Analysis
-
max time kernel
151s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 12:35
Behavioral task
behavioral1
Sample
0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe
Resource
win7-20221111-en
General
-
Target
0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe
-
Size
2.3MB
-
MD5
ff3d7e1506acf688ec60a0544b4c223d
-
SHA1
a411fac1cb409333e459c03b86afefe0f2492568
-
SHA256
0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69
-
SHA512
652bf5c0b567677c4c7bc4add60da4b9f78dcbdfb0d0b1ff9a6a6ac81af4387fcc5cde759e2ff354f293ede0dd3ee801098943275d30167b67032478adf21967
-
SSDEEP
49152:bF089ANW0kzZ2+K/2kWKXHRNwpygaV5ShPAQtoyzrVs6GFbo:bF0NwZ9KlWONwpIJOzHGFbo
Malware Config
Signatures
-
Blocks application from running via registry modification 6 IoCs
Adds application to list of disallowed applications.
Processes:
0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "yylauncher.exe" 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "YY.exe" 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "e_patcher.exe" 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "e.exe" 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe -
Processes:
resource yara_rule behavioral1/memory/1228-60-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-65-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-64-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-66-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-67-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-69-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-71-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-73-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-75-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-79-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-77-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-83-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-81-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-85-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-87-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-91-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-89-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-93-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-95-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-97-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-101-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-99-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-105-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-107-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral1/memory/1228-103-0x0000000010000000-0x0000000010040000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/1228-55-0x0000000000400000-0x0000000000986000-memory.dmp vmprotect behavioral1/memory/1228-58-0x0000000000400000-0x0000000000986000-memory.dmp vmprotect behavioral1/memory/1228-59-0x0000000000400000-0x0000000000986000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeiexplore.exe0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D65BDE1-6D00-11ED-B110-4EFAD8A2B6A5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376173255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af0000000002000000000010660000000100002000000043974557c813c00c9e4b2ed0eccc64f5c3e4ada9911f2fdedb064af50e2dbaa4000000000e8000000002000020000000f722dda448803afa4837dc8fef6a943da3a33dd47e75bd36b9eb7e59dacdcfe7200000003c32a3dca55e829ef2f97af6a23b23a062c902049c0cbd08173b46002790946c40000000881fc81e3e1243ee13c7edb32aeb7a09beffbb5b78493933e605b0b98ca247a233b61e71de4182e22bbfe9417efca144eccf834f79d89a30a631d2abd89176d4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D84AFC1-6D00-11ED-B110-4EFAD8A2B6A5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 600d9ef20c01d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exepid process 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeiexplore.exepid process 1168 iexplore.exe 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exeiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe 1168 iexplore.exe 1168 iexplore.exe 432 IEXPLORE.EXE 432 IEXPLORE.EXE 1928 iexplore.exe 1928 iexplore.exe 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exeiexplore.exeiexplore.exedescription pid process target process PID 1228 wrote to memory of 1168 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe iexplore.exe PID 1228 wrote to memory of 1168 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe iexplore.exe PID 1228 wrote to memory of 1168 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe iexplore.exe PID 1228 wrote to memory of 1168 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe iexplore.exe PID 1228 wrote to memory of 1928 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe iexplore.exe PID 1228 wrote to memory of 1928 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe iexplore.exe PID 1228 wrote to memory of 1928 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe iexplore.exe PID 1228 wrote to memory of 1928 1228 0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe iexplore.exe PID 1168 wrote to memory of 432 1168 iexplore.exe IEXPLORE.EXE PID 1168 wrote to memory of 432 1168 iexplore.exe IEXPLORE.EXE PID 1168 wrote to memory of 432 1168 iexplore.exe IEXPLORE.EXE PID 1168 wrote to memory of 432 1168 iexplore.exe IEXPLORE.EXE PID 1928 wrote to memory of 1568 1928 iexplore.exe IEXPLORE.EXE PID 1928 wrote to memory of 1568 1928 iexplore.exe IEXPLORE.EXE PID 1928 wrote to memory of 1568 1928 iexplore.exe IEXPLORE.EXE PID 1928 wrote to memory of 1568 1928 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe"C:\Users\Admin\AppData\Local\Temp\0e57dc6b41764f42fcf04175c98f880569113ce0696daa5f2d687b094d318a69.exe"1⤵
- Blocks application from running via registry modification
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://cfqingkong.tap.cn/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1168 CREDAT:340993 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://baid.us/MDsb2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD58caff9763bd2a727663aee1983e9c514
SHA118bdb3c7cf07481e539bba70b9e6eec9541fd1c9
SHA256817d31b247668967898c565ffc311054858813a659b0672d962379976cec2af7
SHA5121b0cd60c0cebdd082a4ebb17fefaed4d791910c591cf58402ba511b5697653ac522de3d1beb6f79b6706fc511ce26d4ead913ffe438e25c031f7282bcb01e3dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53c6aafc9bcab9467a0f5ddfaa7df4136
SHA1f70f9257e800f7f71528df5e81e99d849a2a9042
SHA2563c1be5ab179193085fdd1ec01f5a1d581e75dd0efba84e733d0791fecd88a715
SHA512c6603a239a97f9af99a37411539ff50fd4759c38e387ec386b3f327b0119421b34d1573288be7be1b0f74996e618cda7e26c56eefe2497128b30a115673c02df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD575e0645a9df72e7d02d51981ddc82ff9
SHA17f6dd83902bbdc8f8156459bb1a5bbe325ecf036
SHA256d0002646ec00d9fbd81069c706189a5219bef9a5f273d6fa89166d233de7998d
SHA51265e6d801555501d9be78e2389e995172ff3dbda988b1f7dc6bb6687c162bc7cf43975098b8405fe46f2cd03566e20f535f73de14b94daa56d73d6518b77203fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD58b2bf9fe76d56392b0c036daf92fd365
SHA1c1c86dc65f73ac41b2afe4914257fdf83b131e55
SHA256523e6687d8878a209ea15a61f1b2819f66d5f2f274253168b03108c8cd8f4036
SHA512482a518eaeac12997d09799d711250146010312e9cf4f2a7ad6b626c576b8c19867580ee10a10a5a71e2678b2d742586673b014c13960f206fbc902382da5a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e35edbaf8671c66a717c675eed2627af
SHA161296d91df5d98b79d3688ed216c764679e80c56
SHA25698189ede32360263fdcb179c64c0283939e1f4ccf68a480d4eb3031223d4e423
SHA512605f8a12b8b407aa37f14bc84c012b6dfe5feddbb80b7f1104be1694bdc34dfbea360766582741d32a73d792d34fb557c902985c47726cda8b300763e0f483fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b390f2b6f80f5af6e18003fadd830cdc
SHA18eeedfcca94f4c404526a84570eff3b7527333a7
SHA256c509ab6a2194153b10df100487a16296226377315282a53bab1f259bad90c26c
SHA5128e521387ed41f54deb00e9736db062450799ddbd386ed7cfe7a24d6352100e7452595a956621c56070a88429307fc17af621c88255e090d86e11bae3bece04ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD52651a36901a35e2e0dae477b86c849c1
SHA1f441ba2bec4d8c67c1938299d3451d9d46856426
SHA2560d412c52f4945b1df55c30ba3d24a9db582803abffee9f365914b3639d5bee55
SHA512129dfa648b5a5f6f5d9f57f0990fe586f59371a5ed988dede991da6de2e7dc209af54877c03614eff1cfb572d738f611a040dc077f728c5b65eb742d284d8e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ba5d4bcc1586da5e65f9f31c8c080584
SHA14fc10e3f51cf7664200d61671b4f65ea7d369372
SHA256d4e0c0b1671595fad45f28b285598e087583f5a979a8cf0d9455267538d52847
SHA5126e0c247a362bd181742a635c72ecc5f34da210b1e7e2f4102c9cf243deac21a50cd1ef96a55adf6c9ac07aa2aed1984d53e7279fc20bfe46e374a84896a2aac7
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1D65BDE1-6D00-11ED-B110-4EFAD8A2B6A5}.datFilesize
5KB
MD5f86945a2718f13c4b57779863a17a190
SHA1b4a3c3270a82794ad61c071293e322a6c8815110
SHA25643fb654e9deeec8791e87feb73380e7e1069ed7ad8d0b73fdcafff1642bcdc05
SHA5127f550262518d75c495a8594e89950f9ebffeee79eba20c93ba59940886d809e652c15cce766588956c76ccf684c6f8e7bfc139aaa00b09acfd57e2ce3f3c9a4f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\N1P5NEOJ.txtFilesize
601B
MD57ad5e442b4542339aca57db175ab9918
SHA1243984ce0e4a17cb753c9ee0897e1b606ccdd7aa
SHA2566377c5811c5fc04a40d496a586cc730bcbd988986e752700f0c4c83233096213
SHA512785c830b1d7a377c719d15456ccf628fdf1e4e6febce1c1f804ca231955977b650dd04499698ef424f7b8ed1a69bb53fc08cf2d873d3aaa4abb40cbf4d602428
-
memory/1228-87-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-99-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-75-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-79-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-77-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-83-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-81-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-85-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-54-0x0000000075C41000-0x0000000075C43000-memory.dmpFilesize
8KB
-
memory/1228-91-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-89-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-93-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-95-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-97-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-101-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-73-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-105-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-107-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-103-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-71-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-69-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-67-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-66-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-64-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-65-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-60-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/1228-59-0x0000000000400000-0x0000000000986000-memory.dmpFilesize
5.5MB
-
memory/1228-58-0x0000000000400000-0x0000000000986000-memory.dmpFilesize
5.5MB
-
memory/1228-55-0x0000000000400000-0x0000000000986000-memory.dmpFilesize
5.5MB