Analysis
-
max time kernel
149s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:45
Behavioral task
behavioral1
Sample
f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exe
Resource
win7-20221111-en
General
-
Target
f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exe
-
Size
111KB
-
MD5
15bf8fb39e93a0a30b383a98255d5384
-
SHA1
d4409a40bc5b389804ef8f2eae289bd83665cc4c
-
SHA256
f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d
-
SHA512
a936121d885f627626453fa65c8966fc4b92187439ffe7dceb9d57d2bd3ca74a1c2184d4cb1a29178b00d0cb7400d2e2f5afb6e4ab8eb8b37012b6b57b7e33aa
-
SSDEEP
3072:TROzoTq0+RO7IwnYhXjz2+MM4SOFikUd9:1kdNwB2j4MdYUr
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exeDesktopLayer.exeDesktopLayerSrv.exepid process 1948 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe 4600 DesktopLayer.exe 2128 DesktopLayerSrv.exe -
Processes:
resource yara_rule behavioral2/memory/2268-132-0x0000000000400000-0x000000000043D000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe upx C:\Users\Admin\AppData\Local\Temp\f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe upx C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx behavioral2/memory/1948-139-0x0000000000400000-0x000000000042E000-memory.dmp upx C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe upx C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe upx behavioral2/memory/2268-140-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/2128-145-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/4600-144-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Drops file in Program Files directory 8 IoCs
Processes:
DesktopLayerSrv.exef393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exef393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exeDesktopLayer.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\pxC122.tmp DesktopLayerSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe DesktopLayerSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\pxC018.tmp f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\pxC019.tmp f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe DesktopLayer.exe -
Processes:
iexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{74BF799E-6B7A-11ED-B696-4AA92575F981} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1292425348" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376005897" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998407" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998407" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30998407" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1289143968" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{74D0285A-6B7A-11ED-B696-4AA92575F981} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30998407" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{74D9B033-6B7A-11ED-B696-4AA92575F981} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1289143968" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1292425348" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exeDesktopLayer.exeDesktopLayerSrv.exepid process 1948 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe 1948 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe 1948 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe 1948 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe 1948 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe 1948 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe 1948 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe 1948 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe 4600 DesktopLayer.exe 4600 DesktopLayer.exe 4600 DesktopLayer.exe 4600 DesktopLayer.exe 4600 DesktopLayer.exe 4600 DesktopLayer.exe 4600 DesktopLayer.exe 4600 DesktopLayer.exe 2128 DesktopLayerSrv.exe 2128 DesktopLayerSrv.exe 2128 DesktopLayerSrv.exe 2128 DesktopLayerSrv.exe 2128 DesktopLayerSrv.exe 2128 DesktopLayerSrv.exe 2128 DesktopLayerSrv.exe 2128 DesktopLayerSrv.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 3576 iexplore.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exepid process 3576 iexplore.exe 1380 iexplore.exe 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 2272 iexplore.exe 2272 iexplore.exe 1380 iexplore.exe 1380 iexplore.exe 3576 iexplore.exe 3576 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exef393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exeDesktopLayer.exeDesktopLayerSrv.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 2268 wrote to memory of 1948 2268 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exe f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe PID 2268 wrote to memory of 1948 2268 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exe f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe PID 2268 wrote to memory of 1948 2268 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exe f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe PID 2268 wrote to memory of 4600 2268 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exe DesktopLayer.exe PID 2268 wrote to memory of 4600 2268 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exe DesktopLayer.exe PID 2268 wrote to memory of 4600 2268 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exe DesktopLayer.exe PID 1948 wrote to memory of 3576 1948 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe iexplore.exe PID 1948 wrote to memory of 3576 1948 f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe iexplore.exe PID 4600 wrote to memory of 2128 4600 DesktopLayer.exe DesktopLayerSrv.exe PID 4600 wrote to memory of 2128 4600 DesktopLayer.exe DesktopLayerSrv.exe PID 4600 wrote to memory of 2128 4600 DesktopLayer.exe DesktopLayerSrv.exe PID 4600 wrote to memory of 1380 4600 DesktopLayer.exe iexplore.exe PID 4600 wrote to memory of 1380 4600 DesktopLayer.exe iexplore.exe PID 2128 wrote to memory of 2272 2128 DesktopLayerSrv.exe iexplore.exe PID 2128 wrote to memory of 2272 2128 DesktopLayerSrv.exe iexplore.exe PID 2272 wrote to memory of 1352 2272 iexplore.exe IEXPLORE.EXE PID 2272 wrote to memory of 1352 2272 iexplore.exe IEXPLORE.EXE PID 2272 wrote to memory of 1352 2272 iexplore.exe IEXPLORE.EXE PID 1380 wrote to memory of 2796 1380 iexplore.exe IEXPLORE.EXE PID 1380 wrote to memory of 2796 1380 iexplore.exe IEXPLORE.EXE PID 1380 wrote to memory of 2796 1380 iexplore.exe IEXPLORE.EXE PID 3576 wrote to memory of 3000 3576 iexplore.exe IEXPLORE.EXE PID 3576 wrote to memory of 3000 3576 iexplore.exe IEXPLORE.EXE PID 3576 wrote to memory of 3000 3576 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exe"C:\Users\Admin\AppData\Local\Temp\f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exeC:\Users\Admin\AppData\Local\Temp\f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3576 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe"C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1352 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD515bf8fb39e93a0a30b383a98255d5384
SHA1d4409a40bc5b389804ef8f2eae289bd83665cc4c
SHA256f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d
SHA512a936121d885f627626453fa65c8966fc4b92187439ffe7dceb9d57d2bd3ca74a1c2184d4cb1a29178b00d0cb7400d2e2f5afb6e4ab8eb8b37012b6b57b7e33aa
-
Filesize
111KB
MD515bf8fb39e93a0a30b383a98255d5384
SHA1d4409a40bc5b389804ef8f2eae289bd83665cc4c
SHA256f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0d
SHA512a936121d885f627626453fa65c8966fc4b92187439ffe7dceb9d57d2bd3ca74a1c2184d4cb1a29178b00d0cb7400d2e2f5afb6e4ab8eb8b37012b6b57b7e33aa
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5e32d02ce684c01ef3af05fae9066160e
SHA129c7a6e8ed553ac2765634265d1db041d6d422ec
SHA256b00322d178a6cfc206458c26b26d6c80596073bb3283dcc3fc4e33a4b5f29d71
SHA512e4e3175fb131095e4681ecb76d14dc74d059c0beafb6340965516c6d3d0538deb314b36a3f09df03b491edac84d5c0580e764fed1d8bca9abd4e65cb56167148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD55410296c2726f44b10f0489ea87a707b
SHA1665047fbfb0ed84c5769e21c16226bd81100c05d
SHA256de61b0b33d9bf77631a963851bd93a17def98c2bf8e78872559adcca498cbae7
SHA512d91c6e694cb7c0e3f05322ba1befa7d319c434782897b6c35a36d6c67fa2f2f61f78aaeea8027908f0e8d695e4f6bc2f94dd5e4e181132bb62703c292cc93aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD57417e6fc93997f99f24b8a1894624d94
SHA1d5cafdfe840ce6e15f3c1df17f1a4f307532556b
SHA256fd4e0b6eeceefdec52997ff608708d4d3f8403f0cb9cc47fc862ee6c84ccc4ea
SHA512218176be518baf4fac370fe5af424d084b8e3cb21c98fad1a0e0e5421957d9c525b64f1399d9dd516de1596405dd2f4c604c754d399ee48768036118eb15dda1
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{74BF799E-6B7A-11ED-B696-4AA92575F981}.dat
Filesize5KB
MD5463f5d8950754eb03338b937c442f279
SHA17661a93fa89f4e8a32749f5a70625d5b6ab524ad
SHA256ccf31d863190cf87d3c83ff0ad046374138e3af1192da10bf3bdc95ccb54950a
SHA512b2f502c4c5e5eaade3b3733251d73268f6fe88b266f19ce3bf5028542d5ebe62234b8b53b956ce99014439248d5d28316e48b8a2f1451b7e5c33742403712c00
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{74D0285A-6B7A-11ED-B696-4AA92575F981}.dat
Filesize5KB
MD52a8ba2bfecd4801859243245266d5e15
SHA17c08e1dfff7a736e235f458f262147f4d563d12c
SHA2567e2102adbe582c86bad3d824c38db801b694b7a5559d8641cb61e753cb45c327
SHA51291e7eeac8f60c04a9b87464dbb951fddf637afbdef0215e3f6027f1764348337774159c5161cdea2089afb78fad117b6ada382b17323f0d0401def790f7e4d53
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{74D9B033-6B7A-11ED-B696-4AA92575F981}.dat
Filesize3KB
MD5d807376f9fe191a42899ecc27477d209
SHA1b66aa256d8eef9674498e7798efcddd966e5350c
SHA2562e46d974d0b662f8c1c707b8768bdacaee349bda92a2c6e207db857fce129c00
SHA512f239eea7fad4f8b5a2d53da3b87a634ef328330498b80ce1240ee6f1ad0f166c0beac4c626a69170a2c726f095536ddb9de00f2df1f24bf45e78e8c7b78ce1c1
-
C:\Users\Admin\AppData\Local\Temp\f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\Local\Temp\f393592388253c80cca20accc09a313cfe160f8631a8a55cf9ae7467b65ddc0dSrv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a