Analysis
-
max time kernel
277s -
max time network
399s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe
Resource
win10v2004-20220901-en
General
-
Target
6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe
-
Size
4.0MB
-
MD5
28323053f2d8e1210c54a2299887822d
-
SHA1
5866a328e6dd8b1dfac20c025b0e650e7fa7feaa
-
SHA256
6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d
-
SHA512
7845c3c58b03079b87f97c66c7b9d1f8a5e03ceb2b08e2d94e7f9f5d9f3a45d642bb09eb1968b90b8317bdf460c735c5d2e1e3c43978f878aa97391b5fea7966
-
SSDEEP
49152:7quiZsE10eob8fb4+QkaoDl5Yn84xUBRLf+jUv98aGVd7CP8iAHDef6AQfH1XRVH:7quekb9pal5YnVxqrvLuhCPFOeyzHBX
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1844 tlntsvrs.exe 1132 locatr.exe 1100 setup.exe -
Loads dropped DLL 16 IoCs
pid Process 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 1132 locatr.exe 1844 tlntsvrs.exe 1844 tlntsvrs.exe 1844 tlntsvrs.exe 1844 tlntsvrs.exe 1100 setup.exe 1100 setup.exe 1100 setup.exe 1100 setup.exe 1844 tlntsvrs.exe 1100 setup.exe 1132 locatr.exe 1844 tlntsvrs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run locatr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yvynscbiugjclrr = "C:\\Windows\\System32\\regsvr32.exe /s \"C:\\Users\\Admin\\AppData\\Local\\Temp\\nsvB002.tmp.dll\"" locatr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yvynscbiugjclrr = "C:\\Windows\\System32\\regsvr32.exe /s \"C:\\Windows\\system32\\yetwqrmnwlovo.dll\"" regsvr32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 6 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{4986D72A-3BAD-6504-D378-DD222FA820BC}\NoExplorer = "1" locatr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4986D72A-3BAD-6504-D378-DD222FA820BC} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{4986D72A-3BAD-6504-D378-DD222FA820BC}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{d53c08d6-2523-11d5-eadb-c4e8bccc5cd2} tlntsvrs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{d53c08d6-2523-11d5-eadb-c4e8bccc5cd2}\NoExplorer = "0" tlntsvrs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4986D72A-3BAD-6504-D378-DD222FA820BC} locatr.exe -
Maps connected drives based on registry 3 TTPs 9 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\Count tlntsvrs.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum locatr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\Count locatr.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\Count regsvr32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum tlntsvrs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 tlntsvrs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 locatr.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D setup.exe File created C:\Windows\SysWOW64\emdjblkgeobwvpkyg.exe locatr.exe File created C:\Windows\SysWOW64\f83e0225.dll tlntsvrs.exe File created C:\Windows\SysWOW64\ff29d574.exe tlntsvrs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 12 IoCs
resource yara_rule behavioral1/files/0x000a0000000122f5-55.dat nsis_installer_1 behavioral1/files/0x000a0000000122f5-55.dat nsis_installer_2 behavioral1/files/0x000a0000000122f5-57.dat nsis_installer_1 behavioral1/files/0x000a0000000122f5-57.dat nsis_installer_2 behavioral1/files/0x00090000000122fa-58.dat nsis_installer_1 behavioral1/files/0x00090000000122fa-58.dat nsis_installer_2 behavioral1/files/0x00090000000122fa-62.dat nsis_installer_1 behavioral1/files/0x00090000000122fa-62.dat nsis_installer_2 behavioral1/files/0x00090000000122fa-64.dat nsis_installer_1 behavioral1/files/0x00090000000122fa-64.dat nsis_installer_2 behavioral1/files/0x000a0000000122f5-66.dat nsis_installer_1 behavioral1/files/0x000a0000000122f5-66.dat nsis_installer_2 -
Modifies Internet Explorer Protected Mode 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" locatr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" tlntsvrs.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\NOPROTECTEDMODEBANNER = "1" tlntsvrs.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" locatr.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7BE3A961-7839-11ED-BC0B-663367632C22} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7AF2BD6D-2A37-5BE9-76FB-AF36A121D032}\AppName = "regsvr32.exe" locatr.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7AF2BD6D-2A37-5BE9-76FB-AF36A121D032}\AppPath = "C:\\Windows\\System32" locatr.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7AF2BD6D-2A37-5BE9-76FB-AF36A121D032} locatr.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main locatr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7AF2BD6D-2A37-5BE9-76FB-AF36A121D032}\Policy = "3" locatr.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main tlntsvrs.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Modifies registry class 17 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{d53c08d6-2523-11d5-eadb-c4e8bccc5cd2}\InProcServer32\ThreadingModel = "Apartment" tlntsvrs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{b33ee05e-0e9f-5672-5ac7-4fedac3dbf5c}\3140288821 = "óñ¶\u00a0òíòúïóö½«Ç¶÷¦" tlntsvrs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4986D72A-3BAD-6504-D378-DD222FA820BC}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4986D72A-3BAD-6504-D378-DD222FA820BC}\InProcServer32\ = "C:\\Windows\\SysWow64\\yetwqrmnwlovo.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{d53c08d6-2523-11d5-eadb-c4e8bccc5cd2} tlntsvrs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{d53c08d6-2523-11d5-eadb-c4e8bccc5cd2}\InProcServer32 tlntsvrs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4986D72A-3BAD-6504-D378-DD222FA820BC}\InProcServer32 locatr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4986D72A-3BAD-6504-D378-DD222FA820BC}\InProcServer32\ThreadingModel = "Apartment" locatr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4986D72A-3BAD-6504-D378-DD222FA820BC}\ = "revenuestreaming browser enhancer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{d53c08d6-2523-11d5-eadb-c4e8bccc5cd2}\InProcServer32\ = "C:\\Windows\\SysWow64\\f83e0225.dll" tlntsvrs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\\{b33ee05e-0e9f-5672-5ac7-4fedac3dbf5c} tlntsvrs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4986D72A-3BAD-6504-D378-DD222FA820BC} locatr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4986D72A-3BAD-6504-D378-DD222FA820BC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nsvB002.tmp.dll" locatr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{d53c08d6-2523-11d5-eadb-c4e8bccc5cd2}\ = "yourprofitclub" tlntsvrs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4986D72A-3BAD-6504-D378-DD222FA820BC}\ = "revenuestreaming browser enhancer" locatr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4986D72A-3BAD-6504-D378-DD222FA820BC} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4986D72A-3BAD-6504-D378-DD222FA820BC}\InProcServer32 regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1516 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1516 iexplore.exe 1516 iexplore.exe 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 300 wrote to memory of 1844 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 27 PID 300 wrote to memory of 1844 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 27 PID 300 wrote to memory of 1844 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 27 PID 300 wrote to memory of 1844 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 27 PID 300 wrote to memory of 1132 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 28 PID 300 wrote to memory of 1132 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 28 PID 300 wrote to memory of 1132 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 28 PID 300 wrote to memory of 1132 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 28 PID 300 wrote to memory of 1100 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 29 PID 300 wrote to memory of 1100 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 29 PID 300 wrote to memory of 1100 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 29 PID 300 wrote to memory of 1100 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 29 PID 300 wrote to memory of 1100 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 29 PID 300 wrote to memory of 1100 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 29 PID 300 wrote to memory of 1100 300 6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe 29 PID 1132 wrote to memory of 1704 1132 locatr.exe 33 PID 1132 wrote to memory of 1704 1132 locatr.exe 33 PID 1132 wrote to memory of 1704 1132 locatr.exe 33 PID 1132 wrote to memory of 1704 1132 locatr.exe 33 PID 1132 wrote to memory of 1704 1132 locatr.exe 33 PID 1132 wrote to memory of 1704 1132 locatr.exe 33 PID 1132 wrote to memory of 1704 1132 locatr.exe 33 PID 1516 wrote to memory of 1972 1516 iexplore.exe 35 PID 1516 wrote to memory of 1972 1516 iexplore.exe 35 PID 1516 wrote to memory of 1972 1516 iexplore.exe 35 PID 1516 wrote to memory of 1972 1516 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe"C:\Users\Admin\AppData\Local\Temp\6ddc84f9ff0ca8d5142c0949416c4ee950d88ee76081412914a396b7b6d09b5d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Users\Admin\AppData\Local\Temp\tlntsvrs.exe"C:\Users\Admin\AppData\Local\Temp\tlntsvrs.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Modifies registry class
PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\locatr.exe"C:\Users\Admin\AppData\Local\Temp\locatr.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\yetwqrmnwlovo.dll"3⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Modifies registry class
PID:1704
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1100
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1972
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
447KB
MD5298fe82c81d383b33d076541677f9288
SHA123ae44b912411cc6ac6c3b367b8e332fc61e51cd
SHA256eec154ec4752c943d5ebecc46e1d0f6841a8d3a6c54cb79771e2513164d83923
SHA512384241004f19b6e0afcdee3c1f098bd97472a8ccb15ac43fd969ceb8e7fba0f8a73aefe1baabce7c4fbf7fc86e052a7e328a109c69f41b1766e9873faf9237ed
-
Filesize
447KB
MD5298fe82c81d383b33d076541677f9288
SHA123ae44b912411cc6ac6c3b367b8e332fc61e51cd
SHA256eec154ec4752c943d5ebecc46e1d0f6841a8d3a6c54cb79771e2513164d83923
SHA512384241004f19b6e0afcdee3c1f098bd97472a8ccb15ac43fd969ceb8e7fba0f8a73aefe1baabce7c4fbf7fc86e052a7e328a109c69f41b1766e9873faf9237ed
-
Filesize
1.2MB
MD5d621b8ecbba354bb2b2482f16deed44c
SHA12e68951701910423be491efe361b72e9b06d8a92
SHA2560cb5b5e2ba40e66f6aff6b6338c26ff6cf27a1be81918abb83cf483433afbdfa
SHA5127e16e7cc42a0ea891e49ec0064328aec3f43b868e01b337dd303d037e7c2e4f04f145c325f06c90a0cf91b5bef42f09651b3bd4b12c8f6c4953ca28f5c32995c
-
Filesize
1.2MB
MD5d621b8ecbba354bb2b2482f16deed44c
SHA12e68951701910423be491efe361b72e9b06d8a92
SHA2560cb5b5e2ba40e66f6aff6b6338c26ff6cf27a1be81918abb83cf483433afbdfa
SHA5127e16e7cc42a0ea891e49ec0064328aec3f43b868e01b337dd303d037e7c2e4f04f145c325f06c90a0cf91b5bef42f09651b3bd4b12c8f6c4953ca28f5c32995c
-
Filesize
2.3MB
MD577ad929b9bcc55a53cdbd11742b011da
SHA1aecf6a064d5925b7712ed914f4a6b1d9d5784ce3
SHA2564856fcdf8ac3ff20fcf1b9007f7485a24c8760bb47de55a4c3d8c6137404602f
SHA51268adc517c6ffabfe1d98fb19a40937c64bbe1e41c8a8c5d12671a47f58879c7347797821e72175ed5bc04714461b6353dfb7f058fdd3dbfc30178779e9677721
-
Filesize
2.3MB
MD577ad929b9bcc55a53cdbd11742b011da
SHA1aecf6a064d5925b7712ed914f4a6b1d9d5784ce3
SHA2564856fcdf8ac3ff20fcf1b9007f7485a24c8760bb47de55a4c3d8c6137404602f
SHA51268adc517c6ffabfe1d98fb19a40937c64bbe1e41c8a8c5d12671a47f58879c7347797821e72175ed5bc04714461b6353dfb7f058fdd3dbfc30178779e9677721
-
Filesize
811KB
MD5597f447d5ac26a0d8a779656782c77bd
SHA13530b32d1a1a1fad60259ca719b781d3661af9c4
SHA2568db5d4800a661039c337f6b4f3c90b067dc00bc3f5cc5c3377e977e2af3a091a
SHA5124b5fb2b83d8960467d0d8984ab3d20681d2149c47287af2a0cb2e3e9d88d0e03a07d25fc9e0c1067ada1bd324be21096e55948ecd40bb70482285cd43353b6fa
-
Filesize
161KB
MD58c97d8bb1470c6498e47b12c5a03ce39
SHA115d233b22f1c3d756dca29bcc0021e6fb0b8cdf7
SHA256a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a
SHA5127ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f
-
Filesize
33KB
MD5517419cae37f6c78c80f9b7d0fbb8661
SHA1a9e419f3d9ef589522556e0920c84fe37a548873
SHA256bfe7e013cfb85e78b994d3ad34eca08286494a835cb85f1d7bced3df6fe93a11
SHA5125046565443cf463b6fa4d2d5868879efc6a9db969bf05e3c80725b99bd091ce062cfe66c5551eb1cc5f00a38f2cfcda1f36fb4d60d9ff816c4ec3107b5a0df40
-
Filesize
447KB
MD5298fe82c81d383b33d076541677f9288
SHA123ae44b912411cc6ac6c3b367b8e332fc61e51cd
SHA256eec154ec4752c943d5ebecc46e1d0f6841a8d3a6c54cb79771e2513164d83923
SHA512384241004f19b6e0afcdee3c1f098bd97472a8ccb15ac43fd969ceb8e7fba0f8a73aefe1baabce7c4fbf7fc86e052a7e328a109c69f41b1766e9873faf9237ed
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
66KB
MD5b140459077c7c39be4bef249c2f84535
SHA1c56498241c2ddafb01961596da16d08d1b11cd35
SHA2560598f7d83db44929b7170c1285457b52b4281185f63ced102e709bf065f10d67
SHA512fbcb19a951d96a216d73b6b3e005338bbb6e11332c6cc8c3f179ccd420b4db0e5682dc4245bd120dcb67bc70960eab368e74c68c7c165a485a12a7d0d8a00328
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
17KB
MD588ad3fd90fc52ac3ee0441a38400a384
SHA108bc9e1f5951b54126b5c3c769e3eaed42f3d10b
SHA256e58884695378cf02715373928bb8ade270baf03144369463f505c3b3808cbc42
SHA512359496f571e6fa2ec4c5ab5bd1d35d1330586f624228713ae55c65a69e07d8623022ef54337c22c3aab558a9b74d9977c8436f5fea4194899d9ef3ffd74e7dbb
-
Filesize
17KB
MD588ad3fd90fc52ac3ee0441a38400a384
SHA108bc9e1f5951b54126b5c3c769e3eaed42f3d10b
SHA256e58884695378cf02715373928bb8ade270baf03144369463f505c3b3808cbc42
SHA512359496f571e6fa2ec4c5ab5bd1d35d1330586f624228713ae55c65a69e07d8623022ef54337c22c3aab558a9b74d9977c8436f5fea4194899d9ef3ffd74e7dbb
-
Filesize
17KB
MD588ad3fd90fc52ac3ee0441a38400a384
SHA108bc9e1f5951b54126b5c3c769e3eaed42f3d10b
SHA256e58884695378cf02715373928bb8ade270baf03144369463f505c3b3808cbc42
SHA512359496f571e6fa2ec4c5ab5bd1d35d1330586f624228713ae55c65a69e07d8623022ef54337c22c3aab558a9b74d9977c8436f5fea4194899d9ef3ffd74e7dbb
-
Filesize
811KB
MD5597f447d5ac26a0d8a779656782c77bd
SHA13530b32d1a1a1fad60259ca719b781d3661af9c4
SHA2568db5d4800a661039c337f6b4f3c90b067dc00bc3f5cc5c3377e977e2af3a091a
SHA5124b5fb2b83d8960467d0d8984ab3d20681d2149c47287af2a0cb2e3e9d88d0e03a07d25fc9e0c1067ada1bd324be21096e55948ecd40bb70482285cd43353b6fa
-
Filesize
1.2MB
MD5d621b8ecbba354bb2b2482f16deed44c
SHA12e68951701910423be491efe361b72e9b06d8a92
SHA2560cb5b5e2ba40e66f6aff6b6338c26ff6cf27a1be81918abb83cf483433afbdfa
SHA5127e16e7cc42a0ea891e49ec0064328aec3f43b868e01b337dd303d037e7c2e4f04f145c325f06c90a0cf91b5bef42f09651b3bd4b12c8f6c4953ca28f5c32995c
-
Filesize
1.2MB
MD5d621b8ecbba354bb2b2482f16deed44c
SHA12e68951701910423be491efe361b72e9b06d8a92
SHA2560cb5b5e2ba40e66f6aff6b6338c26ff6cf27a1be81918abb83cf483433afbdfa
SHA5127e16e7cc42a0ea891e49ec0064328aec3f43b868e01b337dd303d037e7c2e4f04f145c325f06c90a0cf91b5bef42f09651b3bd4b12c8f6c4953ca28f5c32995c
-
Filesize
1.2MB
MD5d621b8ecbba354bb2b2482f16deed44c
SHA12e68951701910423be491efe361b72e9b06d8a92
SHA2560cb5b5e2ba40e66f6aff6b6338c26ff6cf27a1be81918abb83cf483433afbdfa
SHA5127e16e7cc42a0ea891e49ec0064328aec3f43b868e01b337dd303d037e7c2e4f04f145c325f06c90a0cf91b5bef42f09651b3bd4b12c8f6c4953ca28f5c32995c
-
Filesize
1.2MB
MD5d621b8ecbba354bb2b2482f16deed44c
SHA12e68951701910423be491efe361b72e9b06d8a92
SHA2560cb5b5e2ba40e66f6aff6b6338c26ff6cf27a1be81918abb83cf483433afbdfa
SHA5127e16e7cc42a0ea891e49ec0064328aec3f43b868e01b337dd303d037e7c2e4f04f145c325f06c90a0cf91b5bef42f09651b3bd4b12c8f6c4953ca28f5c32995c
-
Filesize
2.3MB
MD577ad929b9bcc55a53cdbd11742b011da
SHA1aecf6a064d5925b7712ed914f4a6b1d9d5784ce3
SHA2564856fcdf8ac3ff20fcf1b9007f7485a24c8760bb47de55a4c3d8c6137404602f
SHA51268adc517c6ffabfe1d98fb19a40937c64bbe1e41c8a8c5d12671a47f58879c7347797821e72175ed5bc04714461b6353dfb7f058fdd3dbfc30178779e9677721
-
Filesize
2.7MB
MD5d89021f7b780c263497a11b0006ea052
SHA1a52c7f225eb84d0bee5b668fefb0cf2da5a267a5
SHA256987c1ce53882b0bb778535290930afded0371c3ba83e31bc327265c0fb6b0234
SHA5127b60d3c7c4003e19c31607c2926aa0a7601e58a2731c0047057d5af24bc43ba66f6d2bf6c50b9c73b53905a05ab29ca85b790cfe9ef3cda7324322b8c732c8c4