Analysis
-
max time kernel
207s -
max time network
237s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe
Resource
win10v2004-20221111-en
General
-
Target
022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe
-
Size
20KB
-
MD5
5a555e11c80d853c081f8ebd3c9c88bd
-
SHA1
94f250a16e3aa77d982d4ad3a867e7e5437d9210
-
SHA256
022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c
-
SHA512
b1c63f9cb69bbdc61f9a2abb1a9f97300572a6f2189cd539e765c7b63ecb7c5f9d92aa2f62ee17d0e72755e6e187ca7c38a63d037860dd4e520543bbfa39399d
-
SSDEEP
192:4/bROG+bO5r+C+isnpHfB7FhO8C0lzWvI4QwFt9V+jqCNa5KDJBbz:4L+q5r+PpHfXhUkKvI4QwjQNa5KDJ9
Malware Config
Signatures
-
Drops file in Drivers directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe 022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe -
Executes dropped EXE 4 IoCs
pid Process 676 winlogon.exe 4380 AE 0124 BE.exe 4372 winlogon.exe 4024 winlogon.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation AE 0124 BE.exe -
Loads dropped DLL 3 IoCs
pid Process 4380 AE 0124 BE.exe 4372 winlogon.exe 4024 winlogon.exe -
Drops autorun.inf file 1 TTPs 25 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\F:\Autorun.inf winlogon.exe File opened for modification \??\G:\Autorun.inf winlogon.exe File opened for modification \??\I:\Autorun.inf winlogon.exe File opened for modification \??\J:\Autorun.inf winlogon.exe File opened for modification \??\P:\Autorun.inf winlogon.exe File opened for modification \??\Q:\Autorun.inf winlogon.exe File opened for modification \??\E:\Autorun.inf winlogon.exe File opened for modification \??\L:\Autorun.inf winlogon.exe File opened for modification \??\M:\Autorun.inf winlogon.exe File opened for modification \??\X:\Autorun.inf winlogon.exe File opened for modification D:\Autorun.inf winlogon.exe File opened for modification \??\Z:\Autorun.inf winlogon.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf AE 0124 BE.exe File opened for modification \??\T:\Autorun.inf winlogon.exe File opened for modification C:\Autorun.inf winlogon.exe File opened for modification \??\H:\Autorun.inf winlogon.exe File opened for modification \??\K:\Autorun.inf winlogon.exe File opened for modification \??\N:\Autorun.inf winlogon.exe File opened for modification \??\O:\Autorun.inf winlogon.exe File opened for modification \??\R:\Autorun.inf winlogon.exe File opened for modification \??\S:\Autorun.inf winlogon.exe File opened for modification \??\U:\Autorun.inf winlogon.exe File opened for modification \??\V:\Autorun.inf winlogon.exe File opened for modification \??\W:\Autorun.inf winlogon.exe File opened for modification \??\Y:\Autorun.inf winlogon.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\regedit.exe AE 0124 BE.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\es-MX_BitLockerToGo.exe.mui AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.Services AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.ServiceModel.Resources\3.0.0.0_ja_b77a5c561934e089\System.ServiceModel.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml.Linq AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.P0e11b656#\2997d4b330208b9b0dad2875b7e0d82a AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.WSMan.Man# AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xaml\a0c4e776b9d01dd5fe5da7fd2edd1f6f\System.Xaml.ni.dll.aux AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\dd3156eef1bb1556bc78b02b7fb822c1\System.Configuration.ni.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Workflow.Runtime AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.IdentityModel.Resources\3.0.0.0_ja_b77a5c561934e089\System.IdentityModel.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Management.Resources\2.0.0.0_fr_b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Configuration.Resources\2.0.0.0_it_b03f5f7f11d50a3a\System.Configuration.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.DirectoryServices.Protocols.Resources\2.0.0.0_de_b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.W2ded559f# AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Management.Resources AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Security.Resources\1.0.0.0_it_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Transactions.Bridge.Resources\3.0.0.0_it_b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Entity.Design\3.5.0.0__b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Workflow.Runtime\3.0.0.0__31bf3856ad364e35\System.Workflow.Runtime.dll AE 0124 BE.exe File opened for modification C:\Windows\ServiceState AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.Excel.AddInProxy.v9.0 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.Resources AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.P08ac43d5#\28965f332c6eb08558a6f5eb76540d9f\Microsoft.PowerShell.Utility.Activities.ni.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\5c1b7b73113a6f079ae59ad2eb210951 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\WindowsFormsIntegration.Resources\3.0.0.0_it_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\srmlib AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.P10d01611# AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.D0ff51f83#\4de3858b9394861311e54b68def9b9f1\Microsoft.Dtc.PowerShell.ni.dll.aux AE 0124 BE.exe File opened for modification C:\Windows\Setup AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.14.0.office\15.0.0.0__71e9bce111e9429c AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Workflow.Runtime\3.0.0.0__31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\SMSvcHost AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Management.Automation.Resources\1.0.0.0_fr_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\Microsoft.Abf69f55a#\7153ef0bfdd1efd38882e46b46b7745a\Microsoft.ApplicationId.Framework.ni.dll AE 0124 BE.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\sl-SI_BitLockerToGo.exe.mui AE 0124 BE.exe File opened for modification C:\Windows\Boot\DVD\EFI AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.ServiceModel.Install.Resources\3.0.0.0_es_b77a5c561934e089\System.ServiceModel.Install.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Entity.Resources\3.5.0.0_de_b77a5c561934e089\System.Web.Entity.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\Microsoft.P6f9a5e83# AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Workflow.Activities.Resources AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualBasic.Compatibility.Resources\8.0.0.0_ja_b03f5f7f11d50a3a\Microsoft.VisualBasic.Compatibility.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.P521220ea#\38720ac5ef14845a9be0c2386ce0436f\Microsoft.PowerShell.Commands.Utility.ni.dll.aux AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationUI.Resources\3.0.0.0_es_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Workflow.ComponentModel\3.0.0.0__31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\UIAutomationClientsideProviders.Resources\3.0.0.0_ja_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.DirectoryServices.AccountManagement\3.5.0.0__b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\Microsoft.P1706cafe# AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.P655586bb#\6fdda83217c1dd40aa3000f46077a8af\Microsoft.PowerShell.Activities.ni.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.11.0.Microsoft.Office.Interop.Excel\15.0.0.0__71e9bce111e9429c\Policy.11.0.Microsoft.Office.Interop.Excel.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Configuration.Install.Resources\2.0.0.0_es_b03f5f7f11d50a3a\System.Configuration.Install.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.Services.Client.Resources\3.5.0.0_es_b77a5c561934e089\System.Data.Services.Client.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.12.0.Microsoft.Office.Interop.Excel\15.0.0.0__71e9bce111e9429c AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\ReachFramework\3.0.0.0__31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\643f6e4c2cc680e910153253d83f3e08\System.Windows.Forms.ni.dll.aux AE 0124 BE.exe File opened for modification C:\Windows\Offline Web Pages AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\sysglobl AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.DynamicData.Design.Resources\3.5.0.0_fr_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Xml.Resources\2.0.0.0_fr_b77a5c561934e089\System.xml.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft_VsaVb AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0\10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Workflow.Activities.Resources\3.0.0.0_fr_31bf3856ad364e35\System.Workflow.Activities.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.12.0.Microsoft.Office.Interop.Graph AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Security AE 0124 BE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1148645593" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000778" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5F47A2D4-74BD-11ED-919F-DAA3C5DFCF8A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000778" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e6851ef31fd3cf49b332bbb4721c9748000000000200000000001066000000010000200000001f6ec097ffa1345b570985e6b0f4bd30f8b6bc8b6ea747858cffe1d9960b6524000000000e80000000020000200000000d37c2439277b39b3fcfd9b9c0051722f3308f5dffa1c2c026dd91520dc46777200000006bee0435847d4c95e9c578293ae6c6ffac26c81060be71f4d96b4202a0a6ae1940000000377adc33fb15ec6c8df74f4bfb5867c8e06b0eb07711cf8349453eaf25786549ac7383af7b2d37dca40ea22790e65b25b4249ef227963c79df9246fa72cecc76 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20dcf36bca08d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1148645593" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90605156ca08d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377024218" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e6851ef31fd3cf49b332bbb4721c9748000000000200000000001066000000010000200000007f68ffacc91619213ccbfe63682dee022fed2d52976eb49b5e4a24206a49072d000000000e8000000002000020000000b72fd48b7697088c7e7a8b48297c7516f4bc20cc753716a186da14e2226df814200000008ce28d0e701bce3bd71d10af7d7aaeae57b5bc5735c47f2748de1fe7f71d4b5a400000000b72a1892e9e7b22996a764a75440609d6cd4bfcad110ae5caa2164461261ad0dfa9bb4be638090fb07e451ff01f60a51bebd8a6d25225f53bfe1faaf5afc920 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ AE 0124 BE.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winlogon.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3628 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1324 022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe 3628 iexplore.exe 3628 iexplore.exe 4348 IEXPLORE.EXE 4348 IEXPLORE.EXE 676 winlogon.exe 4380 AE 0124 BE.exe 4372 winlogon.exe 4024 winlogon.exe 4348 IEXPLORE.EXE 4348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1324 wrote to memory of 3628 1324 022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe 81 PID 1324 wrote to memory of 3628 1324 022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe 81 PID 3628 wrote to memory of 4348 3628 iexplore.exe 82 PID 3628 wrote to memory of 4348 3628 iexplore.exe 82 PID 3628 wrote to memory of 4348 3628 iexplore.exe 82 PID 1324 wrote to memory of 676 1324 022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe 85 PID 1324 wrote to memory of 676 1324 022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe 85 PID 1324 wrote to memory of 676 1324 022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe 85 PID 676 wrote to memory of 4380 676 winlogon.exe 86 PID 676 wrote to memory of 4380 676 winlogon.exe 86 PID 676 wrote to memory of 4380 676 winlogon.exe 86 PID 676 wrote to memory of 4372 676 winlogon.exe 87 PID 676 wrote to memory of 4372 676 winlogon.exe 87 PID 676 wrote to memory of 4372 676 winlogon.exe 87 PID 4380 wrote to memory of 4024 4380 AE 0124 BE.exe 88 PID 4380 wrote to memory of 4024 4380 AE 0124 BE.exe 88 PID 4380 wrote to memory of 4024 4380 AE 0124 BE.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe"C:\Users\Admin\AppData\Local\Temp\022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Windows\AE 0124 BE.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3628 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4348
-
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Drops autorun.inf file
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\AE 0124 BE.exe"C:\Windows\AE 0124 BE.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4024
-
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4372
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5de29f5ddf4a47fe6e10decd53ac2a9a6
SHA13ca47c7c7133b60a7e4e3df830a5162d002ecc97
SHA2563cf1b63431b4454047f85f655279a6716be52f64c16731395bc0247eaf0e2ebb
SHA51227cc3752a1edd90444954a0575950a5ba61376240efbd92effc96afb82940c805f6cf3d32db7902c8bb6d56707ae38391554c74ed419271025e99e10895ba78e
-
Filesize
40KB
MD5de29f5ddf4a47fe6e10decd53ac2a9a6
SHA13ca47c7c7133b60a7e4e3df830a5162d002ecc97
SHA2563cf1b63431b4454047f85f655279a6716be52f64c16731395bc0247eaf0e2ebb
SHA51227cc3752a1edd90444954a0575950a5ba61376240efbd92effc96afb82940c805f6cf3d32db7902c8bb6d56707ae38391554c74ed419271025e99e10895ba78e
-
Filesize
20KB
MD525574d57c2719a70abcf72ebc97242df
SHA1f2f993e954d992dffd7967de94843c087da4b307
SHA25638b17aeee6ff6c09c9b529b936b797c422d579319413fe11cd738d00fa034532
SHA5127c8c836ca2960b0e1fe7341f6300f654b85db025d3969073b98740173db57afd440af2f9b3a9b0b40b9ba74c7c4cdc9a29aaef65c5fd7747085a4f50e19ff611
-
Filesize
40KB
MD5a4c7ab6e0ab5c0b75a2257cd1d97080e
SHA1b6ea0fd1a5f2fc727473bf23411e06772bcdd18c
SHA256837806b6049c30f2a11e655ce6e6425c3340c2a4b128a731a9ee8a4f67126415
SHA51277b5acac4bb4cd03d16634d47ffe0b8e23382aaa36de265c99ac61bd83d4c105e77072ff6e72fb77b5708d1165f6267f8b94f24133c6a2ffdbd7e86691c8378a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
40KB
MD5de29f5ddf4a47fe6e10decd53ac2a9a6
SHA13ca47c7c7133b60a7e4e3df830a5162d002ecc97
SHA2563cf1b63431b4454047f85f655279a6716be52f64c16731395bc0247eaf0e2ebb
SHA51227cc3752a1edd90444954a0575950a5ba61376240efbd92effc96afb82940c805f6cf3d32db7902c8bb6d56707ae38391554c74ed419271025e99e10895ba78e
-
Filesize
40KB
MD5de29f5ddf4a47fe6e10decd53ac2a9a6
SHA13ca47c7c7133b60a7e4e3df830a5162d002ecc97
SHA2563cf1b63431b4454047f85f655279a6716be52f64c16731395bc0247eaf0e2ebb
SHA51227cc3752a1edd90444954a0575950a5ba61376240efbd92effc96afb82940c805f6cf3d32db7902c8bb6d56707ae38391554c74ed419271025e99e10895ba78e
-
Filesize
40KB
MD5de29f5ddf4a47fe6e10decd53ac2a9a6
SHA13ca47c7c7133b60a7e4e3df830a5162d002ecc97
SHA2563cf1b63431b4454047f85f655279a6716be52f64c16731395bc0247eaf0e2ebb
SHA51227cc3752a1edd90444954a0575950a5ba61376240efbd92effc96afb82940c805f6cf3d32db7902c8bb6d56707ae38391554c74ed419271025e99e10895ba78e
-
Filesize
40KB
MD5de29f5ddf4a47fe6e10decd53ac2a9a6
SHA13ca47c7c7133b60a7e4e3df830a5162d002ecc97
SHA2563cf1b63431b4454047f85f655279a6716be52f64c16731395bc0247eaf0e2ebb
SHA51227cc3752a1edd90444954a0575950a5ba61376240efbd92effc96afb82940c805f6cf3d32db7902c8bb6d56707ae38391554c74ed419271025e99e10895ba78e
-
Filesize
21B
MD59cceaa243c5d161e1ce41c7dad1903dd
SHA1e3da72675df53fffa781d4377d1d62116eafb35b
SHA256814649b436ea43dd2abb99693e06019d4079ee74d02a0395913add0ba92d0189
SHA512af9b75dc9a0b39d12d48bf6d40eb7d778eb9dd976302792271d8d4245a916027cf4e705d6cd7a5e6582ba94953346f291122f27d377b2c1a86e45f49e92efb5b
-
Filesize
21B
MD59cceaa243c5d161e1ce41c7dad1903dd
SHA1e3da72675df53fffa781d4377d1d62116eafb35b
SHA256814649b436ea43dd2abb99693e06019d4079ee74d02a0395913add0ba92d0189
SHA512af9b75dc9a0b39d12d48bf6d40eb7d778eb9dd976302792271d8d4245a916027cf4e705d6cd7a5e6582ba94953346f291122f27d377b2c1a86e45f49e92efb5b