Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe
Resource
win10v2004-20221111-en
General
-
Target
b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe
-
Size
132KB
-
MD5
f0454cccd27f6d6a43b5e0a5b7ae638f
-
SHA1
f164e77e6c802c36f09c7c6a2f43a6a6a5c97782
-
SHA256
b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d
-
SHA512
8ee3d30054b6e09452d33f3205c384964140d75ccb77b4490ecb4a02b0408ee5a6ebeee24fa9a12feb9658112807df9d432e911d40c287c132875f90b4339aea
-
SSDEEP
768:p/raHM782f9rvs2Zg5nicskQzTGfxgzh3emu4v/eB4z7VP7LdGSu2HyTAzfMgTA1:p/roM7ZJfUQWgY54v
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" msng.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe -
Executes dropped EXE 1 IoCs
pid Process 1780 msng.exe -
Loads dropped DLL 2 IoCs
pid Process 1508 b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe 1508 b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run msng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" msng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: msng.exe File opened (read-only) \??\b: msng.exe File opened (read-only) \??\e: msng.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundII32.exe msng.exe File opened for modification C:\Windows\SysWOW64\rundII32.exe msng.exe File created C:\Windows\SysWOW64\rundll32.exe msng.exe File created C:\Windows\SysWOW64\msng.exe b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe File opened for modification C:\Windows\SysWOW64\msng.exe b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe File created C:\Windows\SysWOW64\rundII32.exe b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe File created C:\Windows\SysWOW64\rundll32.exe b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377117581" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d5bfada309d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA4FE051-7596-11ED-AF38-FE72C9E2D9C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ebb024084e81b84bbad3cd577fab9fa70000000002000000000010660000000100002000000030b21c590b4923e6b8ee3b890006512f220f0f87e245ee33bc2a57c223cc1a56000000000e800000000200002000000044734f1f5b6e6a3b6578aba1558fb566f80347e355a302a6d060f5c6a31fb7a820000000ce6910a6ffc9d70590efd2cb20ec577d9309f8909fd854342a71932f619f5137400000009f440a43a00074997f87de1a59e760ba6f0912e202446826b38d64a85faecbfd33a4e628ce31addcc593c88e4d0ef7fc251dc599cd6fad4c360b939476438ff7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = c60031000000000086553c9610204231374246397e310000ae0008000400efbe86553c9686553c962a0000009e42010000000a0000000000000000000000000000006200310037006200660039006100320035003300370033003100380037003200650064006400650030003000320030003100330038003700360033003800620066006300630066003900640062003800370033003200660063003400390031003400630030006100390034003100350032003000650064003400370038006400000018000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000000c55e270122041707044617461003c0008000400efbe0c55e2700c55e2702a000000ed0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000000c55e2701100557365727300600008000400efbeee3a851a0c55e2702a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000000c55137e100041646d696e00380008000400efbe0c55e2700c55137e2a00000033000000000003000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c003100000000000c55437310204c6f63616c00380008000400efbe0c55e2700c5543732a000000000200000000020000000000000000000000000000004c006f00630061006c00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a0031000000000086553c96102054656d700000360008000400efbe0c55e27086553c962a00000001020000000002000000000000000000000000000000540065006d007000000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe 1780 msng.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1780 msng.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 816 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1508 b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe 1780 msng.exe 816 iexplore.exe 816 iexplore.exe 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1076 1508 b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe 26 PID 1508 wrote to memory of 1076 1508 b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe 26 PID 1508 wrote to memory of 1076 1508 b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe 26 PID 1508 wrote to memory of 1076 1508 b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe 26 PID 1508 wrote to memory of 1780 1508 b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe 27 PID 1508 wrote to memory of 1780 1508 b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe 27 PID 1508 wrote to memory of 1780 1508 b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe 27 PID 1508 wrote to memory of 1780 1508 b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe 27 PID 1780 wrote to memory of 2036 1780 msng.exe 29 PID 1780 wrote to memory of 2036 1780 msng.exe 29 PID 1780 wrote to memory of 2036 1780 msng.exe 29 PID 1780 wrote to memory of 2036 1780 msng.exe 29 PID 584 wrote to memory of 816 584 explorer.exe 31 PID 584 wrote to memory of 816 584 explorer.exe 31 PID 584 wrote to memory of 816 584 explorer.exe 31 PID 816 wrote to memory of 1756 816 iexplore.exe 33 PID 816 wrote to memory of 1756 816 iexplore.exe 33 PID 816 wrote to memory of 1756 816 iexplore.exe 33 PID 816 wrote to memory of 1756 816 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe"C:\Users\Admin\AppData\Local\Temp\b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d2⤵PID:1076
-
-
C:\Windows\SysWOW64\msng.exe"C:\Windows\system32\msng.exe" fuckystart2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.OpenClose.ir3⤵PID:2036
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:928
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.openclose.ir/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:816 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
606B
MD54a537c13cbb1f8f89ce6417d24d0e79e
SHA1a42005d35a877681c4cf9d9945f17a8e79d11264
SHA25603988f07ac2b2447c8a98d1a047ab84bd71435678af438615abc730448d2194c
SHA512a775772962639c69216289c24ae8697eff689d8f285d278472dc871d0d5aa61e69945b07165ceeee0a736117c66c1f78bd35980b998544a2cd9e7ee3c5f37c8b
-
Filesize
132KB
MD5f0454cccd27f6d6a43b5e0a5b7ae638f
SHA1f164e77e6c802c36f09c7c6a2f43a6a6a5c97782
SHA256b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d
SHA5128ee3d30054b6e09452d33f3205c384964140d75ccb77b4490ecb4a02b0408ee5a6ebeee24fa9a12feb9658112807df9d432e911d40c287c132875f90b4339aea
-
Filesize
132KB
MD5f0454cccd27f6d6a43b5e0a5b7ae638f
SHA1f164e77e6c802c36f09c7c6a2f43a6a6a5c97782
SHA256b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d
SHA5128ee3d30054b6e09452d33f3205c384964140d75ccb77b4490ecb4a02b0408ee5a6ebeee24fa9a12feb9658112807df9d432e911d40c287c132875f90b4339aea
-
Filesize
100B
MD5ad05b13ea90501fe86f7dfbbbc92946d
SHA147e1c3e315c4e9b4588eef150554819cafd8b6c7
SHA25699250517adaab4629094bf3b5ee8bb33382ba15ad3295663ed545576884fcc2a
SHA512582e2bc2ce17fd7cf1f8fc31f48fc864b8dbafc8178b8524fdc0f3db4c1019394667a5205c4fd1d56bccbcb66264c084a572e226ae4ea5a0e752c321e934e532
-
Filesize
132KB
MD5f0454cccd27f6d6a43b5e0a5b7ae638f
SHA1f164e77e6c802c36f09c7c6a2f43a6a6a5c97782
SHA256b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d
SHA5128ee3d30054b6e09452d33f3205c384964140d75ccb77b4490ecb4a02b0408ee5a6ebeee24fa9a12feb9658112807df9d432e911d40c287c132875f90b4339aea
-
Filesize
132KB
MD5f0454cccd27f6d6a43b5e0a5b7ae638f
SHA1f164e77e6c802c36f09c7c6a2f43a6a6a5c97782
SHA256b17bf9a253731872edde00201387638bfccf9db8732fc4914c0a941520ed478d
SHA5128ee3d30054b6e09452d33f3205c384964140d75ccb77b4490ecb4a02b0408ee5a6ebeee24fa9a12feb9658112807df9d432e911d40c287c132875f90b4339aea