Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 16:29
Behavioral task
behavioral1
Sample
c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe
Resource
win10v2004-20221111-en
General
-
Target
c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe
-
Size
2.8MB
-
MD5
085058177ea04280a513b60347e236f0
-
SHA1
9b7c7507b2bf76c4ff0721eb8485dc2fb7b7ab7e
-
SHA256
c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7
-
SHA512
662faaed0805566f9875b1f58c8b752f7a61d6ef6e5d68c62ebc83139b45f1b74c6af66ea3b4ad74bd26c6b797bd2b33515818b08abfe4d8346f34e0f22e0544
-
SSDEEP
49152:KkQTA+sYMxNH5s5la6kETd4skrcqgRentDu0H+rTxEbpRdlH/C8z:Ka+nw/olVkEp4s0gRiu0erTgpRrC8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1872-54-0x0000000000400000-0x00000000006D2000-memory.dmp vmprotect behavioral1/memory/1872-55-0x0000000000400000-0x00000000006D2000-memory.dmp vmprotect behavioral1/memory/1872-57-0x0000000000400000-0x00000000006D2000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "88" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\ = "847" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\ = "113" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\ = "125" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "847" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\ = "32" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\ = "947" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\ = "154" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "154" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\Total = "125" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "186" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "125" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\ = "139" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\uptolike.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\ = "67" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88B5A6D1-6E29-11ED-A503-626C2AE6DC56} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\uptolike.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "39" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\Total = "67" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\Total = "39" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\ziabyka.ru\Total = "847" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exepid process 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exedescription pid process Token: SeDebugPrivilege 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe Token: SeDebugPrivilege 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeiexplore.exepid process 1604 iexplore.exe 1500 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1604 iexplore.exe 1604 iexplore.exe 1500 iexplore.exe 1500 iexplore.exe 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exeiexplore.exeiexplore.exedescription pid process target process PID 1872 wrote to memory of 1500 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe iexplore.exe PID 1872 wrote to memory of 1500 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe iexplore.exe PID 1872 wrote to memory of 1500 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe iexplore.exe PID 1872 wrote to memory of 1500 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe iexplore.exe PID 1872 wrote to memory of 1604 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe iexplore.exe PID 1872 wrote to memory of 1604 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe iexplore.exe PID 1872 wrote to memory of 1604 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe iexplore.exe PID 1872 wrote to memory of 1604 1872 c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe iexplore.exe PID 1604 wrote to memory of 1476 1604 iexplore.exe IEXPLORE.EXE PID 1500 wrote to memory of 1488 1500 iexplore.exe IEXPLORE.EXE PID 1604 wrote to memory of 1476 1604 iexplore.exe IEXPLORE.EXE PID 1604 wrote to memory of 1476 1604 iexplore.exe IEXPLORE.EXE PID 1604 wrote to memory of 1476 1604 iexplore.exe IEXPLORE.EXE PID 1500 wrote to memory of 1488 1500 iexplore.exe IEXPLORE.EXE PID 1500 wrote to memory of 1488 1500 iexplore.exe IEXPLORE.EXE PID 1500 wrote to memory of 1488 1500 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe"C:\Users\Admin\AppData\Local\Temp\c0d03163cd1e1828fb2cff353ffe3bdf2cd84971e0780a49696251ff6552aaf7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ziabyka.ru/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://goo.gl/Tw5mq82⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1604 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD56639eb1615140cb765d60da56623de3e
SHA14eb71b48df96868a741eb80913acb9ffd022a89d
SHA256b5d1cd8dd63ac99b9c47e157187621fbf2e6566a8e6d96b9e17c16759f2846b6
SHA5121156c3f805bfead9f2265b4a5c01ec7bbac8318918115fb53a0865c4857f558a411255f34a099b09b9ec9c2af8ecc2e1301efc9f7e20b63c2454fe15056902d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8FFilesize
7KB
MD564bd9a644bd182581368e3ce024dad9a
SHA11520bd16d65200bfa86d889eb88f4f62a65dd007
SHA2565814095df174f580f08019718d2f8d05177276906620e36564588ba4b19ddfdb
SHA512af1ec9959334ae377a1b199a44ec31a3cadc1273512f8a2644eb8b3b21f24d4afe1c0515a3bb685bd35a0856c2d6383504ee7e72ae67f87f3bda0a8ff91ec5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD569e5af1f5933a57233944837dd36757b
SHA182cb056007762cea9f4403eb0bdef3b2dd95b0cb
SHA2564f987a864ad572f9dd59ce126b3a2e234972b2d1efa593947646066f30d897bc
SHA512fe9376772ea3290f0ce6f0512355e7ee8127b5a41e43b4673bff508218b0cfce30ea95f1b93193fe4a3e70e786da928e241643d1cd079f198f0ebd53b1e80912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8FFilesize
232B
MD5e44df53dd6913207eaed1fe1b6c4232d
SHA1fd1c02b6f0b2205b8fd4e93eed2e71b871bea435
SHA256689fc7c6fd7031309633bf2337547ec635c049740cf8f25d5b87c6757adea210
SHA512d339be2b6952fa872fc743eafcd7835f1b928ff0ae603c75f991633209a29dea6da6c14124493e7d681912dee0f3f2e7a0d3f3174b8ae37eed78ba5674634afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
340B
MD5ae4e8f57adad4bb11f5253477e6d4f7b
SHA1e1da3e70a5b0376d3928a42aed5b77cbd109d21c
SHA25610628fb5a68292ece9df6bdc2daec292a4028df4829ac62747936a6b2b52bbd4
SHA51254f57e89b60d88bf88e4be39ae6456f794335f3bc7801a2a647e37e41c9756fda35e7a6b185074d8656fe5c4d5d5244451965d4ec13a757962fac1d5c045568b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD506e97a69de08c33966640529c13bf03d
SHA137a65239172e4934dac1638a8eebe8acb7b71099
SHA256b43f4b5e94bfc1e496fd0ed245daec309deaca0430fa67a91a08b4055c764666
SHA512dcd91d425388f37f6e6129b8d77b76644f473e77130a18e3725d06a200970da7be7348704ca8c8d700d5492f1a2d1594b21f36113b46575c3463a6333f3e9bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
392B
MD5ee4a2b26bd1e9dd4943c2f076f9a3a2b
SHA1a4b82d83affaa1a2db874ee54a777943cbbd5d15
SHA256b9a0442b4b653248ebfeae14b269020be250feaa459fd0bd541319c62f0634a0
SHA512bdd39a1fdeca5e0b1816587dd2a8c159836053b781bbedce50252d11e95f18700c68fb62129cd9b978864635260d74ff82ab3f4406c5a97952110a6b378081d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD5f98235270384edc9f664cb45ef8ea378
SHA138e433a40ba81bb97dc1efb19894dabd1d238b81
SHA256b33a16305ef945c7593068ce82f98223e34b62df4e17f39913f7dd3dee4f012b
SHA512585ba2d5f99159faee75c31958bfe3257e7a934c60556434d75b91b94adebaa24e887ff2765d953d52a0b01643e1cbdbebb153e84e5cf62ef3c0d9bc571d67c2
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{88B57FC1-6E29-11ED-A503-626C2AE6DC56}.datFilesize
5KB
MD5ffb8353d31c2826e8fa3b2d7ab23a6ca
SHA1ab09dcd7d9f66d1e46e5ab1938c9f240c2e5de2b
SHA2569634310b0dc5df528285f28fae3a71605854e086b325bae19cb6beea37636c97
SHA5125d78d74441b91c4e3619cb53a8567759856f0f31308cc2e39503ff998d470c7c00e8c29266a8c29c31b3d5a5243edc1ea4e80ffbfcbff999cef58de05723802d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{88B5A6D1-6E29-11ED-A503-626C2AE6DC56}.datFilesize
3KB
MD56ad6c20cbc12b908b518038ef72f89ed
SHA1dc176322c94751596ddb6c0299d085089da9a79d
SHA256204c2e26cd97e4061835c8eaaa915f73559c3b4dd0f8a90b1e71499d25c645e6
SHA51279f9f847e6c71018f64c1a1b555703c39cdf8d1f43d47dc0bd06b46da49e098cb6f0eb46e7d508f6aec128f4a7447c22102db84fd0446240009a82afa81a58bd
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.datFilesize
9KB
MD57487b556f77bddfa7f53717406b6fd3c
SHA155b5151c4ed622d1750a3ef6ed77fa3cd087ff1c
SHA2568471d1458416b93c73a2ce06078c58896f7317ec161fd8e2ecd0a86c5d3b89a0
SHA5126251904706504d739bc44c6624e21cc9da8e906a4a444ff8b41ac9bd7a155d2b7b056f9d82e7f56adada04d5bbf8f66368274276fb43c2cf0d9ea29623a019d0
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.datFilesize
43KB
MD568a172e76dc327d94d3aaf721ffabc7d
SHA1c4722d6d5b07e5d09b4f90669bd087f4d233cbc6
SHA2562f94545adc7fef60bb72fd14e15c40a292c63c369e7fe3fc20ebad1f32844134
SHA5125ec42a2d6543ab27c73ddeb6d61f40241171917861be1b2f9ea7f31d84fabd5c8dfee6103dc588be2eac606aab76b7d44cfe5208260ec8c114c7ec255844635d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VKMNEOYV.txtFilesize
606B
MD58548e29c7d88a0980ae2ded2e209950d
SHA168d84bd3874197f5def3d3f42123dd32b4b95d90
SHA256cc7bbc5899f55755b35ed49204955ec190a9bb93c30d7a04a75c67cae8738947
SHA512a8fb3d64d048d7cd52fee527d2cbfcc4de5fb4dee502b336ef0a5832d034ac2666c48a1235d4bd88d4d5f278c511cfa7312fb4dac6e9daaac97c0a3b71d738ac
-
memory/1872-60-0x00000000068E0000-0x0000000006A8E000-memory.dmpFilesize
1.7MB
-
memory/1872-57-0x0000000000400000-0x00000000006D2000-memory.dmpFilesize
2.8MB
-
memory/1872-54-0x0000000000400000-0x00000000006D2000-memory.dmpFilesize
2.8MB
-
memory/1872-56-0x0000000005E00000-0x0000000005FF8000-memory.dmpFilesize
2.0MB
-
memory/1872-58-0x0000000005C00000-0x0000000005DF8000-memory.dmpFilesize
2.0MB
-
memory/1872-55-0x0000000000400000-0x00000000006D2000-memory.dmpFilesize
2.8MB
-
memory/1872-59-0x0000000075841000-0x0000000075843000-memory.dmpFilesize
8KB
-
memory/1872-61-0x0000000005BCA000-0x0000000005BDB000-memory.dmpFilesize
68KB