Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
9ffc67b3f0b49e35357ee68dc59d074e38035c4d34476170c4610c131d4a7e22.dll
Resource
win7-20220901-en
General
-
Target
9ffc67b3f0b49e35357ee68dc59d074e38035c4d34476170c4610c131d4a7e22.dll
-
Size
231KB
-
MD5
00d354ce7ce7e61c0288f0970f5bf2d0
-
SHA1
fc05475d7f0e20dbefbdf3c7637004fb66b9e63d
-
SHA256
9ffc67b3f0b49e35357ee68dc59d074e38035c4d34476170c4610c131d4a7e22
-
SHA512
7be7233bb2660bfb22460eef2ec72c59cafff6a326c6d0122fc6b2ff8b751f69d5f5b068e4dcd6d23f67d2e30ff00c078353e022e0afa38b01fcdda3ba6209d8
-
SSDEEP
3072:+sGwxP7Ghb+GgJ2r1fHZF8+T7+B84TZpxGAtl5a6YsbGHWSlE5t6ZoiLCmGK9cO:pBQ+aVXMB84TZhtusbA3OEIK9
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 1264 rundll32Srv.exe 4108 rundll32SrvSrv.exe 780 DesktopLayer.exe 3368 rundll32SrvSrvSrv.exe 4908 DesktopLayerSrv.exe 1452 DesktopLayerSrvSrv.exe -
resource yara_rule behavioral2/files/0x0003000000022661-135.dat upx behavioral2/files/0x0008000000023192-137.dat upx behavioral2/files/0x0003000000022661-138.dat upx behavioral2/files/0x0008000000023192-141.dat upx behavioral2/files/0x0007000000023194-145.dat upx behavioral2/memory/1264-144-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/files/0x0007000000023194-143.dat upx behavioral2/memory/4108-148-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/files/0x0009000000023193-147.dat upx behavioral2/files/0x0009000000023193-142.dat upx behavioral2/files/0x0008000000023199-155.dat upx behavioral2/memory/3368-156-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1452-157-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/files/0x0008000000023199-153.dat upx behavioral2/memory/4908-154-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/780-152-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/files/0x0008000000023197-151.dat upx behavioral2/files/0x0008000000023197-149.dat upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe File created C:\Windows\SysWOW64\rundll32SrvSrv.exe rundll32Srv.exe File created C:\Windows\SysWOW64\rundll32SrvSrvSrv.exe rundll32SrvSrv.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayerSrvSrv.exe DesktopLayerSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\px9F13.tmp DesktopLayerSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32SrvSrvSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe DesktopLayerSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\px9DAC.tmp rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\px9DEA.tmp rundll32SrvSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32SrvSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe DesktopLayer.exe File opened for modification C:\Program Files (x86)\Microsoft\px9E39.tmp rundll32SrvSrvSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\px9F42.tmp DesktopLayerSrvSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe DesktopLayerSrvSrv.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30997917" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30997917" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375795560" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30997917" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BAD0B566-6990-11ED-919F-4EF50EB22100} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30997917" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30997917" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BAB1B883-6990-11ED-919F-4EF50EB22100} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2405616380" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30997917" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2417492311" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2407962143" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30997917" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 4108 rundll32SrvSrv.exe 4108 rundll32SrvSrv.exe 4108 rundll32SrvSrv.exe 4108 rundll32SrvSrv.exe 4108 rundll32SrvSrv.exe 4108 rundll32SrvSrv.exe 4108 rundll32SrvSrv.exe 4108 rundll32SrvSrv.exe 3368 rundll32SrvSrvSrv.exe 3368 rundll32SrvSrvSrv.exe 780 DesktopLayer.exe 780 DesktopLayer.exe 780 DesktopLayer.exe 780 DesktopLayer.exe 780 DesktopLayer.exe 780 DesktopLayer.exe 780 DesktopLayer.exe 780 DesktopLayer.exe 3368 rundll32SrvSrvSrv.exe 3368 rundll32SrvSrvSrv.exe 3368 rundll32SrvSrvSrv.exe 3368 rundll32SrvSrvSrv.exe 3368 rundll32SrvSrvSrv.exe 3368 rundll32SrvSrvSrv.exe 4908 DesktopLayerSrv.exe 4908 DesktopLayerSrv.exe 4908 DesktopLayerSrv.exe 4908 DesktopLayerSrv.exe 4908 DesktopLayerSrv.exe 4908 DesktopLayerSrv.exe 4908 DesktopLayerSrv.exe 4908 DesktopLayerSrv.exe 1452 DesktopLayerSrvSrv.exe 1452 DesktopLayerSrvSrv.exe 1452 DesktopLayerSrvSrv.exe 1452 DesktopLayerSrvSrv.exe 1452 DesktopLayerSrvSrv.exe 1452 DesktopLayerSrvSrv.exe 1452 DesktopLayerSrvSrv.exe 1452 DesktopLayerSrvSrv.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1496 iexplore.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1496 iexplore.exe 1560 iexplore.exe 992 iexplore.exe 3476 iexplore.exe 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 992 iexplore.exe 992 iexplore.exe 3476 iexplore.exe 3476 iexplore.exe 2988 iexplore.exe 2988 iexplore.exe 1560 iexplore.exe 1560 iexplore.exe 1496 iexplore.exe 1496 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 3832 IEXPLORE.EXE 3832 IEXPLORE.EXE 3912 IEXPLORE.EXE 3912 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4848 4904 rundll32.exe 81 PID 4904 wrote to memory of 4848 4904 rundll32.exe 81 PID 4904 wrote to memory of 4848 4904 rundll32.exe 81 PID 4848 wrote to memory of 1264 4848 rundll32.exe 83 PID 4848 wrote to memory of 1264 4848 rundll32.exe 83 PID 4848 wrote to memory of 1264 4848 rundll32.exe 83 PID 1264 wrote to memory of 4108 1264 rundll32Srv.exe 84 PID 1264 wrote to memory of 4108 1264 rundll32Srv.exe 84 PID 1264 wrote to memory of 4108 1264 rundll32Srv.exe 84 PID 1264 wrote to memory of 780 1264 rundll32Srv.exe 86 PID 1264 wrote to memory of 780 1264 rundll32Srv.exe 86 PID 1264 wrote to memory of 780 1264 rundll32Srv.exe 86 PID 4108 wrote to memory of 3368 4108 rundll32SrvSrv.exe 85 PID 4108 wrote to memory of 3368 4108 rundll32SrvSrv.exe 85 PID 4108 wrote to memory of 3368 4108 rundll32SrvSrv.exe 85 PID 4108 wrote to memory of 1496 4108 rundll32SrvSrv.exe 88 PID 4108 wrote to memory of 1496 4108 rundll32SrvSrv.exe 88 PID 780 wrote to memory of 4908 780 DesktopLayer.exe 87 PID 780 wrote to memory of 4908 780 DesktopLayer.exe 87 PID 780 wrote to memory of 4908 780 DesktopLayer.exe 87 PID 780 wrote to memory of 1560 780 DesktopLayer.exe 89 PID 780 wrote to memory of 1560 780 DesktopLayer.exe 89 PID 4908 wrote to memory of 1452 4908 DesktopLayerSrv.exe 91 PID 4908 wrote to memory of 1452 4908 DesktopLayerSrv.exe 91 PID 4908 wrote to memory of 1452 4908 DesktopLayerSrv.exe 91 PID 3368 wrote to memory of 992 3368 rundll32SrvSrvSrv.exe 90 PID 3368 wrote to memory of 992 3368 rundll32SrvSrvSrv.exe 90 PID 4908 wrote to memory of 2988 4908 DesktopLayerSrv.exe 93 PID 4908 wrote to memory of 2988 4908 DesktopLayerSrv.exe 93 PID 1452 wrote to memory of 3476 1452 DesktopLayerSrvSrv.exe 92 PID 1452 wrote to memory of 3476 1452 DesktopLayerSrvSrv.exe 92 PID 992 wrote to memory of 3832 992 iexplore.exe 97 PID 992 wrote to memory of 3832 992 iexplore.exe 97 PID 992 wrote to memory of 3832 992 iexplore.exe 97 PID 3476 wrote to memory of 3912 3476 iexplore.exe 96 PID 3476 wrote to memory of 3912 3476 iexplore.exe 96 PID 3476 wrote to memory of 3912 3476 iexplore.exe 96 PID 2988 wrote to memory of 2556 2988 iexplore.exe 94 PID 2988 wrote to memory of 2556 2988 iexplore.exe 94 PID 2988 wrote to memory of 2556 2988 iexplore.exe 94 PID 1560 wrote to memory of 1384 1560 iexplore.exe 95 PID 1560 wrote to memory of 1384 1560 iexplore.exe 95 PID 1560 wrote to memory of 1384 1560 iexplore.exe 95 PID 1496 wrote to memory of 2628 1496 iexplore.exe 98 PID 1496 wrote to memory of 2628 1496 iexplore.exe 98 PID 1496 wrote to memory of 2628 1496 iexplore.exe 98
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ffc67b3f0b49e35357ee68dc59d074e38035c4d34476170c4610c131d4a7e22.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ffc67b3f0b49e35357ee68dc59d074e38035c4d34476170c4610c131d4a7e22.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\rundll32SrvSrv.exeC:\Windows\SysWOW64\rundll32SrvSrv.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\rundll32SrvSrvSrv.exeC:\Windows\SysWOW64\rundll32SrvSrvSrv.exe5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:992 CREDAT:17410 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3832
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1496 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
-
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe"C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Program Files (x86)\Microsoft\DesktopLayerSrvSrv.exe"C:\Program Files (x86)\Microsoft\DesktopLayerSrvSrv.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3476 CREDAT:17410 /prefetch:28⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3912
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:17410 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1384
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c64813adfc336147b0e6230f949236bd
SHA1cd3b7088c1e071ea93952673a4c59edbfbd619cd
SHA25638f3ffec87edfe3ff6da75cc8604651b8170581d780ee5b258bc591fe72e6c6f
SHA5128a2cf2459f810c33caf1ad4adcc241ed4b63c865703e4ff36b198f7f994a28be8abb9fbddde939931f0daa214522ce7b56696cea088068f127827cf1a2a9a628
-
Filesize
168KB
MD5c64813adfc336147b0e6230f949236bd
SHA1cd3b7088c1e071ea93952673a4c59edbfbd619cd
SHA25638f3ffec87edfe3ff6da75cc8604651b8170581d780ee5b258bc591fe72e6c6f
SHA5128a2cf2459f810c33caf1ad4adcc241ed4b63c865703e4ff36b198f7f994a28be8abb9fbddde939931f0daa214522ce7b56696cea088068f127827cf1a2a9a628
-
Filesize
111KB
MD51e58c74d262752a2060fbd8010d75169
SHA19adb4d47fb327e7f7293130c424c64e27ce6da2f
SHA25605a0c977d25de24bc7778ff6b83f81a94f555a181f48dac40fab303c69b43d98
SHA51222185e4742b69d1167b1edfc7025014794cee91b52573245a969c1d416def993b4a284679ed54577d4db1dbb7931763abb7a3d777e7c57492f52bf970ee42090
-
Filesize
111KB
MD51e58c74d262752a2060fbd8010d75169
SHA19adb4d47fb327e7f7293130c424c64e27ce6da2f
SHA25605a0c977d25de24bc7778ff6b83f81a94f555a181f48dac40fab303c69b43d98
SHA51222185e4742b69d1167b1edfc7025014794cee91b52573245a969c1d416def993b4a284679ed54577d4db1dbb7931763abb7a3d777e7c57492f52bf970ee42090
-
Filesize
55KB
MD542bacbdf56184c2fa5fe6770857e2c2d
SHA1521a63ee9ce2f615eda692c382b16fc1b1d57cac
SHA256d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0
SHA5120ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71
-
Filesize
55KB
MD542bacbdf56184c2fa5fe6770857e2c2d
SHA1521a63ee9ce2f615eda692c382b16fc1b1d57cac
SHA256d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0
SHA5120ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BA9C4798-6990-11ED-919F-4EF50EB22100}.dat
Filesize5KB
MD5bae9aba39f9bcc3f3983e8db26478f62
SHA1d1f32a5d65c40e2fa79558ba07804492c6f39848
SHA256285053e251868fdf2791b5c31c3a276056389e31415909736a6c1df3de0ea547
SHA512c1d34ec9894972a2132be97db81b6e73097f51b2fb7cdd5db737c11b6ff4c91fd5118e6cbcd5766344d4b8e83bcb430defdb7b4aa9fb4bef827fbf65b9db3d15
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BA9C4798-6990-11ED-919F-4EF50EB22100}.dat
Filesize5KB
MD5bae9aba39f9bcc3f3983e8db26478f62
SHA1d1f32a5d65c40e2fa79558ba07804492c6f39848
SHA256285053e251868fdf2791b5c31c3a276056389e31415909736a6c1df3de0ea547
SHA512c1d34ec9894972a2132be97db81b6e73097f51b2fb7cdd5db737c11b6ff4c91fd5118e6cbcd5766344d4b8e83bcb430defdb7b4aa9fb4bef827fbf65b9db3d15
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BAB67E08-6990-11ED-919F-4EF50EB22100}.dat
Filesize5KB
MD54f28a233e54269fc76aa1f7e7bb1376b
SHA14b45f1ea1be3c57c0cd7389e00e1d5fffe89c055
SHA2569dbac2c143c414052bd99abcb9e8fadd2c0f9f8d3f84a430be7d37273695e607
SHA51214f1eb433bb1114de4f8d0c53f99ec2a45728e3a4165fa294967d5d3fe5fdf73bdc26b3888f6752276c099cae7081f3a8cae7863ad9c4e650ecbb65b7c2854e5
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BAD0B566-6990-11ED-919F-4EF50EB22100}.dat
Filesize4KB
MD57b27a7f29b063972966bbcdc1082507c
SHA164b7c52fd1eedf19a5ca2e59630f22c44317a3fb
SHA256131a699b60ab06f4892b2600f495a755dd0e1c2a4a28a34a53ecb9c3094e31ff
SHA5129e864d015711a5b887380c87da2aad676729d2d176bbdb68e4211b8698af1ed8b2ed4039bdbdf840a66acdadccbddd59a737281f8f0b06672c86acba6b002e30
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BAD0B566-6990-11ED-919F-4EF50EB22100}.dat
Filesize5KB
MD57b47606e559bedd30ea11be21fedd2a8
SHA1ee24244628c387499e8baaf9b247f11e993ea537
SHA2563d8f5b752ed41d883092b781fc341e7d54d50dd10a884b0f0d89c54e3a40a6dc
SHA512d8feb999d1205d4a43e8c510e8219bdce84c8bf2d8cad22d74947b0c22358fa23d7246b8c7d67150b52ea7e82b248d979e38e3b7abe2ea5cb1a17b643ae23aa0
-
Filesize
168KB
MD5c64813adfc336147b0e6230f949236bd
SHA1cd3b7088c1e071ea93952673a4c59edbfbd619cd
SHA25638f3ffec87edfe3ff6da75cc8604651b8170581d780ee5b258bc591fe72e6c6f
SHA5128a2cf2459f810c33caf1ad4adcc241ed4b63c865703e4ff36b198f7f994a28be8abb9fbddde939931f0daa214522ce7b56696cea088068f127827cf1a2a9a628
-
Filesize
168KB
MD5c64813adfc336147b0e6230f949236bd
SHA1cd3b7088c1e071ea93952673a4c59edbfbd619cd
SHA25638f3ffec87edfe3ff6da75cc8604651b8170581d780ee5b258bc591fe72e6c6f
SHA5128a2cf2459f810c33caf1ad4adcc241ed4b63c865703e4ff36b198f7f994a28be8abb9fbddde939931f0daa214522ce7b56696cea088068f127827cf1a2a9a628
-
Filesize
111KB
MD51e58c74d262752a2060fbd8010d75169
SHA19adb4d47fb327e7f7293130c424c64e27ce6da2f
SHA25605a0c977d25de24bc7778ff6b83f81a94f555a181f48dac40fab303c69b43d98
SHA51222185e4742b69d1167b1edfc7025014794cee91b52573245a969c1d416def993b4a284679ed54577d4db1dbb7931763abb7a3d777e7c57492f52bf970ee42090
-
Filesize
111KB
MD51e58c74d262752a2060fbd8010d75169
SHA19adb4d47fb327e7f7293130c424c64e27ce6da2f
SHA25605a0c977d25de24bc7778ff6b83f81a94f555a181f48dac40fab303c69b43d98
SHA51222185e4742b69d1167b1edfc7025014794cee91b52573245a969c1d416def993b4a284679ed54577d4db1dbb7931763abb7a3d777e7c57492f52bf970ee42090
-
Filesize
55KB
MD542bacbdf56184c2fa5fe6770857e2c2d
SHA1521a63ee9ce2f615eda692c382b16fc1b1d57cac
SHA256d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0
SHA5120ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71
-
Filesize
55KB
MD542bacbdf56184c2fa5fe6770857e2c2d
SHA1521a63ee9ce2f615eda692c382b16fc1b1d57cac
SHA256d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0
SHA5120ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71