Analysis
-
max time kernel
119s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe
Resource
win10v2004-20220901-en
General
-
Target
074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe
-
Size
189KB
-
MD5
095cfd62db425507b5b96107ebff1a96
-
SHA1
5d7b06c7d2cbe907ea154d83c1ed9632cc00ddcf
-
SHA256
074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4
-
SHA512
0c83461dcfdc908817ca091f88d0d17941d0946a3c4cc0a3ac8242f565dff870e852cca10a5cd7ed732a3a4e0bf1484d18ea7c85c8c68ccc50aa19d6a138ef5c
-
SSDEEP
3072:AXTcOlfRYPii+2Qa7aJT7ObPydcdsndjFC3mtn8b0W2huJsTsrvi88:fOlJEVQD7+byV045Phk5vs
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1984 msjxade.exe 1604 msjxade.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\mchInjDrv\ImagePath = "\\??\\C:\\Windows\\TEMP\\mc25CB1.tmp" msjxade.exe -
Deletes itself 1 IoCs
pid Process 960 cmd.exe -
Loads dropped DLL 7 IoCs
pid Process 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 1984 msjxade.exe 1984 msjxade.exe 1984 msjxade.exe 1604 msjxade.exe 984 IEXPLORE.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\Suggested Sites~.feed-ms iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\favicon[1].ico iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\KZ7YRTC6.txt iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\FeedsStore.feedsdb-ms iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442 iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\RHOK2MQ8.txt iexplore.exe File opened for modification C:\Windows\SysWOW64\mshjuade.dll 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ieonline.microsoft[1] iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\H785C8IE.txt iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\ZGL572KE.txt iexplore.exe File opened for modification C:\Windows\SysWOW64\msodigy.dll 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\DNTException\Low iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~ iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\H785C8IE.txt iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\favicon[2].ico iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\7NNU8QIX.txt iexplore.exe File opened for modification C:\Windows\SysWOW64\msjxade.exe 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk ie4uinit.exe File created C:\Windows\system32\config\systemprofile\Favorites\Links\Suggested Sites.url iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{1A3582B0-5F34-11ED-90F1-D6AAFEFD221A}.dat iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\KZ7YRTC6.txt iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\RHOK2MQ8.txt iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\Favorites iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\Low iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\0Z1GOAKD.txt iexplore.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini ie4uinit.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{117F1A51-5F34-11ED-90F1-D6AAFEFD221A}.dat iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\3E16VUOZ.txt iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\Y1CUDGUV.txt iexplore.exe File created C:\Windows\SysWOW64\mshjuade.dll 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe File created C:\Windows\SysWOW64\msodigy.dll 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe File created C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\JD45QEPL.txt iexplore.exe File created C:\Windows\system32\config\systemprofile\Favorites\Links\Suggested Sites.url:favicon iexplore.exe File created C:\Windows\System32\config\systemprofile\Favorites\Links\Suggested Sites.url\:favicon:$DATA iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{117F1A51-5F34-11ED-90F1-D6AAFEFD221A}.dat iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~ iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\Suggested Sites~.feed-ms iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\ZGL572KE.txt iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\UserData\Low iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\TabRoaming iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-2845162440\msapplication.xml iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442 iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\suggestions[1].en-US iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\IECompatCache\Low iexplore.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-2845162440\msapplication.xml iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\en-US.1 iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{117F1A53-5F34-11ED-90F1-D6AAFEFD221A}.dat iexplore.exe File opened for modification C:\Windows\System32\config\systemprofile\Favorites\Links\desktop.ini iexplore.exe File opened for modification C:\Windows\System32\config\systemprofile\Favorites\Links iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\Favorites\Links\Suggested Sites.url iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\FeedsStore.feedsdb-ms iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\3E16VUOZ.txt iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\favicon[2].ico iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\imagestore\jvmalfq\imagestore.dat iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\Favorites\desktop.ini iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\PrivacIE\Low iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\IECompatUACache\Low iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\0Z1GOAKD.txt iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\JD45QEPL.txt iexplore.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates iexplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-732 = "Finds and displays information and Web sites on the Internet." ie4uinit.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Software\Microsoft iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Setup iexplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURLFallback = "http://www.bing.com/favicon.ico" iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{117F1A51-5F34-11ED-90F1-D6AAFEFD221A} = "0" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore\Count = "1" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore\Count = "2" iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore\Time = e6070b0002000800070008000b007400 iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{00021494-0000-0000-C000-000000000046}\Enum IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Setup\UrlHistoryMigrationTime = 10e37fd840f3d801 iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-d4-3e-86-19-d1\WpadDecision = "0" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Settings iexplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\Version = "*" iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\MAO Settings\DiscardLoadTimes = d02cb3d740f3d801 iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{00021493-0000-0000-C000-000000000046}\Enum\Implementing = 1c00000001000000e6070b00020008000700080037008e0202000000e11a542af65b6546a8a3cfa9672e4291644ea2ef78b0d01189e400c04fc9e26e IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs iexplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\SearchScopes\KnownProvidersUpgradeTime = 3001f3db40f3d801 iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Feeds iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore\Time = e6070b0002000800070008000b007400 iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 ie4uinit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Flags = "0" iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore\Flags = "0" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\WpadDecisionReason = "1" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Zones iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021494-0000-0000-C000-000000000046}\Enum\Implementing = 1c00000001000000e6070b0002000800070009003200140000000000 iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore\Type = "3" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore\Blocked = "1" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D02D361-04BA-42BA-9A01-A7C6AD8F6F7B}\e6-d4-3e-86-19-d1 iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count = "1" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-d4-3e-86-19-d1\WpadDecisionReason = "1" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\VerCache = 0086a9a807ccca010086a9a807ccca01000000009093660000000e00e803991200000e000000991209040000 iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\User Preferences\88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977 = 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 iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Software\Microsoft\Internet Explorer iexplore.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1604 msjxade.exe 1604 msjxade.exe 1604 msjxade.exe 1604 msjxade.exe 1604 msjxade.exe 1604 msjxade.exe 1604 msjxade.exe 1604 msjxade.exe 1604 msjxade.exe 1604 msjxade.exe 1604 msjxade.exe 1604 msjxade.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1604 msjxade.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1984 msjxade.exe Token: SeSecurityPrivilege 1984 msjxade.exe Token: SeTakeOwnershipPrivilege 1984 msjxade.exe Token: SeLoadDriverPrivilege 1984 msjxade.exe Token: SeSystemProfilePrivilege 1984 msjxade.exe Token: SeSystemtimePrivilege 1984 msjxade.exe Token: SeProfSingleProcessPrivilege 1984 msjxade.exe Token: SeIncBasePriorityPrivilege 1984 msjxade.exe Token: SeCreatePagefilePrivilege 1984 msjxade.exe Token: SeShutdownPrivilege 1984 msjxade.exe Token: SeDebugPrivilege 1984 msjxade.exe Token: SeSystemEnvironmentPrivilege 1984 msjxade.exe Token: SeRemoteShutdownPrivilege 1984 msjxade.exe Token: SeUndockPrivilege 1984 msjxade.exe Token: SeManageVolumePrivilege 1984 msjxade.exe Token: 33 1984 msjxade.exe Token: 34 1984 msjxade.exe Token: 35 1984 msjxade.exe Token: SeAssignPrimaryTokenPrivilege 1604 msjxade.exe Token: SeIncreaseQuotaPrivilege 1604 msjxade.exe Token: SeSecurityPrivilege 1604 msjxade.exe Token: SeTakeOwnershipPrivilege 1604 msjxade.exe Token: SeLoadDriverPrivilege 1604 msjxade.exe Token: SeSystemtimePrivilege 1604 msjxade.exe Token: SeShutdownPrivilege 1604 msjxade.exe Token: SeSystemEnvironmentPrivilege 1604 msjxade.exe Token: SeUndockPrivilege 1604 msjxade.exe Token: SeManageVolumePrivilege 1604 msjxade.exe Token: SeAssignPrimaryTokenPrivilege 1604 msjxade.exe Token: SeIncreaseQuotaPrivilege 1604 msjxade.exe Token: SeSecurityPrivilege 1604 msjxade.exe Token: SeTakeOwnershipPrivilege 1604 msjxade.exe Token: SeLoadDriverPrivilege 1604 msjxade.exe Token: SeSystemtimePrivilege 1604 msjxade.exe Token: SeShutdownPrivilege 1604 msjxade.exe Token: SeSystemEnvironmentPrivilege 1604 msjxade.exe Token: SeUndockPrivilege 1604 msjxade.exe Token: SeManageVolumePrivilege 1604 msjxade.exe Token: SeAssignPrimaryTokenPrivilege 984 IEXPLORE.EXE Token: SeIncreaseQuotaPrivilege 984 IEXPLORE.EXE Token: SeSecurityPrivilege 984 IEXPLORE.EXE Token: SeTakeOwnershipPrivilege 984 IEXPLORE.EXE Token: SeLoadDriverPrivilege 984 IEXPLORE.EXE Token: SeSystemtimePrivilege 984 IEXPLORE.EXE Token: SeShutdownPrivilege 984 IEXPLORE.EXE Token: SeSystemEnvironmentPrivilege 984 IEXPLORE.EXE Token: SeUndockPrivilege 984 IEXPLORE.EXE Token: SeManageVolumePrivilege 984 IEXPLORE.EXE Token: SeDebugPrivilege 1604 msjxade.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 1464 iexplore.exe 1464 iexplore.exe 1464 iexplore.exe 1464 iexplore.exe 1464 iexplore.exe 1464 iexplore.exe 1464 iexplore.exe 1464 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 1464 iexplore.exe 1464 iexplore.exe 984 IEXPLORE.EXE 984 IEXPLORE.EXE 984 IEXPLORE.EXE 984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1984 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 27 PID 2036 wrote to memory of 1984 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 27 PID 2036 wrote to memory of 1984 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 27 PID 2036 wrote to memory of 1984 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 27 PID 2036 wrote to memory of 1984 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 27 PID 2036 wrote to memory of 1984 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 27 PID 2036 wrote to memory of 1984 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 27 PID 1604 wrote to memory of 1464 1604 msjxade.exe 29 PID 1604 wrote to memory of 1464 1604 msjxade.exe 29 PID 1604 wrote to memory of 1464 1604 msjxade.exe 29 PID 1604 wrote to memory of 1464 1604 msjxade.exe 29 PID 1464 wrote to memory of 1412 1464 iexplore.exe 30 PID 1464 wrote to memory of 1412 1464 iexplore.exe 30 PID 1464 wrote to memory of 1412 1464 iexplore.exe 30 PID 2036 wrote to memory of 960 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 31 PID 2036 wrote to memory of 960 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 31 PID 2036 wrote to memory of 960 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 31 PID 2036 wrote to memory of 960 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 31 PID 2036 wrote to memory of 960 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 31 PID 2036 wrote to memory of 960 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 31 PID 2036 wrote to memory of 960 2036 074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe 31 PID 1604 wrote to memory of 260 1604 msjxade.exe 7 PID 1604 wrote to memory of 260 1604 msjxade.exe 7 PID 1604 wrote to memory of 332 1604 msjxade.exe 6 PID 1604 wrote to memory of 332 1604 msjxade.exe 6 PID 1604 wrote to memory of 368 1604 msjxade.exe 5 PID 1604 wrote to memory of 368 1604 msjxade.exe 5 PID 1604 wrote to memory of 376 1604 msjxade.exe 4 PID 1604 wrote to memory of 376 1604 msjxade.exe 4 PID 1464 wrote to memory of 984 1464 iexplore.exe 33 PID 1464 wrote to memory of 984 1464 iexplore.exe 33 PID 1464 wrote to memory of 984 1464 iexplore.exe 33 PID 1464 wrote to memory of 984 1464 iexplore.exe 33 PID 1604 wrote to memory of 376 1604 msjxade.exe 4 PID 1604 wrote to memory of 416 1604 msjxade.exe 3 PID 1604 wrote to memory of 416 1604 msjxade.exe 3 PID 1604 wrote to memory of 416 1604 msjxade.exe 3 PID 1604 wrote to memory of 460 1604 msjxade.exe 2 PID 1604 wrote to memory of 460 1604 msjxade.exe 2 PID 1604 wrote to memory of 476 1604 msjxade.exe 1 PID 1604 wrote to memory of 476 1604 msjxade.exe 1 PID 1604 wrote to memory of 484 1604 msjxade.exe 8 PID 1604 wrote to memory of 484 1604 msjxade.exe 8 PID 1604 wrote to memory of 596 1604 msjxade.exe 25 PID 1604 wrote to memory of 596 1604 msjxade.exe 25 PID 1604 wrote to memory of 672 1604 msjxade.exe 24 PID 1604 wrote to memory of 672 1604 msjxade.exe 24 PID 1604 wrote to memory of 756 1604 msjxade.exe 10 PID 1604 wrote to memory of 756 1604 msjxade.exe 10 PID 1604 wrote to memory of 804 1604 msjxade.exe 9 PID 1604 wrote to memory of 804 1604 msjxade.exe 9 PID 1604 wrote to memory of 852 1604 msjxade.exe 23 PID 1604 wrote to memory of 852 1604 msjxade.exe 23 PID 1604 wrote to memory of 876 1604 msjxade.exe 11 PID 1604 wrote to memory of 876 1604 msjxade.exe 11 PID 1604 wrote to memory of 336 1604 msjxade.exe 22 PID 1604 wrote to memory of 336 1604 msjxade.exe 22 PID 1604 wrote to memory of 480 1604 msjxade.exe 12 PID 1604 wrote to memory of 480 1604 msjxade.exe 12 PID 1604 wrote to memory of 1080 1604 msjxade.exe 21 PID 1604 wrote to memory of 1080 1604 msjxade.exe 21 PID 1604 wrote to memory of 1108 1604 msjxade.exe 13 PID 1604 wrote to memory of 1108 1604 msjxade.exe 13 PID 1604 wrote to memory of 1108 1604 msjxade.exe 13
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:804
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1184
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:876
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵PID:2024
-
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:480
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1108
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1616
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1028
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1080
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:336
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:852
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:672
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:596
-
-
C:\Windows\SysWOW64\msjxade.exeC:\Windows\SysWOW64\msjxade.exe2⤵
- Executes dropped EXE
- Sets service image path in registry
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" about:blank3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\System32\ie4uinit.exe"C:\Windows\System32\ie4uinit.exe" -ShowQLIcon4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1412
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:275457 /prefetch:24⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:984
-
-
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:376
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe"C:\Users\Admin\AppData\Local\Temp\074330862f86bde0cc3f12da1719acfdcdeb0012e1935c7f86564248242ffab4.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\msjxade.exe"C:\Windows\system32\msjxade.exe" /xi3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\dsetup.bat3⤵
- Deletes itself
PID:960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250B
MD5056f7895cdf62a64f66b21e855fff3a1
SHA1e8996d43d99a6be2147c39d8e95e0094e9cf76da
SHA25635b47d97a9b78d8dea86e88ec232e89e8288f4f96cc1de4705f682fe4674235b
SHA512d0309b8854c716b5554309398b4391c4df0813927bfdcbf2f46ef5bc36a5ca6b63cfe8ebf48ba4b44f47bd92cdbb32ea09f6a001b6daf733893ce9d370040b2b
-
Filesize
104KB
MD504c87c5ad223fd2479c61c3887ef134b
SHA16953bdfd045940648d49d4520959fc931112219a
SHA2563c7f7d17be3b2b4b05f4b5ca62740bd31a93d24175ab63bc283c6a39f562f22c
SHA512d0c8305434d8294aa7b019cc5dcbb042c373f4b5319f457c904de3ac87b6343213a6aada03cd4691ae54fd224b578ce69a57257ae851c58208b69827a66ec289
-
Filesize
144KB
MD512c030511a6b2c4fffab75d09b80f17d
SHA1adf8f2bce93f745cd977c8eebb1d3b75f4e0e2ba
SHA256f990e84b10b0c311e4b62b2811dd2c95918fac9d486b2d8c395b84f2013bbd45
SHA512444f679cda5e7cc9b132ef684c802ecede4346d1f67a7f07960fdf0cc489040b587b6f1417eb989f3fa43b9a5c7f90834fcc337b047b3eb4ffa37461a3237d57
-
Filesize
144KB
MD512c030511a6b2c4fffab75d09b80f17d
SHA1adf8f2bce93f745cd977c8eebb1d3b75f4e0e2ba
SHA256f990e84b10b0c311e4b62b2811dd2c95918fac9d486b2d8c395b84f2013bbd45
SHA512444f679cda5e7cc9b132ef684c802ecede4346d1f67a7f07960fdf0cc489040b587b6f1417eb989f3fa43b9a5c7f90834fcc337b047b3eb4ffa37461a3237d57
-
Filesize
144KB
MD512c030511a6b2c4fffab75d09b80f17d
SHA1adf8f2bce93f745cd977c8eebb1d3b75f4e0e2ba
SHA256f990e84b10b0c311e4b62b2811dd2c95918fac9d486b2d8c395b84f2013bbd45
SHA512444f679cda5e7cc9b132ef684c802ecede4346d1f67a7f07960fdf0cc489040b587b6f1417eb989f3fa43b9a5c7f90834fcc337b047b3eb4ffa37461a3237d57
-
Filesize
104KB
MD504c87c5ad223fd2479c61c3887ef134b
SHA16953bdfd045940648d49d4520959fc931112219a
SHA2563c7f7d17be3b2b4b05f4b5ca62740bd31a93d24175ab63bc283c6a39f562f22c
SHA512d0c8305434d8294aa7b019cc5dcbb042c373f4b5319f457c904de3ac87b6343213a6aada03cd4691ae54fd224b578ce69a57257ae851c58208b69827a66ec289
-
Filesize
104KB
MD504c87c5ad223fd2479c61c3887ef134b
SHA16953bdfd045940648d49d4520959fc931112219a
SHA2563c7f7d17be3b2b4b05f4b5ca62740bd31a93d24175ab63bc283c6a39f562f22c
SHA512d0c8305434d8294aa7b019cc5dcbb042c373f4b5319f457c904de3ac87b6343213a6aada03cd4691ae54fd224b578ce69a57257ae851c58208b69827a66ec289
-
Filesize
144KB
MD512c030511a6b2c4fffab75d09b80f17d
SHA1adf8f2bce93f745cd977c8eebb1d3b75f4e0e2ba
SHA256f990e84b10b0c311e4b62b2811dd2c95918fac9d486b2d8c395b84f2013bbd45
SHA512444f679cda5e7cc9b132ef684c802ecede4346d1f67a7f07960fdf0cc489040b587b6f1417eb989f3fa43b9a5c7f90834fcc337b047b3eb4ffa37461a3237d57
-
Filesize
144KB
MD512c030511a6b2c4fffab75d09b80f17d
SHA1adf8f2bce93f745cd977c8eebb1d3b75f4e0e2ba
SHA256f990e84b10b0c311e4b62b2811dd2c95918fac9d486b2d8c395b84f2013bbd45
SHA512444f679cda5e7cc9b132ef684c802ecede4346d1f67a7f07960fdf0cc489040b587b6f1417eb989f3fa43b9a5c7f90834fcc337b047b3eb4ffa37461a3237d57
-
Filesize
144KB
MD512c030511a6b2c4fffab75d09b80f17d
SHA1adf8f2bce93f745cd977c8eebb1d3b75f4e0e2ba
SHA256f990e84b10b0c311e4b62b2811dd2c95918fac9d486b2d8c395b84f2013bbd45
SHA512444f679cda5e7cc9b132ef684c802ecede4346d1f67a7f07960fdf0cc489040b587b6f1417eb989f3fa43b9a5c7f90834fcc337b047b3eb4ffa37461a3237d57
-
Filesize
144KB
MD512c030511a6b2c4fffab75d09b80f17d
SHA1adf8f2bce93f745cd977c8eebb1d3b75f4e0e2ba
SHA256f990e84b10b0c311e4b62b2811dd2c95918fac9d486b2d8c395b84f2013bbd45
SHA512444f679cda5e7cc9b132ef684c802ecede4346d1f67a7f07960fdf0cc489040b587b6f1417eb989f3fa43b9a5c7f90834fcc337b047b3eb4ffa37461a3237d57
-
Filesize
144KB
MD512c030511a6b2c4fffab75d09b80f17d
SHA1adf8f2bce93f745cd977c8eebb1d3b75f4e0e2ba
SHA256f990e84b10b0c311e4b62b2811dd2c95918fac9d486b2d8c395b84f2013bbd45
SHA512444f679cda5e7cc9b132ef684c802ecede4346d1f67a7f07960fdf0cc489040b587b6f1417eb989f3fa43b9a5c7f90834fcc337b047b3eb4ffa37461a3237d57