Resubmissions
20-06-2023 17:45
230620-wbqvbadd25 820-06-2023 17:42
230620-v94cmadc96 815-06-2023 00:35
230615-axnfeseb59 815-06-2023 00:32
230615-av2v2aeb58 815-06-2023 00:19
230615-amg6naeb9x 1014-06-2023 23:59
230614-3154vseb36 814-06-2023 23:56
230614-3zekhseb6w 814-06-2023 23:53
230614-3xh5xseb51 814-06-2023 23:52
230614-3wq45seb5z 8Analysis
-
max time kernel
111s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 00:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/disepi/ambrosial/releases/download/1.5/Ambrosial.exe
Resource
win10v2004-20230220-en
General
-
Target
https://github.com/disepi/ambrosial/releases/download/1.5/Ambrosial.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = d42e80ebae45d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2B40694C-0B14-11EE-9EF6-62080863D4B5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{714AB48F-4909-477D-A2D2-904C571930EE}" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff100100003c000000900300001c020000 iexplore.exe -
Modifies registry class 61 IoCs
Processes:
NOTEPAD.EXENOTEPAD.EXEexplorer.exeexplorer.exeConhost.exeexplorer.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e803accbfb42cdb4c42b0297fe99a87c6410000 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell NOTEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ NOTEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ NOTEPAD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings Conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell NOTEPAD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings explorer.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exepid process 5084 iexplore.exe 5084 iexplore.exe 5084 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
iexplore.exeIEXPLORE.EXENOTEPAD.EXENOTEPAD.EXEpid process 5084 iexplore.exe 5084 iexplore.exe 3412 IEXPLORE.EXE 3412 IEXPLORE.EXE 2752 NOTEPAD.EXE 2752 NOTEPAD.EXE 2500 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
iexplore.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 5084 wrote to memory of 3412 5084 iexplore.exe IEXPLORE.EXE PID 5084 wrote to memory of 3412 5084 iexplore.exe IEXPLORE.EXE PID 5084 wrote to memory of 3412 5084 iexplore.exe IEXPLORE.EXE PID 1956 wrote to memory of 1416 1956 cmd.exe explorer.exe PID 1956 wrote to memory of 1416 1956 cmd.exe explorer.exe PID 604 wrote to memory of 1824 604 cmd.exe cmd.exe PID 604 wrote to memory of 1824 604 cmd.exe cmd.exe PID 604 wrote to memory of 1316 604 cmd.exe explorer.exe PID 604 wrote to memory of 1316 604 cmd.exe explorer.exe PID 1824 wrote to memory of 4160 1824 cmd.exe cmd.exe PID 1824 wrote to memory of 4160 1824 cmd.exe cmd.exe PID 1824 wrote to memory of 4408 1824 cmd.exe Conhost.exe PID 1824 wrote to memory of 4408 1824 cmd.exe Conhost.exe PID 4160 wrote to memory of 3892 4160 cmd.exe cmd.exe PID 4160 wrote to memory of 3892 4160 cmd.exe cmd.exe PID 4160 wrote to memory of 3784 4160 cmd.exe explorer.exe PID 4160 wrote to memory of 3784 4160 cmd.exe explorer.exe PID 3892 wrote to memory of 2380 3892 cmd.exe cmd.exe PID 3892 wrote to memory of 2380 3892 cmd.exe cmd.exe PID 3892 wrote to memory of 2512 3892 cmd.exe explorer.exe PID 3892 wrote to memory of 2512 3892 cmd.exe explorer.exe PID 2380 wrote to memory of 3716 2380 cmd.exe cmd.exe PID 2380 wrote to memory of 3716 2380 cmd.exe cmd.exe PID 2380 wrote to memory of 1420 2380 cmd.exe explorer.exe PID 2380 wrote to memory of 1420 2380 cmd.exe explorer.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/disepi/ambrosial/releases/download/1.5/Ambrosial.exe1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5084 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\New Text Document.bat" "1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Modifies registry class
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\hello.bat" "1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exeexplorer.exe4⤵
- Modifies registry class
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat6⤵
-
C:\Windows\explorer.exeexplorer.exe7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat7⤵
-
C:\Windows\explorer.exeexplorer.exe8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat10⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat11⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat12⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat13⤵
-
C:\Windows\explorer.exeexplorer.exe14⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat14⤵
-
C:\Windows\explorer.exeexplorer.exe15⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat15⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat16⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV117⤵
- Modifies registry class
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat17⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat18⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat19⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat20⤵
-
C:\Windows\explorer.exeexplorer.exe21⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat21⤵
-
C:\Windows\explorer.exeexplorer.exe22⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat22⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat23⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat24⤵
-
C:\Windows\explorer.exeexplorer.exe25⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat25⤵
-
C:\Windows\explorer.exeexplorer.exe26⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat26⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat27⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat28⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat29⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat30⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat31⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat32⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat33⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat34⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat35⤵
-
C:\Windows\explorer.exeexplorer.exe36⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat36⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat37⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat38⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat39⤵
-
C:\Windows\explorer.exeexplorer.exe40⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat40⤵
-
C:\Windows\explorer.exeexplorer.exe41⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat41⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat42⤵
-
C:\Windows\explorer.exeexplorer.exe43⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat43⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat44⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat45⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat46⤵
-
C:\Windows\explorer.exeexplorer.exe47⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat47⤵
-
C:\Windows\explorer.exeexplorer.exe48⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat48⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat49⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat50⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat51⤵
-
C:\Windows\explorer.exeexplorer.exe52⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat52⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat53⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat54⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat55⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat56⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat57⤵
-
C:\Windows\explorer.exeexplorer.exe58⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat58⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat59⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat60⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat61⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat62⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat63⤵
-
C:\Windows\explorer.exeexplorer.exe64⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K hello.bat64⤵
-
C:\Windows\explorer.exeexplorer.exe63⤵
-
C:\Windows\explorer.exeexplorer.exe62⤵
-
C:\Windows\explorer.exeexplorer.exe61⤵
-
C:\Windows\explorer.exeexplorer.exe60⤵
-
C:\Windows\explorer.exeexplorer.exe59⤵
-
C:\Windows\explorer.exeexplorer.exe57⤵
-
C:\Windows\explorer.exeexplorer.exe56⤵
-
C:\Windows\explorer.exeexplorer.exe55⤵
-
C:\Windows\explorer.exeexplorer.exe54⤵
-
C:\Windows\explorer.exeexplorer.exe53⤵
-
C:\Windows\explorer.exeexplorer.exe51⤵
-
C:\Windows\explorer.exeexplorer.exe50⤵
-
C:\Windows\explorer.exeexplorer.exe49⤵
-
C:\Windows\explorer.exeexplorer.exe46⤵
-
C:\Windows\explorer.exeexplorer.exe45⤵
-
C:\Windows\explorer.exeexplorer.exe44⤵
-
C:\Windows\explorer.exeexplorer.exe42⤵
-
C:\Windows\explorer.exeexplorer.exe39⤵
-
C:\Windows\explorer.exeexplorer.exe38⤵
-
C:\Windows\explorer.exeexplorer.exe37⤵
-
C:\Windows\explorer.exeexplorer.exe35⤵
-
C:\Windows\explorer.exeexplorer.exe34⤵
-
C:\Windows\explorer.exeexplorer.exe33⤵
-
C:\Windows\explorer.exeexplorer.exe32⤵
-
C:\Windows\explorer.exeexplorer.exe31⤵
-
C:\Windows\explorer.exeexplorer.exe30⤵
-
C:\Windows\explorer.exeexplorer.exe29⤵
-
C:\Windows\explorer.exeexplorer.exe28⤵
-
C:\Windows\explorer.exeexplorer.exe27⤵
-
C:\Windows\explorer.exeexplorer.exe24⤵
-
C:\Windows\explorer.exeexplorer.exe23⤵
-
C:\Windows\explorer.exeexplorer.exe20⤵
-
C:\Windows\explorer.exeexplorer.exe19⤵
-
C:\Windows\explorer.exeexplorer.exe18⤵
-
C:\Windows\explorer.exeexplorer.exe17⤵
-
C:\Windows\explorer.exeexplorer.exe16⤵
-
C:\Windows\explorer.exeexplorer.exe13⤵
-
C:\Windows\explorer.exeexplorer.exe12⤵
-
C:\Windows\explorer.exeexplorer.exe11⤵
-
C:\Windows\explorer.exeexplorer.exe10⤵
-
C:\Windows\explorer.exeexplorer.exe9⤵
-
C:\Windows\explorer.exeexplorer.exe6⤵
-
C:\Windows\explorer.exeexplorer.exe5⤵
- Modifies registry class
-
C:\Windows\explorer.exeexplorer.exe3⤵
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\New Text Document.batFilesize
35B
MD54e9f40ca34b5349dc12fe4be0d2aba88
SHA1ed0acbfe13e5b4baf8b3bceee9affb33f063061d
SHA256ca0312add9dab33e477205e348cadf8bee9c442ecd71b0ae8434f26dabd554f1
SHA512026e4944cdaab1714ac3ee97064fa32acd3eacde5891523921ac77d283ca9bf7e7d37ff9b383714dff9487c05999aa08886fee16862c262cff450ed094eb9fd8
-
C:\Users\Admin\Desktop\hello.batFilesize
35B
MD54e9f40ca34b5349dc12fe4be0d2aba88
SHA1ed0acbfe13e5b4baf8b3bceee9affb33f063061d
SHA256ca0312add9dab33e477205e348cadf8bee9c442ecd71b0ae8434f26dabd554f1
SHA512026e4944cdaab1714ac3ee97064fa32acd3eacde5891523921ac77d283ca9bf7e7d37ff9b383714dff9487c05999aa08886fee16862c262cff450ed094eb9fd8