Analysis
-
max time kernel
600s -
max time network
603s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2022 14:21
Static task
static1
General
-
Target
SCAN_WE2280.html
-
Size
1.4MB
-
MD5
54307d4ba06cdc14a22d67372a9b7fee
-
SHA1
70a338410cbd7335366922bea140b98d5f63ed9b
-
SHA256
c2b17bc002f4db968e771b34a64e74c5cb04ace0e7b16d5cf18382b5e2ad45d4
-
SHA512
9653e0413bc9b2663e6e45d64d217e30a9e9f082dc4f0ff35634163ec92829182bb8b6cbff6efe63a2a2e40916bcb31891b92bc7b0d54328ac602d4cafbd3dbc
-
SSDEEP
24576:4cEyMGTCmlO13OxIZGrntxnWZnj35DzcXbaY2YZTcwaw0Znj3Kp6:1B8eDnt5WZoOAa/ZW4
Malware Config
Extracted
qakbot
404.46
azd
1670585059
173.239.94.212:443
91.169.12.198:32100
74.66.134.24:443
66.191.69.18:995
182.75.189.42:995
78.69.251.252:2222
98.145.23.67:443
103.71.21.107:443
197.94.219.133:443
91.68.227.219:443
12.172.173.82:993
86.176.83.127:2222
64.121.161.102:443
41.98.21.114:443
92.154.17.149:2222
151.65.67.211:443
89.129.109.27:2222
76.11.14.249:443
69.119.123.159:2222
70.66.199.12:443
12.172.173.82:990
183.82.100.110:2222
83.114.60.6:2222
92.189.214.236:2222
70.115.104.126:995
190.18.236.175:443
121.122.99.223:995
72.53.103.56:443
91.165.188.74:50000
12.172.173.82:995
156.220.229.249:993
86.96.75.237:2222
85.152.152.46:443
181.118.183.44:443
76.80.180.154:995
81.248.77.37:2222
90.66.229.185:2222
86.130.9.250:2222
172.117.139.142:995
12.172.173.82:465
75.143.236.149:443
81.229.117.95:2222
81.111.108.123:443
50.68.204.71:995
124.122.55.68:443
139.5.239.14:443
37.56.111.49:995
46.10.198.106:443
85.61.165.153:2222
90.104.22.28:2222
88.126.94.4:50000
90.89.95.158:2222
83.213.201.104:993
73.223.248.31:443
47.41.154.250:443
2.99.47.198:2222
190.199.169.127:993
83.92.85.93:443
184.68.116.146:2222
73.161.176.218:443
150.107.231.59:2222
98.178.242.28:443
213.67.255.57:2222
174.104.184.149:443
108.6.249.139:443
84.35.26.14:995
149.126.159.106:443
184.68.116.146:3389
37.14.229.220:2222
24.206.27.39:443
199.83.165.233:443
84.215.202.22:443
71.247.10.63:995
50.68.204.71:443
86.169.19.140:2222
76.20.42.45:443
70.55.120.16:2222
69.133.162.35:443
12.172.173.82:21
72.200.109.104:443
50.68.204.71:993
2.83.12.243:443
184.176.154.83:995
176.177.136.35:443
92.207.132.174:2222
174.77.209.5:443
142.161.27.232:2222
86.159.48.25:2222
100.6.8.7:443
184.153.132.82:443
27.109.19.90:2078
94.105.123.53:443
198.2.51.242:993
70.120.228.205:443
75.158.15.211:443
181.164.194.223:443
184.68.116.146:61202
184.68.116.146:2078
86.225.214.138:2222
78.213.14.206:443
176.142.207.63:443
73.36.196.11:443
197.26.142.159:443
176.151.15.101:443
87.65.160.87:995
92.24.200.226:995
87.221.197.110:2222
77.86.98.236:443
162.248.14.107:443
84.113.121.103:443
137.186.193.226:3389
92.8.190.211:2222
201.208.139.250:2222
12.172.173.82:22
75.98.154.19:443
24.142.218.202:443
70.77.116.233:443
24.228.132.224:2222
92.145.203.167:2222
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
cmd.exedescription ioc process File opened (read-only) \??\E: cmd.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Discovers systems in the same network 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exenetstat.exepid process 4908 ipconfig.exe 2080 netstat.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = e8baa059b9aed801 iexplore.exe -
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05118c0060fd901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31002374" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{EA47CBB2-7AF9-11ED-B696-FE977829BE37} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3202017024" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff100100003c000000900300001c020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3202017024" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006bd5ea20e81dd54899e99f113cba33f100000000020000000000106600000001000020000000c0d74eb04bbdf9211bc3c6c3cc6369afa46ed2fd0a6d0d578d89cecedcb339fb000000000e8000000002000020000000e1dbed0c4893aac9ceff91980e6c6a735540d8e6f2e05ab37725d86abc708ba820000000695cfed33ac2cb06eff4f85bcec6803c4d483c71f7dd3695ab6035a86332762240000000c3a44781ba37ff6d4e288c3c29b96d2629e16c56b1ff4579c7a89938e89ab1219ca6321a50f088433946549616ea449da2d89d064bb6145ddceebd866e27a995 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31002374" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d52dc0060fd901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006bd5ea20e81dd54899e99f113cba33f1000000000200000000001066000000010000200000003dda88b78555c8c0d77c05ca027d6275c38e112e58afe4494a0d7b3be689773d000000000e8000000002000020000000754f8d88014bf0b3d218214c96be5c875bd70e7de983f6e3d85eb4cc83f29b47200000006d23474fcafb3bdb2210a2d3d983a05b0a3fe5333f735cffc0c3cdd3a5548d7340000000ba891528211c88d6da681b7faa69e0b8b87e7a54c8ab48a43998bae9db882c179c5a29128f609a4cf5bef8c9a8c36ba95c59159cb8f0c61ffb43e8972f9da006 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings firefox.exe -
NTFS ADS 1 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\attachment.zip:Zone.Identifier firefox.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exewermgr.exepid process 3980 rundll32.exe 3980 rundll32.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe 4540 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 3980 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
Processes:
firefox.exe7zG.exenetstat.exewhoami.exemsiexec.exedescription pid process Token: SeDebugPrivilege 2144 firefox.exe Token: SeDebugPrivilege 2144 firefox.exe Token: SeDebugPrivilege 2144 firefox.exe Token: SeRestorePrivilege 2896 7zG.exe Token: 35 2896 7zG.exe Token: SeSecurityPrivilege 2896 7zG.exe Token: SeSecurityPrivilege 2896 7zG.exe Token: SeDebugPrivilege 2080 netstat.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeDebugPrivilege 1888 whoami.exe Token: SeSecurityPrivilege 1380 msiexec.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
iexplore.exefirefox.exe7zG.exepid process 820 iexplore.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2896 7zG.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
iexplore.exeIEXPLORE.EXEfirefox.exepid process 820 iexplore.exe 820 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exefirefox.exefirefox.exedescription pid process target process PID 820 wrote to memory of 2988 820 iexplore.exe IEXPLORE.EXE PID 820 wrote to memory of 2988 820 iexplore.exe IEXPLORE.EXE PID 820 wrote to memory of 2988 820 iexplore.exe IEXPLORE.EXE PID 3776 wrote to memory of 2144 3776 firefox.exe firefox.exe PID 3776 wrote to memory of 2144 3776 firefox.exe firefox.exe PID 3776 wrote to memory of 2144 3776 firefox.exe firefox.exe PID 3776 wrote to memory of 2144 3776 firefox.exe firefox.exe PID 3776 wrote to memory of 2144 3776 firefox.exe firefox.exe PID 3776 wrote to memory of 2144 3776 firefox.exe firefox.exe PID 3776 wrote to memory of 2144 3776 firefox.exe firefox.exe PID 3776 wrote to memory of 2144 3776 firefox.exe firefox.exe PID 3776 wrote to memory of 2144 3776 firefox.exe firefox.exe PID 2144 wrote to memory of 3944 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 3944 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4424 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4080 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4080 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4080 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4080 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4080 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4080 2144 firefox.exe firefox.exe PID 2144 wrote to memory of 4080 2144 firefox.exe firefox.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SCAN_WE2280.html1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:820 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2144.0.443671055\1516324930" -parentBuildID 20200403170909 -prefsHandle 1724 -prefMapHandle 1716 -prefsLen 1 -prefMapSize 220117 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2144 "\\.\pipe\gecko-crash-server-pipe.2144" 1796 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2144.3.2118457887\509526952" -childID 1 -isForBrowser -prefsHandle 2244 -prefMapHandle 2248 -prefsLen 112 -prefMapSize 220117 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2144 "\\.\pipe\gecko-crash-server-pipe.2144" 2468 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2144.13.1116275841\11846297" -childID 2 -isForBrowser -prefsHandle 3668 -prefMapHandle 3648 -prefsLen 6894 -prefMapSize 220117 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2144 "\\.\pipe\gecko-crash-server-pipe.2144" 3652 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2144.20.552976513\897917464" -childID 3 -isForBrowser -prefsHandle 4768 -prefMapHandle 2992 -prefsLen 7822 -prefMapSize 220117 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2144 "\\.\pipe\gecko-crash-server-pipe.2144" 4740 tab3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\attachment\" -spe -an -ai#7zMap2979:82:7zEvent179311⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c YouNewRules\NewIssues.cmd A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 91⤵
- Enumerates connected drives
-
C:\Windows\system32\rundll32.exerundll32 /s newinvoice.patch,DrawThemeIcon2⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32 /s newinvoice.patch,DrawThemeIcon3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\net.exenet view5⤵
- Discovers systems in the same network
-
C:\Windows\SysWOW64\cmd.execmd /c set5⤵
-
C:\Windows\SysWOW64\arp.exearp -a5⤵
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- Gathers network information
-
C:\Windows\SysWOW64\nslookup.exenslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.WORKGROUP5⤵
-
C:\Windows\SysWOW64\net.exenet share5⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share6⤵
-
C:\Windows\SysWOW64\route.exeroute print5⤵
-
C:\Windows\SysWOW64\netstat.exenetstat -nao5⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\net.exenet localgroup5⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup6⤵
-
C:\Windows\SysWOW64\whoami.exewhoami /all5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Downloads\attachment.zipFilesize
425KB
MD5c90e12c5fd0061ee08dbfedc3d76c5a6
SHA11ab2ef0696d03ecb69c8d3e780607649b21bd01f
SHA256fda7ee3a400614bda8238a61d0f93c883329cf9b8912873b2c60d8f5c9deaea0
SHA5122c944fa035d7fe034ed82621aac90cad148e009e6db2b6e098531d3e66f8726a2ef50ef030a9bbfc89ebf78493497d94330d227926ca4cdef6ac74bb17ea43c9
-
memory/204-145-0x0000000000000000-mapping.dmp
-
memory/260-141-0x0000000000000000-mapping.dmp
-
memory/796-146-0x0000000000000000-mapping.dmp
-
memory/1032-151-0x0000000000000000-mapping.dmp
-
memory/1252-133-0x0000000000000000-mapping.dmp
-
memory/1492-150-0x0000000000000000-mapping.dmp
-
memory/1652-147-0x0000000000000000-mapping.dmp
-
memory/1888-152-0x0000000000000000-mapping.dmp
-
memory/2080-149-0x0000000000000000-mapping.dmp
-
memory/2112-148-0x0000000000000000-mapping.dmp
-
memory/2172-142-0x0000000000000000-mapping.dmp
-
memory/3980-138-0x00000000013F0000-0x000000000141A000-memory.dmpFilesize
168KB
-
memory/3980-136-0x00000000013F0000-0x000000000141A000-memory.dmpFilesize
168KB
-
memory/3980-135-0x00000000013C0000-0x00000000013EA000-memory.dmpFilesize
168KB
-
memory/3980-134-0x0000000000000000-mapping.dmp
-
memory/4072-143-0x0000000000000000-mapping.dmp
-
memory/4540-140-0x0000000000680000-0x00000000006AA000-memory.dmpFilesize
168KB
-
memory/4540-139-0x0000000000680000-0x00000000006AA000-memory.dmpFilesize
168KB
-
memory/4540-137-0x0000000000000000-mapping.dmp
-
memory/4908-144-0x0000000000000000-mapping.dmp