Analysis
-
max time kernel
165s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 12:25
Behavioral task
behavioral1
Sample
b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe
Resource
win10v2004-20220812-en
General
-
Target
b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe
-
Size
450KB
-
MD5
f95d34acb84233a56266bcec2824170d
-
SHA1
f3aafc6532c3be8abde3363c5bf351f99d6551dd
-
SHA256
b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0
-
SHA512
e5fc0b715b2c2b7ebaac7bef5fd32b025e45a0a9330393f43491bfce03fe7307d3778e4f7bf8bb2f3621b21b924d11d7ee1e7eac748afd65686da02831fc34f6
-
SSDEEP
6144:6FAaUKxU6uN2Npzn/c/fiRPoy/RLtoXOT+Om9SB4SzdgYFQirJhcCFd2GgSpoSjZ:6SYNq6RPoyBtmOm9n8/jcCD2GloS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1756-55-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-57-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-56-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-59-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-63-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-65-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-69-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-71-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-73-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-75-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-77-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-81-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-83-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-87-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-89-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-93-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-95-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-91-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-85-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-97-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-79-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-67-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-61-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-98-0x0000000000400000-0x000000000053A000-memory.dmp upx behavioral1/memory/1756-99-0x0000000001EF0000-0x0000000001F2E000-memory.dmp upx behavioral1/memory/1756-104-0x0000000000400000-0x000000000053A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "36862" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "15107" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E45F2601-6CFD-11ED-BD84-7E4CDA66D2DC} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "44" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "31155" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "37345" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "181" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "35723" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "37345" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "11717" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "32309" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E463C1B1-6CFD-11ED-BD84-7E4CDA66D2DC} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "7126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "11717" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "19675" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "154" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "3712" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "23089" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "25481" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "27741" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "251" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "19675" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.2345.com\ = "36877" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "268" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\2345.com\Total = "15107" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "19675" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 892 iexplore.exe 1820 iexplore.exe 816 iexplore.exe 988 iexplore.exe 1816 iexplore.exe 108 iexplore.exe 1312 iexplore.exe 1796 iexplore.exe -
Suspicious use of SetWindowsHookEx 41 IoCs
pid Process 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 1816 iexplore.exe 1816 iexplore.exe 988 iexplore.exe 988 iexplore.exe 1820 iexplore.exe 1820 iexplore.exe 816 iexplore.exe 816 iexplore.exe 108 iexplore.exe 108 iexplore.exe 892 iexplore.exe 892 iexplore.exe 1312 iexplore.exe 1312 iexplore.exe 1796 iexplore.exe 1796 iexplore.exe 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 684 IEXPLORE.EXE 684 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1312 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 28 PID 1756 wrote to memory of 1312 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 28 PID 1756 wrote to memory of 1312 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 28 PID 1756 wrote to memory of 1312 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 28 PID 1756 wrote to memory of 988 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 29 PID 1756 wrote to memory of 988 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 29 PID 1756 wrote to memory of 988 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 29 PID 1756 wrote to memory of 988 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 29 PID 1756 wrote to memory of 1796 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 30 PID 1756 wrote to memory of 1796 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 30 PID 1756 wrote to memory of 1796 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 30 PID 1756 wrote to memory of 1796 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 30 PID 1756 wrote to memory of 108 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 31 PID 1756 wrote to memory of 108 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 31 PID 1756 wrote to memory of 108 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 31 PID 1756 wrote to memory of 108 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 31 PID 1756 wrote to memory of 1820 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 32 PID 1756 wrote to memory of 1820 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 32 PID 1756 wrote to memory of 1820 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 32 PID 1756 wrote to memory of 1820 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 32 PID 1756 wrote to memory of 1816 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 33 PID 1756 wrote to memory of 1816 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 33 PID 1756 wrote to memory of 1816 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 33 PID 1756 wrote to memory of 1816 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 33 PID 1756 wrote to memory of 892 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 34 PID 1756 wrote to memory of 892 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 34 PID 1756 wrote to memory of 892 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 34 PID 1756 wrote to memory of 892 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 34 PID 1756 wrote to memory of 816 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 35 PID 1756 wrote to memory of 816 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 35 PID 1756 wrote to memory of 816 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 35 PID 1756 wrote to memory of 816 1756 b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe 35 PID 1816 wrote to memory of 1932 1816 iexplore.exe 38 PID 1816 wrote to memory of 1932 1816 iexplore.exe 38 PID 1816 wrote to memory of 1932 1816 iexplore.exe 38 PID 1816 wrote to memory of 1932 1816 iexplore.exe 38 PID 988 wrote to memory of 1572 988 iexplore.exe 37 PID 988 wrote to memory of 1572 988 iexplore.exe 37 PID 988 wrote to memory of 1572 988 iexplore.exe 37 PID 988 wrote to memory of 1572 988 iexplore.exe 37 PID 1820 wrote to memory of 820 1820 iexplore.exe 43 PID 1820 wrote to memory of 820 1820 iexplore.exe 43 PID 1820 wrote to memory of 820 1820 iexplore.exe 43 PID 1820 wrote to memory of 820 1820 iexplore.exe 43 PID 816 wrote to memory of 1880 816 iexplore.exe 42 PID 816 wrote to memory of 1880 816 iexplore.exe 42 PID 816 wrote to memory of 1880 816 iexplore.exe 42 PID 816 wrote to memory of 1880 816 iexplore.exe 42 PID 108 wrote to memory of 684 108 iexplore.exe 41 PID 108 wrote to memory of 684 108 iexplore.exe 41 PID 108 wrote to memory of 684 108 iexplore.exe 41 PID 108 wrote to memory of 684 108 iexplore.exe 41 PID 892 wrote to memory of 1828 892 iexplore.exe 40 PID 892 wrote to memory of 1828 892 iexplore.exe 40 PID 892 wrote to memory of 1828 892 iexplore.exe 40 PID 892 wrote to memory of 1828 892 iexplore.exe 40 PID 1312 wrote to memory of 840 1312 iexplore.exe 39 PID 1312 wrote to memory of 840 1312 iexplore.exe 39 PID 1312 wrote to memory of 840 1312 iexplore.exe 39 PID 1312 wrote to memory of 840 1312 iexplore.exe 39 PID 1796 wrote to memory of 1592 1796 iexplore.exe 44 PID 1796 wrote to memory of 1592 1796 iexplore.exe 44 PID 1796 wrote to memory of 1592 1796 iexplore.exe 44 PID 1796 wrote to memory of 1592 1796 iexplore.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe"C:\Users\Admin\AppData\Local\Temp\b28506364a83a177d1bb688118add20f68acb54ec66d9eec2e34382c509c30e0.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.2345.com/?286932⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:840
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://download.2345.cn/silence/2345Explorer_342201_silence.exe2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:988 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
PID:1572
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.softaw.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://wp.softaw.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:108 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
PID:684
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://fc.softaw.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
PID:820
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://home.softaw.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1932
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.awcms.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:892 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
PID:1828
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://532917920.qzone.qq.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:816 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1880
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize1KB
MD59f1e627f4f18b7c192f66f17040eca99
SHA14ecd356bd1c322d973121e0a0d89e8d2428f584b
SHA256d7ac35af81270f9fdf66dd9764b1642e5b57208ba2d692db09bb773b2c670ea5
SHA5123cc95621fa29693438f3196dc767746a525072a5fcb9c51668cf75a0d3a5934d31a4827cb98b244e80f8532814e8aab9a92d0eac5cafa144fa0292003eb56c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C
Filesize471B
MD5bc82a1246e64e4112415e4d872cbd597
SHA1fa1d042eaa5335d4b348acdbfbcd2012d9ea1854
SHA2567e373031e56b8b45017a893934c1432c4f60458a96026922a7b80bec1827c3c3
SHA512fc54b0c6e92e5d0629cd0483470b2219e5bdd34c074750881b91921279a73f8378b686da85be4e5e968fbfc8e9a3ba27c7a5819435ce4b6ac69934eb8be77666
-
Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96C
Filesize1KB
MD5ca50c2c2c0916c5eb1df228de28ffe0c
SHA1e64c67a8b53f34ddd1914403769932e84535991b
SHA256e15d180fdf56bf83d6dd31b32e99b0ff34d269c907d90c9452fd9f5251756ef3
SHA512e3f3c44497120eb78fe1ff1b4db7ca40d35aa678c9b5ba22a432d6c4bfb2f96ec96a6eff3e24dbe5c5bfe9d5c3a0e874f109cf2490b3d8dc8a99c678e27378cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_0CE04D811AECE4E524A767887569BABA
Filesize471B
MD51d6bd1032e9630d8e2d7e5b3fc64000e
SHA18b0a88e25bd2b8ebbce74702f3fe0033b21eb6b2
SHA2560670da80b12f53490406d22367cb552c37b851a98f8191d9f6ef63535186b8ee
SHA5126db3814af97290c4d17ee764e04f3b4aab8fa460614744a975c005fad4efa936e912a9f7dafc4ddc362cfd08980c8333fb9817e261e0fd68c9056f0fadc3a6a1
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize508B
MD559fcde660cc6d6d121a820d2da35fce4
SHA1e886e3dc7f9898f7cc29bdce666d3087b83a7cb5
SHA2565b64deb7ec6f72cdfd8e544ce0e2436df9b1b836c49af99c72b5d57e0b85f48a
SHA512b6d499c00775934a4080fbc04fe8816d7f3497ed273b7b79ba0e0665c3edbbe1193645409cb4b0d0037286991575ec0fb4d1a2821fca35a74e36a501a2aaaab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C
Filesize428B
MD5e695fbbeb8a6bc6212cc181864af55e3
SHA1ba5a42e6dd7f8849d4bed9e6c6bdac990b969a31
SHA256fe37e656cf7db85703167e74ef2aad99efc6a5cb64ae23fed541bc75778c2edb
SHA512b2ea3b15c2572a4039bb9d0d2d24000d02688fe3f89f057cce8923ec6d9c78173ba8ad38702bb10f18f8f3292282add43b08e7048918e4028a1bf0b2acdbbc5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c917e9f031835255fac9d348691d779f
SHA15e9276b777a98b97eb564c52797c6182a672eefd
SHA25676c972c9246feb44922fc304b48ab37817cddbb2f16f7b97b5a5d4f524e654c2
SHA512826161fb319bcea69248ef7b0404cba00f18064155e85b8438a7340f82fbb7abc8bf0ec25e6f7b3f526a264671f9085d30451909e5f4f99a92aa48a645cc2192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD586580a8e722f97b009fce5bf2ead5707
SHA1db02d7160db2e7523fc36912200ebc69cdd6fcfd
SHA256f67db40df988613223bbc8d4690a7b0d103c8e8f38c89ed9b32fa83110f7d189
SHA512dafc4801d2f1194021f51936ff94f226b8466762ee456a2b44426a82fd9743274419075c995d9fb628909dc0dc2a1df84489824ef5f5c745bacfd6103e9d0bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54990c83f9481fe0f1d859911162dd025
SHA1223b24a329824c91a2a9f64e5de1eef672f470a8
SHA25643f11b145ab3d13f86430c36e4fb7981e7739168926b3546262134a99dfdee04
SHA512fa51595b76eb0756d34ce4d8b240204c4c8f9237aa869dead6ad9c52b1ece75351f8b12f684598e906c499335beb429a0318964c1bbf12b7307d18f8933c624d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c6eb5017057f0c0b9b0ffd185cd05579
SHA126b030b9c20d20ef617c1cc0f58953be9783df53
SHA25609645358bf8308971f4044992dab48e4a9b99436dca77041df347f07c034c44f
SHA51212974d8f4802deed70dd974589a7c0c74f7d14ee314d4f00351a4874d40295cc696bbb2f7cc1dfc57b84fc817491affbf0947d2f80acc09baa64ae15ee5bf964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b04e2dbe7f58ce5d6ba3ee8292029a6a
SHA1599c3f8cb15ed094ec52bc0be9b34a182117b4de
SHA256cb4c59ecfb9278e95cf268aba59977a23d95e263758360bf04337a5165bd30bc
SHA51220d118a6543f59951e54124c8d343065ba86c50b64b9fa8d95ad571a417092f280f7b706d2728f62fb6fc70de350c8018050176f126bd7925c5c5adde22c30d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96C
Filesize492B
MD598e2e82a98914b2a5e535a1cce590afc
SHA1d05e0740c692df834c36d6d3ca2c814433318da7
SHA2567b9c6e373478a4d1aeae99ec846a588bd98162762fdcfc80b7676a1c757ea58d
SHA512bfdd7fb5f3f6a87274f22bdc91156b68047f782adcdf0be8d09c8b31025f34c9b2156e952fa6ebc3f4d749d5cfe6484f8c1908047ad15dc81706420fac33c3d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_0CE04D811AECE4E524A767887569BABA
Filesize432B
MD50f6cb5c3b5ef66a386484a21e296cef9
SHA1ae1fd54930932e06020a12f24da87dbbcedef1b7
SHA2561a8ec130c1eda93f136647579d26feefb298d6e6ab6f7005add10885638ed5c4
SHA51265555393bf86bff8432233abf6b2d7ba02d5e187e304ff5716e3bdf94c7ce6978e02da04dd84e616d21aa68752cb5d0fcd18930d26cf91da5343a12fc5c3fedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fb77f27ea78ea9427fcc6bbb5a204c45
SHA132b535774973afda8da85d7bb4084710b462a959
SHA256c48ecfdc880b592a78e26306ce5544dafeb164d228db23d0756f71f57e461c60
SHA5123ba225bf7a477e499f1b2304d92934139e73b32947c6e43e1f8e734772df980706d05d26cb3c86d99f26c213ee250dadb8af05cb03473a18e0994d86e0e8849f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E455A081-6CFD-11ED-BD84-7E4CDA66D2DC}.dat
Filesize5KB
MD50242fac9a18ac1f518ddcb665267f9fc
SHA15353a7fab61fd6cb92b4e2b89b822ed3d93719a3
SHA256c48337e439878666252b3c55ca9d18f1588703151133e8bda8504dcd1b5c136f
SHA5125a8b495aaf0a1c53574ff6135737352c6de7a6c762de40a968e1e1a35ae8d5c7fbbcb06ada1af9dae7bd4b453e3982f095ddfae74cfef3d6a2a49a2f0240792d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E457DAD1-6CFD-11ED-BD84-7E4CDA66D2DC}.dat
Filesize5KB
MD56eb56520c2e5e7e28d52736389b60c96
SHA1e9233a02f7f5c76d430130aca94cd3457e9f891e
SHA2561515d1cfd76234113040f55431275f756a30656a6e92af07f2d5e5a7845c3a0a
SHA512ab5b6e38b5e8f971a9106debab6996af14c32d4d8a9f25257652403fd8c53cb6f31a5427cd5616429b81125da9eeba674c0c34ee99cb83c4885b21d52ccaa2e9
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E45A3C31-6CFD-11ED-BD84-7E4CDA66D2DC}.dat
Filesize3KB
MD5aeb8024a9b68ef2b4e942359981566fd
SHA1c94aba6865452ecd485168166967e7f264c074cd
SHA256fcaf73fe060688a5b39afa7d93a7426a33240e0ed2e0a26e2ad0545bf2675830
SHA51253a15a244a482841e9daf7010edec1aa03c08b4eda330464ef95f2ca984378e555b8c00ba7e76ccdc6617868ed2bdd31545870c218f96c5a34d06b6a8214d9c0
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E463C1B1-6CFD-11ED-BD84-7E4CDA66D2DC}.dat
Filesize5KB
MD5d20e9042ac84c25e9c44c3cedb37add6
SHA1b58d3413f0a0c406fe81ce72e7630766ffec2dec
SHA256f89a64af7c92f0098abcc0e70bf05d8e6ee185d4f6f4cd20eed0af1bcd7610fe
SHA512ad6f932f915d0551d899a979829b72865930b61993f40001dc388a3ec62a9935f8c10c3743e35ac8ba317f9f1da8e958503027e17cef277a14327099a13aaf97
-
Filesize
4KB
MD595ea04adc7ab0f3f8ec362a1882deed9
SHA1c5a202e05f5c8f4c133137d0fbeb4769a667f3c0
SHA2562bc5961ac090d5fbe288c80e5224f7134e246a1dcd13eeb9c3638a0fc07d6142
SHA51297ffb79b35c532dc77c8f52486fd55f8bbab55d7afdfb9c812248a86a0f0dcbd32d41d7e3be943072daa395c6523be62a290f518e910b7f26a6219ea07c2fce0
-
Filesize
10KB
MD527314703c25f0bacb6f6332cb3dc33e0
SHA13ac4768756e4fa4a3af3316f21aac5b8f879b061
SHA256239adb4b06b69c7d22e0e1b471b933ccb749f6ffad64553b9dc81d9c856091d6
SHA5127f7903a464f0457d6487e7cd487cbeb91e66151b658730890bbca9a512dca29018d0e2152ecea49d26ba7ba3f34ba389eeafdb019a8b1eb5d2622ac3b9044423
-
Filesize
141B
MD5d140a08b25d290b1095335264ca5dd50
SHA16df7a231cc2759d2d2b63310db84ca4418b74b59
SHA25647e6091189e8231849dc75de4c508204facb0b6b65c98944d96c1eef83eb8106
SHA512604c26641ed5d39172b8ecf3ab92b978f06637fb548151c224476676b99b3e8a1d36f845d5f8beb222953439548d3e4626c2113c8a4c782334a9fbfb6e0112a2
-
Filesize
118B
MD58b2a6531ec558c6e1ce538811ef0c3c7
SHA1eb468e8a0ebfe428d707fa158b4d85b769505b7b
SHA256db7464ff1cfa819f4406ea44d0113d539fc7149f82c1138902421c15c93724fc
SHA512fe3bcfc594373a120ae0d8508ae9618e9e83eb597fe000bfb3746815070a886574e64f1fd4cad4c63577a5116678ba095312f54493017574815c1ca29ff1587b
-
Filesize
77B
MD53e4b7541e744ad2c35f6cdeda05c7340
SHA163d2cc571ed98daafbf24b361a6d8176e193fa9c
SHA256ae36f4e2a164d7c2c3349f904865431b205a097a9f7f43457149c5a24e118a14
SHA5129000652d20f6f23a82f927ba24201066d66f63cfd6ec40abd86608a16b10288f10d4f25e3da4399a1b1e3328d56729a8685f555f438fe8151ca4bef03e236fce
-
Filesize
603B
MD5d9e22fc3cb663acb26fdbad0f7fc34ec
SHA1ee46b1e71bbed24f4c625de75dbc6150e67fed66
SHA2563ccb08d4ef47d71d54db1d464344bdd59f792cb51e299499ff0dcef73f81ef4f
SHA512f62ea8473e8e88a328f915be31b63cce544588573be6cac86dd408b7d97c3a6bf3f012c18da9d471b06663eeca52def03289f01cf53efc200f2a7dc18ce1c3e5