Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 20:42
Behavioral task
behavioral1
Sample
e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe
Resource
win10v2004-20221111-en
General
-
Target
e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe
-
Size
16KB
-
MD5
443e7212e78f7d2502564fef2f5c542d
-
SHA1
6a77ea16e8f574aa60fec6914038478683ec2488
-
SHA256
e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6
-
SHA512
d7aa963139ec3bc9a7c794fbd0ab95a484d397f93fe6e166a602c93031110504c60ea5f764e4f0301ac87ef0a7d5a5ad0262222105b5502fca9e6a4e66526866
-
SSDEEP
384:ToxJuREBGV62fWS2ss4RHj6Jsbch3Iwl7VfSZm:TIU6a364Hj6JeyVlp0
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1368-57-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1368-68-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1524 wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF27BF81-6B91-11ED-A314-4E1FE69E5DC1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Modifies registry class 48 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\Command e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\Command e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\ e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\ = "????" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\shell\ = "open" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\shell\open\command e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\ = "????(&O)" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\ e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ = "Internet Explorer" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O) e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\NeverShowExt e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\ScriptEngine\ = "JScript.Encode" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\ = "????(&O)" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\Attributes = "1" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.iexplore e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\DefaultIcon e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\LocalizedString = "Internet Explorer" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O) e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\Command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\" http://www.520921.com/1" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\CLSID\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\shell e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\shell\open\command\ = "%SystemRoot%\\SysWow64\\WScript.exe \"%1\" %*" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\CLSID e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\shell\open e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ = "Internet Explorer" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\ = "????(&O)" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\Command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\" http://www.520921.com/1" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.iexplore\ = "iexploreFile" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\ScriptEngine e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\ = "????(&O)" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\IntroText = "Internet Explorer" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\iexploreFile\shell\open\CLSID = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\Attributes = "1" e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe -
Runs .reg file with regedit 2 IoCs
pid Process 1536 regedit.exe 2000 regedit.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1008 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 1008 iexplore.exe 1008 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1812 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 30 PID 1368 wrote to memory of 1812 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 30 PID 1368 wrote to memory of 1812 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 30 PID 1368 wrote to memory of 1812 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 30 PID 1812 wrote to memory of 1536 1812 cmd.exe 32 PID 1812 wrote to memory of 1536 1812 cmd.exe 32 PID 1812 wrote to memory of 1536 1812 cmd.exe 32 PID 1812 wrote to memory of 1536 1812 cmd.exe 32 PID 1368 wrote to memory of 1008 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 33 PID 1368 wrote to memory of 1008 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 33 PID 1368 wrote to memory of 1008 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 33 PID 1368 wrote to memory of 1008 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 33 PID 1368 wrote to memory of 988 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 34 PID 1368 wrote to memory of 988 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 34 PID 1368 wrote to memory of 988 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 34 PID 1368 wrote to memory of 988 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 34 PID 988 wrote to memory of 2000 988 cmd.exe 36 PID 988 wrote to memory of 2000 988 cmd.exe 36 PID 988 wrote to memory of 2000 988 cmd.exe 36 PID 988 wrote to memory of 2000 988 cmd.exe 36 PID 1008 wrote to memory of 2028 1008 iexplore.exe 37 PID 1008 wrote to memory of 2028 1008 iexplore.exe 37 PID 1008 wrote to memory of 2028 1008 iexplore.exe 37 PID 1008 wrote to memory of 2028 1008 iexplore.exe 37 PID 1368 wrote to memory of 1524 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 38 PID 1368 wrote to memory of 1524 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 38 PID 1368 wrote to memory of 1524 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 38 PID 1368 wrote to memory of 1524 1368 e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe"C:\Users\Admin\AppData\Local\Temp\e3ef42f147d963709c2e2323b43890bdb5833419179d065f65214367649070a6.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.execmd.exe /c regedit /s c:\reg.reg2⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\regedit.exeregedit /s c:\reg.reg3⤵
- Runs .reg file with regedit
PID:1536
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.520921.com/12⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1008 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regedit /s c:\reg2.reg2⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\regedit.exeregedit /s c:\reg2.reg3⤵
- Runs .reg file with regedit
PID:2000
-
-
-
\??\c:\windows\SysWOW64\wscript.exec:\windows\system32\wscript.exe C:\Users\Admin\AppData\Local\Temp\Killme.vbs2⤵
- Deletes itself
PID:1524
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5aea78c27ded5337bbac9c3d3eeb4eada
SHA14be498b4bde086be6fad1dea23bd739f6c2942a2
SHA256c4ed24f8afd98c78487e23ed97f783a5a3cf195b6ade1c2fdd2d38a5a646a37a
SHA5120c399c7219b60c46163a0399aeee49eeb050b6dd2059e2172b49af72eaea335b6cd584a086a066f0baac4a4b06bb40fa60a1c2000a2346d3614514855f8783eb
-
Filesize
608B
MD5643f23602750c11407f7d31a6e43d5bf
SHA13da5e1202f811439242ed0e58a391030267b17b7
SHA2567d43f7cc3e5018d7aa13657f97f2ece3b44a7a1fe170a6f30cec91ef12edf7f7
SHA512b4b70b01bd969b546a50bb549183aa47bf4ab81ed1e55fc3f8411358388cb3a05a8ecfd5cefcdcc547f1cc1816889fcaa6d164f98337417e1f69e218fb6881a4
-
Filesize
195B
MD5d074af1950aed38a9507428f23df9ad2
SHA10313b03e880b283cfacf64aea25c54259d388201
SHA2565f3cd51950de3b9c7f8bb8a14cf5c39f3d480270d89a7c8fabb54900c9c34ca8
SHA512484029eb461a182a9b088f9912047d455749381eab696d15af719f020f4982b6a331b20f1ab5437a8f9312724770ac26791f83d20c79e0e1b1340e53d1122fbc
-
Filesize
450B
MD52944837920fafc0892eb196e7d774b23
SHA131269a61616a0064576e0e6a93e23722cf5a2057
SHA2561c2c0c933e0023e7a24cdd4dd5bf363b00449094d3dc9ff3e7188d893e2580dc
SHA512027b5677254eb8582a672cee88cd5c82dce09170fdc2fd47e9dfaacbd29b691719a5c7ecacbae1fb8c3a5d4a5243e9d3aad64be63e9c788e01f6dfd24f0e003f