Resubmissions
16/05/2023, 23:26
230516-3e3rlscb3s 116/05/2023, 23:26
230516-3ethyada47 116/05/2023, 23:18
230516-3aeh8ada35 516/05/2023, 23:15
230516-28vgnada28 1016/05/2023, 23:13
230516-27wnbsca81 116/05/2023, 23:10
230516-257mtaca8x 6Analysis
-
max time kernel
144s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2023, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
bee movie script
Resource
win7-20230220-en
General
-
Target
bee movie script
-
Size
48KB
-
MD5
82efebf8c7b591240c3fc56307a121a2
-
SHA1
93ae3d6436613af8a6957db81e1701fbc50de7a8
-
SHA256
27052339536a08543f16b5fa0deb4ce554a70b697b27ee0143302d7e6ec4fe2f
-
SHA512
26a776d2c6bbf6c401c0970a04ef7ec83ca3931c2a74e6b19d0d8bb1e84276b5a1c37d0fe00bf0022568e9ad311adffced95dbc50b0c0b0aa6e16a9bde891066
-
SSDEEP
1536:ijaPW66ps+TjnDPZJ8Gr6JFDhCrXWqfuz0m/+7:imPEs+TjnVJ8hDh6X/2zn+7
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Explorer.EXE -
Modifies Installed Components in the registry 2 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Version = "11,0,9600,0" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Locale = "*" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Active Setup\Installed Components\{2C7339CF-2B09-4501-B3F3-F3508C9228ED} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Active Setup\Installed Components\{2C7339CF-2B09-4501-B3F3-F3508C9228ED}\Version = "1,1,1,9" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Active Setup\Installed Components\{2C7339CF-2B09-4501-B3F3-F3508C9228ED}\Locale = "EN" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Active Setup\Installed Components Explorer.EXE -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Triage\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini regsvr32.exe -
Drops desktop.ini file(s) 27 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-21-3499517378-2376672570-1134980332-1001\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\Contacts\desktop.ini WinMail.exe File opened for modification C:\Users\Triage\Documents\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini ie4uinit.exe File opened for modification C:\Users\Triage\Contacts\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Music\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini ie4uinit.exe File opened for modification C:\Users\Triage\Desktop\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\Favorites\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\Music\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\Saved Games\desktop.ini regsvr32.exe File created C:\Users\Triage\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini WinMail.exe File opened for modification C:\Users\Public\Documents\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\Searches\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Videos\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\Favorites\Links\desktop.ini ie4uinit.exe File opened for modification C:\Users\Triage\Links\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\Videos\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Pictures\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\Pictures\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini regsvr32.exe File opened for modification C:\Users\Triage\Downloads\desktop.ini regsvr32.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\F: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Control Panel\Desktop\Wallpaper = "C:\\Users\\Triage\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\TranscodedWallpaper.jpg" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Control Panel\Desktop\Wallpaper = "C:\\Users\\Triage\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\TranscodedWallpaper.jpg" regsvr32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\Signup\TMP4352$.TMP ie4uinit.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log ie4uinit.exe File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Explorer.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Explorer.EXE -
Enumerates system info in registry 2 TTPs 32 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Identifier csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Component Information csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 csrss.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Component Information csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\1\KeyboardController csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Configuration Data csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Configuration Data csrss.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Identifier csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Component Information csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Configuration Data csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Configuration Data csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Configuration Data csrss.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" ie4uinit.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\24\IEPropFontName = "MS PGothic" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\26 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\29\IEPropFontName = "Plantagenet Cherokee" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Main\Show_ToolBar = "yes" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\SOFTWARE\Microsoft\Internet Explorer\Security ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Settings\Background Color = "192,192,192" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\10\IEPropFontName = "Mangal" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\15 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\29\IEFixedFontName = "Plantagenet Cherokee" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\32\IEPropFontName = "Segoe UI Symbol" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\33\IEFixedFontName = "Segoe UI Symbol" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\37 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Main\Show_FullURL = "no" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\IETld ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\8 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\11\IEFixedFontName = "Shonar Bangla" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\39\IEPropFontName = "Mongolian Baiti" ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Main\XMLHTTP = "1" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Main\WindowsSearch ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\4 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\13\IEFixedFontName = "Shruti" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\24\IEFixedFontName = "MS Gothic" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\38\IEPropFontName = "MV Boli" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\7 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\16\IEFixedFontName = "Vani" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\28\IEPropFontName = "Euphemia" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\SOFTWARE\Microsoft\Internet Explorer\Main ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Main\NoUpdateCheck = "1" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\IntelliForms ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\LowRegistry ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\7\IEPropFontName = "Sylfaen" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\13 ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\14 ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\28 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\31\IEPropFontName = "Segoe UI Symbol" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\14\IEFixedFontName = "Kalinga" ie4uinit.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Document Windows\x = 00000080 ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\24 ie4uinit.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Main\Do404Search = 01000000 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\14\IEPropFontName = "Kalinga" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\19\IEFixedFontName = "Cordia New" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\27\IEFixedFontName = "Nyala" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\28\IEFixedFontName = "Euphemia" ie4uinit.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Document Windows\height = 00000000 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Security\Safety Warning Level = "Query" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\27\IEPropFontName = "Nyala" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\35\IEPropFontName = "Estrangelo Edessa" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\12\IEPropFontName = "Raavi" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\15\IEFixedFontName = "Vijaya" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\SOFTWARE\Microsoft\Internet Explorer\Services ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\9\IEFixedFontName = "Courier New" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Main\Search Page = "http://go.microsoft.com/fwlink/?LinkId=54896" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Settings\Anchor Color Visited = "128,0,128" ie4uinit.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\LinksBar\LinksFolderMigrate = 200364675d88d901 ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Document Windows ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Desktop\General regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\BrowserEmulation ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\18\IEFixedFontName = "Kartika" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\30\IEFixedFontName = "Microsoft Yi Baiti" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\International\Scripts\39 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Main\Local Page = "C:\\Windows\\system32\\blank.htm" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\SOFTWARE\Microsoft\Internet Explorer\Document Windows ie4uinit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1001\Software\Microsoft\Internet Explorer\Main\Start Page = "http://go.microsoft.com/fwlink/p/?LinkId=255141" ie4uinit.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\DllName = "%SystemRoot%\\resources\\themes\\Aero\\Aero.msstyles" winlogon.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\MuiCached\MachinePreferredUILanguages = 65006e002d00550053000000 winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LoadedBefore = "1" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LastUserLangID = "1033" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\ColorName = "NormalColor" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\SizeName = "NormalSize" winlogon.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\ThemeManager winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\ThemeActive = "1" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LastLoadedDPI = "96" winlogon.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wax unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wms\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.m2t\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mp4v unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wmx\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.aifc\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell\Enqueue unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/3gpp2 unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mp2 unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ts\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Enqueue\command unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-mplayer2 unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/x-mpegurl unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\video\shell\Play unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell\Play\command unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NetworkExplorerPlugins\urn:schemas-upnp-org:device:MediaRenderer:1\ShellEx\ContextMenuHandlers\{A45AEC2B-549E-405F-AF3E-C6B03C4FDFBF} unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell\Play unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\midi/mid unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dvr-ms\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.m1v unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mp2v\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\image\shellex\ContextMenuHandlers\PlayTo unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wm unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wma unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Video\shellex\ContextMenuHandlers\PlayTo unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wmv\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Enqueue\command unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wmz unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shell\Play unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/x-msvideo unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rmi unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tts unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AudioCD unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Video\shellex unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Audio\shell\Play\command unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMP.DVD\shell\play\Command unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ADT\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.m1v\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mov\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wmd\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/x-mp3 unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.WMS\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\video\shell\Play\command unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Enqueue unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/mp4 unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Image\shellex unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Video\shell\Play unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.m4v unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wm\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMP.DVD\Shell unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.M2T\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mpe\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MMS\shell\open unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/mpegurl unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/x-ms-wm unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/x-mid unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.3gpp\OpenWithProgIds unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\image\ShellEx\ContextMenuHandlers unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Video\shellex\ContextMenuHandlers unregmp2.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeShutdownPrivilege 540 LogonUI.exe Token: SeSecurityPrivilege 1620 winlogon.exe Token: SeBackupPrivilege 1620 winlogon.exe Token: SeSecurityPrivilege 1620 winlogon.exe Token: SeTcbPrivilege 1620 winlogon.exe Token: SeManageVolumePrivilege 1408 WinMail.exe Token: SeRestorePrivilege 1700 ie4uinit.exe Token: SeRestorePrivilege 1700 ie4uinit.exe Token: SeRestorePrivilege 1700 ie4uinit.exe Token: SeRestorePrivilege 1700 ie4uinit.exe Token: SeRestorePrivilege 1700 ie4uinit.exe Token: SeRestorePrivilege 1700 ie4uinit.exe Token: SeRestorePrivilege 1700 ie4uinit.exe Token: SeRestorePrivilege 1472 rundll32.exe Token: SeRestorePrivilege 1472 rundll32.exe Token: SeRestorePrivilege 1472 rundll32.exe Token: SeRestorePrivilege 1472 rundll32.exe Token: SeRestorePrivilege 1472 rundll32.exe Token: SeRestorePrivilege 1472 rundll32.exe Token: SeRestorePrivilege 1472 rundll32.exe Token: SeManageVolumePrivilege 1936 WinMail.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1408 WinMail.exe 1936 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 564 wrote to memory of 576 564 cmd.exe 31 PID 564 wrote to memory of 576 564 cmd.exe 31 PID 564 wrote to memory of 576 564 cmd.exe 31 PID 576 wrote to memory of 268 576 net.exe 32 PID 576 wrote to memory of 268 576 net.exe 32 PID 576 wrote to memory of 268 576 net.exe 32 PID 1648 wrote to memory of 540 1648 csrss.exe 36 PID 1648 wrote to memory of 540 1648 csrss.exe 36 PID 1620 wrote to memory of 540 1620 winlogon.exe 36 PID 1620 wrote to memory of 540 1620 winlogon.exe 36 PID 1620 wrote to memory of 540 1620 winlogon.exe 36 PID 1648 wrote to memory of 540 1648 csrss.exe 36 PID 1648 wrote to memory of 540 1648 csrss.exe 36 PID 1648 wrote to memory of 540 1648 csrss.exe 36 PID 1648 wrote to memory of 540 1648 csrss.exe 36 PID 1648 wrote to memory of 540 1648 csrss.exe 36 PID 1648 wrote to memory of 540 1648 csrss.exe 36 PID 1648 wrote to memory of 540 1648 csrss.exe 36 PID 1648 wrote to memory of 540 1648 csrss.exe 36 PID 1648 wrote to memory of 672 1648 csrss.exe 39 PID 1648 wrote to memory of 672 1648 csrss.exe 39 PID 1620 wrote to memory of 672 1620 winlogon.exe 39 PID 1620 wrote to memory of 672 1620 winlogon.exe 39 PID 1620 wrote to memory of 672 1620 winlogon.exe 39 PID 1648 wrote to memory of 2024 1648 csrss.exe 41 PID 1648 wrote to memory of 2024 1648 csrss.exe 41 PID 672 wrote to memory of 2024 672 userinit.exe 41 PID 672 wrote to memory of 2024 672 userinit.exe 41 PID 672 wrote to memory of 2024 672 userinit.exe 41 PID 1648 wrote to memory of 2024 1648 csrss.exe 41 PID 1648 wrote to memory of 2024 1648 csrss.exe 41 PID 1648 wrote to memory of 2024 1648 csrss.exe 41 PID 1648 wrote to memory of 2024 1648 csrss.exe 41 PID 1648 wrote to memory of 2024 1648 csrss.exe 41 PID 1648 wrote to memory of 2024 1648 csrss.exe 41 PID 1648 wrote to memory of 2024 1648 csrss.exe 41 PID 1648 wrote to memory of 1708 1648 csrss.exe 42 PID 1648 wrote to memory of 1708 1648 csrss.exe 42 PID 2024 wrote to memory of 1708 2024 Explorer.EXE 42 PID 2024 wrote to memory of 1708 2024 Explorer.EXE 42 PID 2024 wrote to memory of 1708 2024 Explorer.EXE 42 PID 2024 wrote to memory of 1708 2024 Explorer.EXE 42 PID 2024 wrote to memory of 1708 2024 Explorer.EXE 42 PID 1648 wrote to memory of 1708 1648 csrss.exe 42 PID 1648 wrote to memory of 1708 1648 csrss.exe 42 PID 1648 wrote to memory of 1708 1648 csrss.exe 42 PID 1648 wrote to memory of 1708 1648 csrss.exe 42 PID 1648 wrote to memory of 1600 1648 csrss.exe 43 PID 1648 wrote to memory of 1708 1648 csrss.exe 42 PID 1648 wrote to memory of 1708 1648 csrss.exe 42 PID 1648 wrote to memory of 1476 1648 csrss.exe 44 PID 1648 wrote to memory of 1476 1648 csrss.exe 44 PID 1648 wrote to memory of 1476 1648 csrss.exe 44 PID 1648 wrote to memory of 1476 1648 csrss.exe 44 PID 2024 wrote to memory of 1476 2024 Explorer.EXE 44 PID 2024 wrote to memory of 1476 2024 Explorer.EXE 44 PID 2024 wrote to memory of 1476 2024 Explorer.EXE 44 PID 2024 wrote to memory of 1476 2024 Explorer.EXE 44 PID 1648 wrote to memory of 1476 1648 csrss.exe 44 PID 1648 wrote to memory of 1476 1648 csrss.exe 44 PID 1648 wrote to memory of 1476 1648 csrss.exe 44 PID 1648 wrote to memory of 1476 1648 csrss.exe 44 PID 1648 wrote to memory of 1476 1648 csrss.exe 44 PID 1648 wrote to memory of 1408 1648 csrss.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee movie script"1⤵PID:1308
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\system32\net.exenet user /add Triage2⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user /add Triage3⤵PID:268
-
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1648
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x02⤵
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
C:\Windows\system32\userinit.exeC:\Windows\system32\userinit.exe2⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE3⤵
- Modifies visibility of file extensions in Explorer
- Modifies Installed Components in the registry
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /n /i:/UserInstall C:\Windows\system32\themeui.dll4⤵
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Modifies Internet Explorer settings
PID:1708
-
-
C:\Program Files (x86)\Windows Mail\WinMail.exe"C:\Program Files (x86)\Windows Mail\WinMail.exe" OCInstallUserConfigOE4⤵
- Drops desktop.ini file(s)
PID:1476 -
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE5⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1408
-
-
-
C:\Windows\System32\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /FirstLogon /Shortcuts /RegBrowsers /ResetMUI4⤵
- Enumerates connected drives
- Modifies registry class
PID:1064
-
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /n /i:U shell32.dll4⤵
- Drops startup file
- Drops desktop.ini file(s)
PID:1052
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" C:\Windows\SysWOW64\mscories.dll,Install4⤵PID:1936
-
-
C:\Windows\System32\ie4uinit.exe"C:\Windows\System32\ie4uinit.exe" -UserConfig4⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\System32\ie4uinit.exeC:\Windows\System32\ie4uinit.exe -ClearIconCache5⤵PID:1720
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32 advpack.dll,LaunchINFSectionEx C:\Windows\system32\ieuinit.inf,Install,,365⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32 C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m5⤵PID:268
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m /06⤵PID:1580
-
-
-
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /n /i:/UserInstall C:\Windows\system32\themeui.dll4⤵
- Sets desktop wallpaper using registry
PID:1472
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" OCInstallUserConfigOE4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1936
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1148
-
C:\Windows\system32\rundll32.exerundll32.exe uxtheme.dll,#64 C:\Windows\resources\Themes\Aero\Aero.msstyles?NormalColor?NormalSize1⤵PID:1600
-
C:\Windows\system32\rundll32.exerundll32.exe uxtheme.dll,#64 C:\Windows\resources\Themes\Aero\Aero.msstyles?NormalColor?NormalSize1⤵PID:1604
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5ae909991145dd1e2ebb871cb7deeb20f
SHA1d883e9cdea6997b2bdfdceb975627a3481fa9914
SHA2564bba6597a1335e23d4a525533d6e1ca9df27e1d626c1d6505cb648ccc1cd08e2
SHA5129306b16aceec873c7c4fb26f51cb6b6c99975f942d8b06a88d0fa28aafc1c1d034804d515a605f746df85a8c33d67067701f77d3e3c75dbfe9fd5933dbf7f5b5
-
Filesize
8KB
MD5dbd23c69419216bbc90384321511aa1c
SHA110b442f7b0e5de8d9886fd88da19b5d5f9daa1ab
SHA2565bd4280c05844a29cbb3e71ffafa9707bcf03ed8d978c3c6d7e194bda6ffe2a0
SHA5126553d2f45087d7de71462b11d9414c6fbcc61fcb06eee5160bf3acf6f0905717210d7b0136b5a97c39c599898b1587d2e4d1cf748b46156b47047ce857e52fab
-
Filesize
2.0MB
MD54d551f57654463611b845b95dc1a162c
SHA12ff2f21864cfec7e2f9e76785758070c700c5974
SHA25641ee8e613fc89666e3fcb1919e1c3177ac2c150732076ad6184d1a7a2e8e8b96
SHA512daa99bf1daae790a8c2077045fcb47a5e749bb871ec399fd0f5c4cd160921af92c06896ffca050942520e8cd0a1ca2f961330bc41df0ab57c4264c892818cad4
-
Filesize
2.0MB
MD5632856b05a8c319f7fcd7ce0f3c9bc79
SHA122cb7e1febda1caa132e6daf52f0ebb7d69dea18
SHA25634003c002de910e9f43e3cdc9153d2118b426cef91f5235c8bd68e327d622a1b
SHA512ddbf979a7c9b9f526ff7e69cb992c15d44eea7233cf86d31fce2cb3e32b558eb9f539f11f6c569989cbca8c63cfe45696d6da1a162fab6de6690855bc72f9fe0
-
Filesize
2.0MB
MD5632856b05a8c319f7fcd7ce0f3c9bc79
SHA122cb7e1febda1caa132e6daf52f0ebb7d69dea18
SHA25634003c002de910e9f43e3cdc9153d2118b426cef91f5235c8bd68e327d622a1b
SHA512ddbf979a7c9b9f526ff7e69cb992c15d44eea7233cf86d31fce2cb3e32b558eb9f539f11f6c569989cbca8c63cfe45696d6da1a162fab6de6690855bc72f9fe0
-
Filesize
24KB
MD53006752a2bcfeda0f75d551ea656b2ef
SHA1b7198fc772be6d6261ed4e76aca3998e8f7a7bdb
SHA256dfd64231860c732dced3dc78627a7844a08d5d3e4cd253fd81186bae33cc368a
SHA5123fcfa7c8f46220852dc7efef5b29caba86825d0461a35559f26dbb2540c487b92059713f42fe1082a00a711d83216db012835673e1c54120ffa079e154950854
-
Filesize
3KB
MD5a828b8c496779bdb61fce06ba0d57c39
SHA12c0c1f9bc98e29bf7df8117be2acaf9fd6640eda
SHA256c952f470a428d5d61ed52fb05c0143258687081e1ad13cfe6ff58037b375364d
SHA512effc846e66548bd914ad530e9074afbd104fea885237e9b0f0f566bd535996041ec49fb97f4c326d12d9c896390b0e76c019b3ace5ffeb29d71d1b48e83cbaea
-
Filesize
206B
MD5c2858b664c882dcce6042c40041f6108
SHA152eeaa0c7b9d17a8f56217f2ac912ba8fdc5041a
SHA256b4a6fb97b5e3f87bcd9fae49a9174e3f5b230a37767d7a70bf33d151702eff91
SHA51251522e67f426ba96495be5e7f8346e6bb32233a59810df2a3712ecd754a2b5d54d0049c8ea374bd4d20629500c3f68f40e4845f6bb236d6cca7d00da589b2260
-
Filesize
3KB
MD50dc5b4fa968f5808a62513d21d1b4c31
SHA1eac8352487ac8a81e5b9231b821d72c84f01ee7a
SHA256ac709b881623fe7d7dbc9f1eada07e36b8b2314d14f2f4a6f771c131749b63f1
SHA5125e84c3bff4dc5b2a8adcca4a08b01d3f7ea0d22aad02e44a5c9ca40b97acae114b68b03b2bb9110a878930d172f0b452c96920994274f63be27d2094f30cc62f
-
Filesize
3KB
MD5fee478726b78d8f24cd83c14affe5fa4
SHA10a67fa381b58172768a6294d1220640ec25cb524
SHA256c1739dd07d8e7e83005cb6acb97a272b43cb32c562bfe2f8c159c19733db6fcd
SHA512db9aaca708ef03b9b921fdf83ca200ae5985ca487460df73e38d783b506b7e8cc37dcc80c18dc92cf7fb375c86acaaaf71a65cc12be92d0e80967c14c5be0c41
-
Filesize
3KB
MD57b418b07072d3c9c824e727dc5d8428c
SHA19271a31048756c9ce14932dc4d9df5e98a6eaaf5
SHA256692dd8df2e50273f382143c6cb6502506894e14081b6e646ac561a33e23044e6
SHA51243665dffa10e9ed679d12b074f4de50de39114a7cefa3e936debd93bd10654bef3cdf9be2fade9632aeef5db1f2dd88c0eea605e0ffc61d6a767febd4610d40f
-
Filesize
3KB
MD5796069355cd025a2756eef2c53b94e81
SHA15b789ec77da53c4646a712d82a07e0150180955b
SHA2564592569689aee327fc352d323e9a9e6c87d12dcb39567251c21c674a0d2453ed
SHA51203a74288c168af3b2c3ca9a3d12916149c176c43c14067263c8582d21a49f9b7a145a95d7a99dda556b60d26ae946675443c3fcf4fbe461ce07d44242add41ab
-
Filesize
151B
MD50ff56a4620c3221ff64ec61a3a0d3033
SHA13a45320be12b585dcdc5ab2af5ea1455b2c919a1
SHA2560b0a65accca705494739d03b6c2ea769c78cd0eee996bc95b0c6ebc0941f4b1a
SHA512962a340efeb6d18c85e5872997eebb83374e114be088689690ba438f0db8e2e4df6c24713a35cfaec518f58d5322cf9617638ea55ff279a9d161c4fdf9af74f6
-
Filesize
274B
MD5453249f95d75eb5e450eb91fa755e1c8
SHA13e200e187e8cd21d3d1976ea0f7356626254de18
SHA25601bef150c18e377a57843965d55f18f0b5cb3fa867c5ab30f1e67eacd6ece48a
SHA5126125ffc1ab457bc1ba957c78c2a89ca54060c1969c4a981acf71025a1d79760159816d5fc36e351429de3bb5820e755b9bc22386f3d6892bfdf3da67d86f157c
-
Filesize
274B
MD5453249f95d75eb5e450eb91fa755e1c8
SHA13e200e187e8cd21d3d1976ea0f7356626254de18
SHA25601bef150c18e377a57843965d55f18f0b5cb3fa867c5ab30f1e67eacd6ece48a
SHA5126125ffc1ab457bc1ba957c78c2a89ca54060c1969c4a981acf71025a1d79760159816d5fc36e351429de3bb5820e755b9bc22386f3d6892bfdf3da67d86f157c
-
Filesize
274B
MD5453249f95d75eb5e450eb91fa755e1c8
SHA13e200e187e8cd21d3d1976ea0f7356626254de18
SHA25601bef150c18e377a57843965d55f18f0b5cb3fa867c5ab30f1e67eacd6ece48a
SHA5126125ffc1ab457bc1ba957c78c2a89ca54060c1969c4a981acf71025a1d79760159816d5fc36e351429de3bb5820e755b9bc22386f3d6892bfdf3da67d86f157c
-
Filesize
432B
MD5f107d0270e21a2fe91099fdc15918d44
SHA1dabc2f24f4a4e90053743166e5c4175dcf2b2d2d
SHA256eb315c9d165b4916e3b00e4d148b53a6c03a2f0694a6a8821d98e76f935ca6a8
SHA512b5d51c0d6abe99121d4f4f1d236def4260b7d5c26c501d7735eba4f58e2597db0e89b2b1df16545e49fc39649806e5305efb912328541bdd31c01ff3d2bda49c
-
C:\Users\Triage\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini
Filesize174B
MD5548b310fbc7a26d0b9da3a9f2d604a0c
SHA11e20c38b721dff06faa8aa69a69e616c228736c1
SHA256be49aff1e82fddfc2ab9dfffcb7e7be100800e3653fd1d12b6f8fa6a0957fcac
SHA512fa5bb7ba547a370160828fe720e6021e7e3a6f3a0ce783d81071292739cef6cac418c4bc57b377b987e69d5f633c2bd97a71b7957338472c67756a02434d89f1
-
Filesize
174B
MD57f1698bab066b764a314a589d338daae
SHA1524abe4db03afef220a2cc96bf0428fd1b704342
SHA256cdb11958506a5ba5478e22ed472fa3ae422fe9916d674f290207e1fc29ae5a76
SHA5124f94ad0fe3df00838b288a0ef4c12d37e175c37cbf306bdb1336ff44d0e4d126cd545c636642c0e88d8c6b8258dc138a495f4d025b662f40a9977d409d6b5719
-
Filesize
174B
MD517d5d0735deaa1fb4b41a7c406763c0a
SHA1584e4be752bb0f1f01e1088000fdb80f88c6cae0
SHA256768b6fde6149d9ebbed1e339a72e8cc8c535e5c61d7c82752f7dff50923b7aed
SHA512a521e578903f33f9f4c3ebb51b6baa52c69435cb1f9cb2ce9db315a23d53345de4a75668096b14af83a867abc79e0afa1b12f719294ebba94da6ad1effc8b0a3
-
Filesize
338B
MD5e4e50dfa455b2cbe356dffdf7aa1fcaf
SHA1c58be9d954b5e2dd0e5efa23a0a3d95ab8119205
SHA2569284bd835c20f5da3f76bc1d8c591f970a74e62a7925422858e5b9fbec08b927
SHA512bef1fad5d4b97a65fec8c350fe663a443bc3f7406c12184c79068f9a635f13f9127f89c893e7a807f1258b45c84c1a4fc98f6bd6902f7b72b02b6ffbc7e37169
-
Filesize
174B
MD5a2d31a04bc38eeac22fca3e30508ba47
SHA19b7c7a42c831fcd77e77ade6d3d6f033f76893d2
SHA2568e00a24ae458effe00a55344f7f34189b4594613284745ff7d406856a196c531
SHA512ed8233d515d44f79431bb61a4df7d09f44d33ac09279d4a0028d11319d1f82fc923ebbc6c2d76ca6f48c0a90b6080aa2ea91ff043690cc1e3a15576cf62a39a6
-
Filesize
174B
MD5a2d31a04bc38eeac22fca3e30508ba47
SHA19b7c7a42c831fcd77e77ade6d3d6f033f76893d2
SHA2568e00a24ae458effe00a55344f7f34189b4594613284745ff7d406856a196c531
SHA512ed8233d515d44f79431bb61a4df7d09f44d33ac09279d4a0028d11319d1f82fc923ebbc6c2d76ca6f48c0a90b6080aa2ea91ff043690cc1e3a15576cf62a39a6
-
Filesize
627KB
MD5da288dceaafd7c97f1b09c594eac7868
SHA1b433a6157cc21fc3258495928cd0ef4b487f99d3
SHA2566ea9f8468c76aa511a5b3cfc36fb212b86e7abd377f147042d2f25572bf206a2
SHA5129af8cb65ed6a46d4b3d673cea40809719772a7aaf4a165598dc850cd65afb6b156af1948aab80487404bb502a34bc2cce15c502c6526df2427756e2338626062
-
Filesize
627KB
MD5da288dceaafd7c97f1b09c594eac7868
SHA1b433a6157cc21fc3258495928cd0ef4b487f99d3
SHA2566ea9f8468c76aa511a5b3cfc36fb212b86e7abd377f147042d2f25572bf206a2
SHA5129af8cb65ed6a46d4b3d673cea40809719772a7aaf4a165598dc850cd65afb6b156af1948aab80487404bb502a34bc2cce15c502c6526df2427756e2338626062
-
Filesize
66KB
MD52ff6fc71135be2d1b5cab62675d57786
SHA141fe68c0d5b92470b569033f01d2b0e019fa4b60
SHA25671d60dbd5ccbe57e09e8c1291826374e78fef3e3fba063dd457f982fdabaab81
SHA512936adcbd894dcfb8c5ca7438e4cced34d7632cb4325472a6e7c24365fa48ba99c5b6fa59cc032101057cdfb452a8ba36700529f99d3ef9f997355bcc33129fbb
-
Filesize
432B
MD5eefa7f76ff11a5ec21bb777b798ac46c
SHA12e7a65ea8427d13a92ea159a5b8859ff99d2a836
SHA256840b46ed74821b5b61ca9ddc51a91cfe9151d11a494c89f183fadc02a78ac8ae
SHA512111301e33c0b33c154ffff274db5eb167de0ddb4e769cab9a2d9fcd2882e6192053149abbcb00d17ae5f7661bafecc1111aff2025c89d07b247633bbccb0e3ef
-
Filesize
412B
MD5449f2e76e519890a212814d96ce67d64
SHA1a316a38e1a8325bef6f68f18bc967b9aaa8b6ebd
SHA25648a6703a09f1197ee85208d5821032b77d20b3368c6b4de890c44fb482149cf7
SHA512c66521ed261dcbcc9062a81d4f19070216c6335d365bac96b64d3f6be73cd44cbfbd6f3441be606616d13017a8ab3c0e7a25d0caa211596e97a9f7f16681b738
-
Filesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790
-
Filesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790
-
Filesize
402B
MD5ecf88f261853fe08d58e2e903220da14
SHA1f72807a9e081906654ae196605e681d5938a2e6c
SHA256cafec240d998e4b6e92ad1329cd417e8e9cbd73157488889fd93a542de4a4844
SHA51282c1c3dd163fbf7111c7ef5043b009dafc320c0c5e088dec16c835352c5ffb7d03c5829f65a9ff1dc357bae97e8d2f9c3fc1e531fe193e84811fb8c62888a36b
-
Filesize
282B
MD53a37312509712d4e12d27240137ff377
SHA130ced927e23b584725cf16351394175a6d2a9577
SHA256b029393ea7b7cf644fb1c9f984f57c1980077562ee2e15d0ffd049c4c48098d3
SHA512dbb9abe70f8a781d141a71651a62a3a743c71a75a8305e9d23af92f7307fb639dc4a85499115885e2a781b040cbb7613f582544c2d6de521e588531e9c294b05
-
Filesize
134B
MD5873c8643cbbfb8ff63731bc25ac9b18c
SHA1043cbc1b31b9988d8041c3d01f71ce3393911f69
SHA256c4ad21379c11da7943c605eadb22f6fc6f54b49783466f8c1f3ad371eb167466
SHA512356b13b22b7b1717ded0ae1272b07f1839184e839132f3ab891b5d84421e375d4fc45158c291b46a933254f463c52d92574ce6b15c1402dfb00ee5d0a74c9943
-
Filesize
226B
MD5ad93eaac4ac4a095f8828f14790c1f8c
SHA1f84f24c4ca9d04485a0005770e3ef1ca30eede55
SHA256729111c923821a7ad0bb23d1a1dea03edbf503cd8b732e2d7eb36cf88eaa0cac
SHA512f561b98836233849c016227a3366fcf8449db662f21aecd4bd45eb988f6316212685ce7ce6e0461fb2604f664ed03a7847a237800d3cdca8ba23a41a49f68769
-
Filesize
402B
MD5881dfac93652edb0a8228029ba92d0f5
SHA15b317253a63fecb167bf07befa05c5ed09c4ccea
SHA256a45e345556901cd98b9bf8700b2a263f1da2b2e53dbdf69b9e6cfab6e0bd3464
SHA512592b24deb837d6b82c692da781b8a69d9fa20bbaa3041d6c651839e72f45ac075a86cb967ea2df08fa0635ae28d6064a900f5d15180b9037bb8ba02f9e8e1810
-
Filesize
402B
MD5881dfac93652edb0a8228029ba92d0f5
SHA15b317253a63fecb167bf07befa05c5ed09c4ccea
SHA256a45e345556901cd98b9bf8700b2a263f1da2b2e53dbdf69b9e6cfab6e0bd3464
SHA512592b24deb837d6b82c692da781b8a69d9fa20bbaa3041d6c651839e72f45ac075a86cb967ea2df08fa0635ae28d6064a900f5d15180b9037bb8ba02f9e8e1810
-
Filesize
282B
MD598470d9bd7fba55a0c303065f9c4f9be
SHA15303b190e29ba48332f7c90a832ef08af5a1953d
SHA2563830022d5d7ef2ae2ca0a2b6ad73f0d4716b49bf7eeeaa87b618988d531b7c72
SHA512134e072c3600bbb3c724c2700da399a14ba5b907153969362b3dbff32c480d39e7f5ecceebc9122a5a27265410557a16eb6bf82c9b635b90ef1fa0ae9efb849c
-
Filesize
468B
MD592adc8410cd8cb1d0481e2adbb62c7dd
SHA1bac1444ebe0bac748966f3bee84ee11e151a4810
SHA2564a3d7ccddac5c1b437fb687e90589015b9b9ae7708ea35eed9917d1190f65694
SHA512d7c3a5df50b28e336ff24f828cdf225554d199d3c2a857e2a7baa1f2bc1fee21944733edee52bd665ebaee999f5668d03497e9bfe88d58d380b74e6046ec5d62
-
Filesize
580B
MD5de8858093993987d123060097a2bad66
SHA10a89e87ba46538cb73aff1a47e4dc0bcfb4760d5
SHA2564c0d757717dec80eca8c6cbbfdda4706eb38fbbb7624933d5429dafc7bb9f0ec
SHA512fa348ac4025b599f460cb831338ce010dde8fba87587a6d078d6d594a30fee87ed112e412078c10604553f326cc7bd7627ae93b0e3d8a60cfeda0720cad29f4c
-
Filesize
504B
MD506e8f7e6ddd666dbd323f7d9210f91ae
SHA1883ae527ee83ed9346cd82c33dfc0eb97298dc14
SHA2568301e344371b0753d547b429c5fe513908b1c9813144f08549563ac7f4d7da68
SHA512f7646f8dcd37019623d5540ad8e41cb285bcc04666391258dbf4c42873c4de46977a4939b091404d8d86f367cc31e36338757a776a632c7b5bf1c6f28e59ad98
-
Filesize
504B
MD529eae335b77f438e05594d86a6ca22ff
SHA1d62ccc830c249de6b6532381b4c16a5f17f95d89
SHA25688856962cef670c087eda4e07d8f78465beeabb6143b96bd90f884a80af925b4
SHA5125d2d05403b39675b9a751c8eed4f86be58cb12431afec56946581cb116b9ae1014ab9334082740be5b4de4a25e190fe76de071ef1b9074186781477919eb3c17
-
Filesize
282B
MD5b441cf59b5a64f74ac3bed45be9fadfc
SHA13da72a52e451a26ca9a35611fa8716044a7c0bbc
SHA256e6fdf8ed07b19b2a3b8eff05de7bc71152c85b377b9226f126dc54b58b930311
SHA512fdc26609a674d36f5307fa3f1c212da1f87a5c4cd463d861ce1bd2e614533f07d943510abed0c2edeb07a55f1dccff37db7e1f5456705372d5da8e12d83f0bb3
-
Filesize
278B
MD58e11566270550c575d6d2c695c5a4b1f
SHA1ae9645fad2107b5899f354c9144a4dfc33b66f9e
SHA2561dc14736f6b0e9b68059324321acc14e156cd3a2890466a23bf7abf365d6c704
SHA512a9fc4b17d75f85ae64315ba94570cb5317b5510c655d3d5c8fb44091ea37f31e431e99ed5308252897bdd93c34e771bf80f456c4873ef0aa58ca9bbb2e5ff7e0
-
Filesize
524B
MD5089d48a11bff0df720f1079f5dc58a83
SHA188f1c647378b5b22ebadb465dc80fcfd9e7b97c9
SHA256a9e8ad0792b546a4a8ce49eda82b327ad9581141312efec3ac6f2d3ad5a05f17
SHA512f0284a3cc46e9c23af22fec44ac7bbde0b72f5338260c402564242c3dd244f8f8ca71dd6ceabf6a2b539cacc85a204d9495f43c74f6876317ee8e808d4a60ed8
-
Filesize
504B
MD550a956778107a4272aae83c86ece77cb
SHA110bce7ea45077c0baab055e0602eef787dba735e
SHA256b287b639f6edd612f414caf000c12ba0555adb3a2643230cbdd5af4053284978
SHA512d1df6bdc871cacbc776ac8152a76e331d2f1d905a50d9d358c7bf9ed7c5cbb510c9d52d6958b071e5bcba7c5117fc8f9729fe51724e82cc45f6b7b5afe5ed51a