb3c572d1e0856d434aa7793a
SHA197fdf7c9c0e4805ab336560d7e3798bfedde52e9
SHA256437e03071877a41d22136d0c0ec67a690ec4fa83a2cb3fc36a0b98ba32ac1078
SHA5129d2d6ccedd319db012b1d0a680ce59b31de413048b966fa66f2206039d41fd6a42f69f052aa23fcc29157d4954cb533c638b92be4dff7cd2e8224b706efaccc4
-
Filesize
40KB
MD528b3eeccb3c572d1e0856d434aa7793a
SHA197fdf7c9c0e4805ab336560d7e3798bfedde52e9
SHA256437e03071877a41d22136d0c0ec67a690ec4fa83a2cb3fc36a0b98ba32ac1078
SHA5129d2d6ccedd319db012b1d0a680ce59b31de413048b966fa66f2206039d41fd6a42f69f052aa23fcc29157d4954cb533c638b92be4dff7cd2e8224b706efaccc4
-
Filesize
40KB
MD528b3eeccb3c572d1e0856d434aa7793a
SHA197fdf7c9c0e4805ab336560d7e3798bfedde52e9
SHA256437e03071877a41d22136d0c0ec67a690ec4fa83a2cb3fc36a0b98ba32ac1078
SHA5129d2d6ccedd319db012b1d0a680ce59b31de413048b966fa66f2206039d41fd6a42f69f052aa23fcc29157d4954cb533c638b92be4dff7cd2e8224b706efaccc4
-
Filesize
40KB
MD528b3eeccb3c572d1e0856d434aa7793a
SHA197fdf7c9c0e4805ab336560d7e3798bfedde52e9
SHA256437e03071877a41d22136d0c0ec67a690ec4fa83a2cb3fc36a0b98ba32ac1078
SHA5129d2d6ccedd319db012b1d0a680ce59b31de413048b966fa66f2206039d41fd6a42f69f052aa23fcc29157d4954cb533c638b92be4dff7cd2e8224b706efaccc4
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
40KB
MD528b3eeccb3c572d1e0856d434aa7793a
SHA197fdf7c9c0e4805ab336560d7e3798bfedde52e9
SHA256437e03071877a41d22136d0c0ec67a690ec4fa83a2cb3fc36a0b98ba32ac1078
SHA5129d2d6ccedd319db012b1d0a680ce59b31de413048b966fa66f2206039d41fd6a42f69f052aa23fcc29157d4954cb533c638b92be4dff7cd2e8224b706efaccc4
-
Filesize
40KB
MD528b3eeccb3c572d1e0856d434aa7793a
SHA197fdf7c9c0e4805ab336560d7e3798bfedde52e9
SHA256437e03071877a41d22136d0c0ec67a690ec4fa83a2cb3fc36a0b98ba32ac1078
SHA5129d2d6ccedd319db012b1d0a680ce59b31de413048b966fa66f2206039d41fd6a42f69f052aa23fcc29157d4954cb533c638b92be4dff7cd2e8224b706efaccc4
-
Filesize
40KB
MD528b3eeccb3c572d1e0856d434aa7793a
SHA197fdf7c9c0e4805ab336560d7e3798bfedde52e9
SHA256437e03071877a41d22136d0c0ec67a690ec4fa83a2cb3fc36a0b98ba32ac1078
SHA5129d2d6ccedd319db012b1d0a680ce59b31de413048b966fa66f2206039d41fd6a42f69f052aa23fcc29157d4954cb533c638b92be4dff7cd2e8224b706efaccc4
-
Filesize
40KB
MD528b3eeccb3c572d1e0856d434aa7793a
SHA197fdf7c9c0e4805ab336560d7e3798bfedde52e9
SHA256437e03071877a41d22136d0c0ec67a690ec4fa83a2cb3fc36a0b98ba32ac1078
SHA5129d2d6ccedd319db012b1d0a680ce59b31de413048b966fa66f2206039d41fd6a42f69f052aa23fcc29157d4954cb533c638b92be4dff7cd2e8224b706efaccc4
-
Filesize
40KB
MD528b3eeccb3c572d1e0856d434aa7793a
SHA197fdf7c9c0e4805ab336560d7e3798bfedde52e9
SHA256437e03071877a41d22136d0c0ec67a690ec4fa83a2cb3fc36a0b98ba32ac1078
SHA5129d2d6ccedd319db012b1d0a680ce59b31de413048b966fa66f2206039d41fd6a42f69f052aa23fcc29157d4954cb533c638b92be4dff7cd2e8224b706efaccc4
-
Filesize
40KB
MD528b3eeccb3c572d1e0856d434aa7793a
SHA197fdf7c9c0e4805ab336560d7e3798bfedde52e9
SHA256437e03071877a41d22136d0c0ec67a690ec4fa83a2cb3fc36a0b98ba32ac1078
SHA5129d2d6ccedd319db012b1d0a680ce59b31de413048b966fa66f2206039d41fd6a42f69f052aa23fcc29157d4954cb533c638b92be4dff7cd2e8224b706efaccc4