Analysis
-
max time kernel
162s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 06:07
Behavioral task
behavioral1
Sample
77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe
Resource
win7-20220812-en
General
-
Target
77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe
-
Size
106KB
-
MD5
ccf8ff587d454902ccd6a308cfac647b
-
SHA1
6dacbbc8baf38e1a4f3938c27c4608d1da6b8edd
-
SHA256
77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca
-
SHA512
8d8425156336a40945e25c5eac80f5ee3f01bbfb3ee0358363e71d0a788a686999e0a3559b3e313e4f856b9bc6726a8b52f66820e014b03dac5d628daa1e7d6e
-
SSDEEP
3072:GefSgCjWQgOsMTbijH0UUsJRGyoutiOMYcYYrm:GaSrgOsIUzUopoSiOK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3628-132-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3628-133-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\qm_go538_com.ico 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe File created C:\Windows\SysWOW64\t_go16_com.ico 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe File opened for modification C:\Windows\SysWOW64\nr_go38_com.ico 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe File opened for modification C:\Windows\SysWOW64\life_74443_com.ico 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe File opened for modification C:\Windows\SysWOW64\www_meinvly_com.ico 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe File opened for modification C:\Windows\SysWOW64\t_go16_com.ico 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe File created C:\Windows\SysWOW64\nr_go38_com.ico 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe File created C:\Windows\SysWOW64\bg_go538_com.ico 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe File created C:\Windows\SysWOW64\www_meinvly_com.ico 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe File created C:\Windows\SysWOW64\life_74443_com.ico 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe File opened for modification C:\Windows\SysWOW64\qm_go538_com.ico 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe File opened for modification C:\Windows\SysWOW64\bg_go538_com.ico 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\TheWorld 2.0\TheWorld.ini 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe File opened for modification C:\Program Files (x86)\TheWorld 3\TheWorld.ini 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe File opened for modification C:\Program Files (x86)\GreenBrowser\User\GreenBrowser.ini 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30999520" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3595612276" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3595612276" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999520" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000f2e3ec21c2cff499837bdf669a906a400000000020000000000106600000001000020000000790bbd4eb755ff97397679d22a342e0d0b5678c713d45bfd07133d8fab7313f5000000000e8000000002000020000000b95d396df0d0eb73b7edb6c36013bd433bfe64071d77a476c717e9d3d468cbc120000000c93ffbefd8f7bc25f275240f886a1de4451106377a189fdc23550e459d23be9a40000000bea74739943a9220993297f478a407caee0a5596dd4b4623864d6d2cf56eea3d0575b72a82596017f429a38ccf2a0d9808080f580477e30504a8d1886dc35866 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0890ad7e003d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E30C5166-6FD3-11ED-89AC-D2D0017C8629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c33bc0e003d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000f2e3ec21c2cff499837bdf669a906a4000000000200000000001066000000010000200000006c81b9a924d233e178f30a73c500bf207300bff0ce04a12c8721ec99cda794d2000000000e8000000002000020000000234ce052bee10c46e7edd6bf6aeed776535c71991d1bb5d6eb8a5ab6735c53fc200000006d211b4743c3af431695c6ca073664530e926fc10c529850cc5a8e6cca640c7c40000000da876f67442f7646cd1c74c987130f62b1663a7e9b67e1f9911be36e7bbccc0c16db8b41bc5e582bdbf9c633246be8e64de9b140e9f12f267ac6af2c433f460a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E30EB3E9-6FD3-11ED-89AC-D2D0017C8629} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000f2e3ec21c2cff499837bdf669a906a4000000000200000000001066000000010000200000007f1522e77161fc55ac71039409e0e9f1b9aefb8b7531f9cb4abf04d4019f3a88000000000e8000000002000020000000eb3aca1040897bcd55d72d4df26bb234184085971c285fced4211bafbc80ef4320000000ae2f68b4a6cf784e0c31aad8cc78c4d4666b9459256cde1831ab496445d8cb8040000000a3428894db10ebfa560b7f1a1631966f7386584e367d590f23aa165848716431840a78746a5beaae5677e6ef07b2085248b6c2e96e4aed6915f6ceb8c6cab8e1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376484127" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0fa0cd7e003d901 iexplore.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\ÊôÐÔ(&R) 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\lnkfile 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\InfoTip = "Internet Explorer" 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\ShellFolder\HideFolderVerbs 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\LocalizedString = "Internet Explorer" 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\InProcServer32\ThreadingModel = "Apartment" 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{98F275B4-4FFF-11E0-89E2-7B86DFD72085} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD7A2E7B-21CB-41b2-A086-B309680C6B7E} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\Open\MUIVerb = "@shdoclc.dll,-10241" 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{59031a47-3f72-44a7-89c5-5595fe6b30ee} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a00ee528-ebd9-48b8-944a-8942113d46ac} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\Open\Command 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\ShellFolder 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\ÊôÐÔ(&R)\Command 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\ÊôÐÔ(&R)\Command\ = "rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,0" 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{04731B67-D933-450a-90E6-4ACD2E9408FE} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e345f35f-9397-435c-8f95-4e922c26259e} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{208D2C60-3AEA-1069-A2D7-08002B30309D} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\ShellFolder\Attributes = "0" 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\DefaultIcon\ = "%SystemRoot%\\SysWow64\\shdoclc.dll,-190" 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\InProcServer32 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\Open\ = "´ò¿ª(&H)" 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\Open\Command\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe h%t%t%p%:%/%/%3w%6w%8w%.%2d%2h%54%53%52%21%.%7c%7o%2m%/%?%6s%6y%6s%6t%6e%6m" 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\ShellFolder\WantsParseDisplayName 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\DefaultIcon 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9343812e-1c37-4a49-a12e-4b2d810d956b} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EDC978D6-4D53-4b2f-A265-5805674BE568} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26EE0668-A00A-44D7-9371-BEB064C98683} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{11016101-E366-4D22-BC06-4ADA335C892B} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{64693913-1c21-4f30-a98f-4e52906d3b56} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{daf95313-e44d-46af-be1b-cbacea2c3065} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\Open 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\ShellFolder\HideOnDesktopPerUser 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{89D83576-6BD1-4c86-9454-BEB04E94C819} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C} 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\ = "Open" 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3628 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4740 iexplore.exe 2640 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4740 iexplore.exe 4740 iexplore.exe 2640 iexplore.exe 2640 iexplore.exe 5048 IEXPLORE.EXE 5048 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 5048 IEXPLORE.EXE 5048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3628 wrote to memory of 2640 3628 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe 84 PID 3628 wrote to memory of 2640 3628 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe 84 PID 3628 wrote to memory of 4740 3628 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe 85 PID 3628 wrote to memory of 4740 3628 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe 85 PID 3628 wrote to memory of 4232 3628 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe 86 PID 3628 wrote to memory of 4232 3628 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe 86 PID 3628 wrote to memory of 4232 3628 77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe 86 PID 4740 wrote to memory of 1936 4740 iexplore.exe 88 PID 4740 wrote to memory of 1936 4740 iexplore.exe 88 PID 4740 wrote to memory of 1936 4740 iexplore.exe 88 PID 2640 wrote to memory of 5048 2640 iexplore.exe 87 PID 2640 wrote to memory of 5048 2640 iexplore.exe 87 PID 2640 wrote to memory of 5048 2640 iexplore.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe"C:\Users\Admin\AppData\Local\Temp\77eed2d72a28fca639dfd1269ab2ac3d9a9229e6982306229fc6cae015b6f9ca.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://tc.go4321.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5048
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.dh4321.com/?system2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4740 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\77EED2~1.EXE > nul2⤵PID:4232
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E30C5166-6FD3-11ED-89AC-D2D0017C8629}.dat
Filesize5KB
MD58b4e054492bec2fedad1b0dec5010527
SHA126116db29006e3c7efe85a3203ea5986a615a069
SHA256df61182e85ce7e368a4ee1541f5a0842a9ec1b35854281f9aea9573d98f386c5
SHA512534af88e4b2904114b8e79a4313b36ed1080f26b15009b928a7597241ab70123e73299c20402575aa6eecd3fdb03641c957ba4693a6f15caf11ba3837b3046b0
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E30EB3E9-6FD3-11ED-89AC-D2D0017C8629}.dat
Filesize3KB
MD54783376654737cf4e9c23822d381f182
SHA1f8bbbb6ced25c6c5adaea16fd9d82fa07bac0220
SHA256fd746ffdf49142764fdc1fed4cf133b60abd548b38acedf9efc3c8305a56185a
SHA512bab060f45a1b8c5e14a36deccf04b37a4bb5e55dcf4682301bcceee5b14f77b516b091e4d5b374712d9934890eb78b6f06b97c6471d90ef6afd1beb648c2996c
-
Filesize
180B
MD50bafb62d881ef1ade22f2b266ffc2c84
SHA170a84d1c8ea217ee6a6537db5c46584b73dd9eac
SHA256bc3593b8a137b4303ffc8732c04045665378aa483cc8f00ee87a31c059df6c51
SHA512216870a713adf51fda9ea8218ea5b11004dc44659644565a73f35f36d97d0b5af020cb29953060efe531fffa5f6244e675539f2ebea432c9b68192cb37b2f4f7
-
Filesize
139B
MD5de86db8dbb6de27ce328ee8651cfd3a2
SHA1120e434052c858d64fc318b2ee2ebb6785555366
SHA256f5afe8b1408b0071bd92f2591c17e2a23681456e569a675b933b09ed8ffef729
SHA5127953046b2419dc4cd3f03aed61d278b88e2080a2439eed8d5aa8da8fe128f8972163399a1e800b61012156a83846923ce50eeef47ad9e2b6febd9f495ebdeef0
-
Filesize
76B
MD5c76bbb15fcf582a7572661475cfacf45
SHA130f6496f1daaab31799ca1e6ad090ead25f78008
SHA256e0f06f9c6128e4d7dca5174e5d286d8d25da601e95b7b331e1737f949a0edfe4
SHA512e9c60ae79939b816cdc2925d4fadca0b679fabc5031908ea96efae0a85683654fcfc1e8a8b10efbff27d6fa658c2a333d54cd1add629585ec808d5f4fd99e2e8
-
Filesize
141B
MD579108a52cb15331069f15c1d7350c889
SHA1cabdc071c5e57c54e518e5c2282bae7018097c18
SHA25689ba7c85cb7c973e3a9bbe47996f1ad4221cfb00b0c8dcc01a5b3a35e5bda48f
SHA5120e9afd60a3905a7f9b3831041dcdfad13316e35963a022e02f1a06d32b552782c225f4e6c4abe76b2744394fa2dff48ac2a7a9f925c835194984c79b8449a1be
-
Filesize
180B
MD53d39e5583810293bb962d6387d5394f7
SHA148e6cbd6101005cec1cd4d6c59b74aeb16cfcfb9
SHA256454624996b96eabb2bb6d19cff4b631be74a96cdd8625a58011fb2f22dd2af6c
SHA512341944143f49c03395e8cb1ae0b8ab5b07bb9753a5e294e0ce27c33b342b904c8194f522cab60184c463e7bd09fc8d7d49e05c9e157f149fcaa53f126e956179
-
Filesize
179B
MD5cac57ca8eb2c25526cfc900787e184a2
SHA1fd1f7f519abb1eca1e923a49f5716c3a565b2e56
SHA256c036a95be3aa3fdc28c45cfb9257c18db64290b97cccf601c837e39caca1e1da
SHA5126e3bc3fe14664fd012fbca9f57a175ea43836fad0644db6fe40d05cd31cfb82a980b3e955b0a4ee26876c0ac218ee4d6901aedfacdee5898a0346875cebd2ff0
-
Filesize
177B
MD5208b4a2146373e0aca3206a369677116
SHA1e804a4af33c9d80b3c92d4aa6753687edd5f2608
SHA256d200fd8c4b99c65652f1e2447e46d11834a927d08b5080848185e6f032cda195
SHA512621e0c415507d91f9fa868cd9a8024e96414bbf9090c866f3a8f6d1290911605ca8e6f59b9c2493c05a4c73686efe9097ddd8f5f8fab877eab179bb965e76e85
-
Filesize
155B
MD5761f5bbcd8993b9db625865bd9a1be41
SHA1dff63c0d8b7b1410d952dc452642f53e10f47f19
SHA25662439cd57973cdfcfa7333551bd496279bb101572b2356f345fc0dd157070c5d
SHA51201efccfee3cd433cfc7c84c136d80ce9fcecb691f02aef9e732c4e921d2ee0b3bc739776f8f80928aba50634a45fb3865d6566ed5aa8c15abde6696ae9943b5d
-
Filesize
76B
MD5a5d8afe991a28dcd842fc52a3cb5e9df
SHA1984b4d2ff6ed73516d191cd29b1408e6e26f0f65
SHA256cf4aa8ba3d54066e70453ac006a00fbe45c86ca36970105ec75ed897b0acdefe
SHA512d7fae173c59911e739bce51f18d316f65877d6761643984357ed36a89fbe25dddfbffffffd0a208dff91bc899813af6c7a443256e863c9e803b1d60b92c0a43b