Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
188s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe
Resource
win10v2004-20220812-en
General
-
Target
dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe
-
Size
120KB
-
MD5
22484636bb984203fb95050170d9f3ac
-
SHA1
ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
-
SHA256
dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
-
SHA512
082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
SSDEEP
768:CIjaBsfuOQWPS/RGoqoBccBtBnJ2D28dikpxDUDn3zGgV1vY+aSn5zcFqVSXGx5q:1jLSWPS/JS1Wkuci38bppFellIE
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 1208 csrss.exe 1744 csrss.exe 1596 csrss.exe 1392 csrss.exe 948 csrss.exe 1476 csrss.exe -
Deletes itself 1 IoCs
pid Process 1096 cmd.exe -
Loads dropped DLL 10 IoCs
pid Process 1640 dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe 1640 dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe 1208 csrss.exe 1208 csrss.exe 1744 csrss.exe 1744 csrss.exe 1596 csrss.exe 1392 csrss.exe 948 csrss.exe 948 csrss.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File created C:\Windows\SysWOW64\n.ini dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File opened for modification C:\Windows\SysWOW64\wbem\csrss.exe dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e58b95a6b217d4c814a772a53361ec4000000000200000000001066000000010000200000009d00d3ddfd446aa6672c6e33950402fc4e7429ddb63e711c3df020fd0555e062000000000e800000000200002000000053766aa4978c93f9da3c7415800819609e8bce086a1bf656a3766b45b968d394200000009fee7a69d41b5756d0f06dc3a862bd1b04321ba7f7e2c16d8272a933cca4b0f94000000017c841e7d49ce73c209ea7e988354e6479c84a6446b2b4516f91ce6d7641cf5a97e9a58a01efc82b2f6fc91ec6e8570d092397a08f9e16d47fb836fa86856ed7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377149226" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB9BC751-75E0-11ED-8AB9-FAB5137186BE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A0966D1-75E0-11ED-8AB9-FAB5137186BE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0060a776ed09d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1640 dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe 1208 csrss.exe 1744 csrss.exe 1596 csrss.exe 1392 csrss.exe 948 csrss.exe 1476 csrss.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 944 iexplore.exe 1460 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 944 iexplore.exe 944 iexplore.exe 108 IEXPLORE.EXE 108 IEXPLORE.EXE 1460 iexplore.exe 1460 iexplore.exe 664 IEXPLORE.EXE 664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 944 wrote to memory of 108 944 iexplore.exe 30 PID 944 wrote to memory of 108 944 iexplore.exe 30 PID 944 wrote to memory of 108 944 iexplore.exe 30 PID 944 wrote to memory of 108 944 iexplore.exe 30 PID 1640 wrote to memory of 1208 1640 dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe 32 PID 1640 wrote to memory of 1208 1640 dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe 32 PID 1640 wrote to memory of 1208 1640 dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe 32 PID 1640 wrote to memory of 1208 1640 dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe 32 PID 1640 wrote to memory of 1096 1640 dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe 34 PID 1640 wrote to memory of 1096 1640 dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe 34 PID 1640 wrote to memory of 1096 1640 dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe 34 PID 1640 wrote to memory of 1096 1640 dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe 34 PID 1208 wrote to memory of 1744 1208 csrss.exe 35 PID 1208 wrote to memory of 1744 1208 csrss.exe 35 PID 1208 wrote to memory of 1744 1208 csrss.exe 35 PID 1208 wrote to memory of 1744 1208 csrss.exe 35 PID 1208 wrote to memory of 288 1208 csrss.exe 36 PID 1208 wrote to memory of 288 1208 csrss.exe 36 PID 1208 wrote to memory of 288 1208 csrss.exe 36 PID 1208 wrote to memory of 288 1208 csrss.exe 36 PID 1744 wrote to memory of 1596 1744 csrss.exe 38 PID 1744 wrote to memory of 1596 1744 csrss.exe 38 PID 1744 wrote to memory of 1596 1744 csrss.exe 38 PID 1744 wrote to memory of 1596 1744 csrss.exe 38 PID 1744 wrote to memory of 1020 1744 csrss.exe 39 PID 1744 wrote to memory of 1020 1744 csrss.exe 39 PID 1744 wrote to memory of 1020 1744 csrss.exe 39 PID 1744 wrote to memory of 1020 1744 csrss.exe 39 PID 1596 wrote to memory of 1392 1596 csrss.exe 41 PID 1596 wrote to memory of 1392 1596 csrss.exe 41 PID 1596 wrote to memory of 1392 1596 csrss.exe 41 PID 1596 wrote to memory of 1392 1596 csrss.exe 41 PID 1596 wrote to memory of 1932 1596 csrss.exe 42 PID 1596 wrote to memory of 1932 1596 csrss.exe 42 PID 1596 wrote to memory of 1932 1596 csrss.exe 42 PID 1596 wrote to memory of 1932 1596 csrss.exe 42 PID 1392 wrote to memory of 948 1392 csrss.exe 44 PID 1392 wrote to memory of 948 1392 csrss.exe 44 PID 1392 wrote to memory of 948 1392 csrss.exe 44 PID 1392 wrote to memory of 948 1392 csrss.exe 44 PID 1392 wrote to memory of 2004 1392 csrss.exe 45 PID 1392 wrote to memory of 2004 1392 csrss.exe 45 PID 1392 wrote to memory of 2004 1392 csrss.exe 45 PID 1392 wrote to memory of 2004 1392 csrss.exe 45 PID 948 wrote to memory of 1476 948 csrss.exe 49 PID 948 wrote to memory of 1476 948 csrss.exe 49 PID 948 wrote to memory of 1476 948 csrss.exe 49 PID 948 wrote to memory of 1476 948 csrss.exe 49 PID 948 wrote to memory of 976 948 csrss.exe 47 PID 948 wrote to memory of 976 948 csrss.exe 47 PID 948 wrote to memory of 976 948 csrss.exe 47 PID 948 wrote to memory of 976 948 csrss.exe 47 PID 1460 wrote to memory of 664 1460 iexplore.exe 51 PID 1460 wrote to memory of 664 1460 iexplore.exe 51 PID 1460 wrote to memory of 664 1460 iexplore.exe 51 PID 1460 wrote to memory of 664 1460 iexplore.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe"C:\Users\Admin\AppData\Local\Temp\dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat7⤵PID:976
-
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat6⤵PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat5⤵PID:1932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat4⤵PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat3⤵PID:288
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat2⤵
- Deletes itself
PID:1096
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:944 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:108
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296B
MD5172972831954e62532d8801b3aaf37b8
SHA10c631f2ff37fa3fdf4e44145e24b93643963d5df
SHA256e883de40edf93dbebac0fad5beaf39aa3208baa472133ac57e30bfa9bdb4e53e
SHA512b24c9e0f4c5077e56351e24047820dce093f8693e0aa43b855fad7e5a0a45d2ff08eb8c0cb86d48b348dc07fece0d07fb559cb2377a2ccc02a0d93260d4dc33a
-
Filesize
160B
MD5688de2c11d07cd1a0f0a22aaba2f38fe
SHA1c693ee247172adf49b1fe68c597358b0e0e2477e
SHA2568fd8370941a44a938f35789dae430fe4ee8bb1443f05baad544b48c261ae40d7
SHA512d1ecc15e5e1da8d9f35f95ed2b66763ed314e9b523dacd1eb42332b8f3d9c8256f46830c7b9c107ada42cc51d4dfe6ac9cd845b6fdbcf25677c5c50b138bde0a
-
Filesize
160B
MD5688de2c11d07cd1a0f0a22aaba2f38fe
SHA1c693ee247172adf49b1fe68c597358b0e0e2477e
SHA2568fd8370941a44a938f35789dae430fe4ee8bb1443f05baad544b48c261ae40d7
SHA512d1ecc15e5e1da8d9f35f95ed2b66763ed314e9b523dacd1eb42332b8f3d9c8256f46830c7b9c107ada42cc51d4dfe6ac9cd845b6fdbcf25677c5c50b138bde0a
-
Filesize
160B
MD5688de2c11d07cd1a0f0a22aaba2f38fe
SHA1c693ee247172adf49b1fe68c597358b0e0e2477e
SHA2568fd8370941a44a938f35789dae430fe4ee8bb1443f05baad544b48c261ae40d7
SHA512d1ecc15e5e1da8d9f35f95ed2b66763ed314e9b523dacd1eb42332b8f3d9c8256f46830c7b9c107ada42cc51d4dfe6ac9cd845b6fdbcf25677c5c50b138bde0a
-
Filesize
160B
MD5688de2c11d07cd1a0f0a22aaba2f38fe
SHA1c693ee247172adf49b1fe68c597358b0e0e2477e
SHA2568fd8370941a44a938f35789dae430fe4ee8bb1443f05baad544b48c261ae40d7
SHA512d1ecc15e5e1da8d9f35f95ed2b66763ed314e9b523dacd1eb42332b8f3d9c8256f46830c7b9c107ada42cc51d4dfe6ac9cd845b6fdbcf25677c5c50b138bde0a
-
Filesize
160B
MD5688de2c11d07cd1a0f0a22aaba2f38fe
SHA1c693ee247172adf49b1fe68c597358b0e0e2477e
SHA2568fd8370941a44a938f35789dae430fe4ee8bb1443f05baad544b48c261ae40d7
SHA512d1ecc15e5e1da8d9f35f95ed2b66763ed314e9b523dacd1eb42332b8f3d9c8256f46830c7b9c107ada42cc51d4dfe6ac9cd845b6fdbcf25677c5c50b138bde0a
-
Filesize
19B
MD5e415f059d8566da0d8d44108e0e915fe
SHA134dff1c646f465308c2804f0f046bbdcdfb53661
SHA256b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782
SHA512fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b
-
Filesize
19B
MD5e415f059d8566da0d8d44108e0e915fe
SHA134dff1c646f465308c2804f0f046bbdcdfb53661
SHA256b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782
SHA512fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b
-
Filesize
19B
MD5e415f059d8566da0d8d44108e0e915fe
SHA134dff1c646f465308c2804f0f046bbdcdfb53661
SHA256b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782
SHA512fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b
-
Filesize
19B
MD5e415f059d8566da0d8d44108e0e915fe
SHA134dff1c646f465308c2804f0f046bbdcdfb53661
SHA256b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782
SHA512fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b
-
Filesize
19B
MD5e415f059d8566da0d8d44108e0e915fe
SHA134dff1c646f465308c2804f0f046bbdcdfb53661
SHA256b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782
SHA512fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b
-
Filesize
19B
MD5e415f059d8566da0d8d44108e0e915fe
SHA134dff1c646f465308c2804f0f046bbdcdfb53661
SHA256b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782
SHA512fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b
-
Filesize
19B
MD5e415f059d8566da0d8d44108e0e915fe
SHA134dff1c646f465308c2804f0f046bbdcdfb53661
SHA256b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782
SHA512fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b
-
Filesize
19B
MD5e415f059d8566da0d8d44108e0e915fe
SHA134dff1c646f465308c2804f0f046bbdcdfb53661
SHA256b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782
SHA512fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b
-
Filesize
19B
MD5e415f059d8566da0d8d44108e0e915fe
SHA134dff1c646f465308c2804f0f046bbdcdfb53661
SHA256b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782
SHA512fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b
-
Filesize
19B
MD5e415f059d8566da0d8d44108e0e915fe
SHA134dff1c646f465308c2804f0f046bbdcdfb53661
SHA256b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782
SHA512fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b
-
Filesize
19B
MD5e415f059d8566da0d8d44108e0e915fe
SHA134dff1c646f465308c2804f0f046bbdcdfb53661
SHA256b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782
SHA512fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d
-
Filesize
120KB
MD522484636bb984203fb95050170d9f3ac
SHA1ac5ccf4cafdb3a1645f2bd505a5da565e3036efc
SHA256dd1e5223c19ff01848c0b7ee6eec4e7cdb5af674b4972ac3532e099c16786932
SHA512082dc2277660ccc1b35a305d55c3de1eba1107855b557338f923d308f0687b9c3412624fb7229527866747cc806269895e6b7a8f3243747a3672f1387b36977d