Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20/08/2023, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe
Resource
win7-20230712-en
General
-
Target
e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe
-
Size
1.1MB
-
MD5
219f9d2422e198686e968cfb2f1317fe
-
SHA1
9aad95dce8384735916e07d9dbda6614baeb1c7b
-
SHA256
e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244
-
SHA512
6bb2e5da7839789c200fa7f4293bf38d317861e08d25bad473adbc280d0033ed8768f5e3a180d01c60b18be7db9a04399ecf230ba5b92450c4e97589a100f48e
-
SSDEEP
24576:E+c7VWlBHJyF3Olx56k+oAuqdemtVgir/:ExVWjH23O5Wlem/b
Malware Config
Extracted
gh0strat
112.213.117.9
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2000-8754-0x0000000010000000-0x0000000010030000-memory.dmp family_gh0strat behavioral1/memory/2000-8772-0x0000000000400000-0x000000000056E000-memory.dmp family_gh0strat behavioral1/memory/2000-8775-0x0000000010000000-0x0000000010030000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe -
resource yara_rule behavioral1/files/0x000400000000f6fa-8760.dat upx behavioral1/files/0x000400000000f6fa-8757.dat upx behavioral1/files/0x000400000000f6fa-8755.dat upx behavioral1/files/0x000400000000f6fa-8762.dat upx behavioral1/memory/1912-8764-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1912-8765-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1912-8774-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\O: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\Q: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\R: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\T: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\Z: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\E: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\I: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\L: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\S: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\W: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\G: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\J: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\M: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\P: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\V: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\Y: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\H: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\K: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\N: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\U: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe File opened (read-only) \??\X: e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 28 IoCs
pid Process 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15CE0861-3FA2-11EE-B524-CEADDBC12225} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "398729458" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15D069C1-3FA2-11EE-B524-CEADDBC12225} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2360 iexplore.exe 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2360 iexplore.exe 2360 iexplore.exe 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1912 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 30 PID 2000 wrote to memory of 1912 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 30 PID 2000 wrote to memory of 1912 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 30 PID 2000 wrote to memory of 1912 2000 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe 30 PID 1912 wrote to memory of 2360 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 31 PID 1912 wrote to memory of 2360 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 31 PID 1912 wrote to memory of 2360 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 31 PID 1912 wrote to memory of 2360 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 31 PID 1912 wrote to memory of 1720 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 32 PID 1912 wrote to memory of 1720 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 32 PID 1912 wrote to memory of 1720 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 32 PID 1912 wrote to memory of 1720 1912 e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe 32 PID 1720 wrote to memory of 2220 1720 iexplore.exe 34 PID 1720 wrote to memory of 2220 1720 iexplore.exe 34 PID 1720 wrote to memory of 2220 1720 iexplore.exe 34 PID 1720 wrote to memory of 2220 1720 iexplore.exe 34 PID 2360 wrote to memory of 1328 2360 iexplore.exe 35 PID 2360 wrote to memory of 1328 2360 iexplore.exe 35 PID 2360 wrote to memory of 1328 2360 iexplore.exe 35 PID 2360 wrote to memory of 1328 2360 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe"C:\Users\Admin\AppData\Local\Temp\e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exeC:\Users\Admin\AppData\Local\Temp\e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1328
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2220
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d66a7bd501168683dc36d56cec1d73b4
SHA1c2288fab8e6a32f81a90c58ed925345205bca8e8
SHA256ddda2378207a3274caf415829318b57c2931716af9cf96a547d24032932d03b0
SHA512de7b1b36e5042f7b4994d8e777ec63760c62cea1d050d83925c62599944a4d977a0112f35e823ba0e9a60671d9b60baf75908275a86c8feb3d2ed6f61894285f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52b11735243aae5d4e80d256aff56a7dd
SHA132dfba6605d6868957653d008efef1c7dee617c2
SHA256f74c00c88cdf68b2a8160efb46242ca7eec063f4955708be7507ab54a592d629
SHA512e4414b017e70d4e9564294a1ac4f0e5baa52f10e3f7c0900c9633ec2bf110627f7a06b338714920508f25dc75699568bd6fe3a8592a315b0c2adea3f7fe23fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53b98ae7ea9a096bbaf079ea511f968a6
SHA1d77f9382167381d1eb8285502d19ddc25b74e797
SHA2560dfdd614c7d0e0b399b11c6feb452d310f58bf9da275d6a2daf32dc8d7b92f57
SHA512611e11f3a50c17510acedbddc6e4ab14fc419524bd8046742093fa0895795346e816a524f1eb508fc6eab57ce7d0af3fd6479c78a26a10ad5fcdae5ca2761c8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e4076a872ac1b655931383973d8cc496
SHA1792ceffa537b98ab629d6162d864a843bf9d7836
SHA2562af40e0a008c84701f1017ef3335cedc36d579e26186652f0ebce5017762c74d
SHA5127945f53e83ffd66f9ff02736b1d78800fb5ac280149bbbcdf3ac439168faa7be7ea31415e338fe9966113a5db472efde3bf55b47f38ce34dfc18dca105b4d416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f4ab0a86fbd600b65a7eb422fa7c720c
SHA1618af41097d3f749fc720ea652afdef4497a735d
SHA25650b6c10df3745577491d8f22f645867cab29429cd0e281c684aaca5b4a653d75
SHA5123ccc752ad4955e2799aa66dbb794b45cdd12f34bd84139091475650ad87d6757750b27c4c954ad57ba46227329171cdb227853720bf8c03f46d7e9c47363b84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD593dc35705989faef0a835b57ccd89c0a
SHA1c83f8c26ed4604a51013efa709597953299cff86
SHA2568b045bef58b9f380976b3869a37bdbd4d583ff26aba05435a4f8c07068220f96
SHA512ab6a7fe11b156a09bed56180982cff612570e3c6c7fc58b25373cdc46664071987867ef5549d0c59f11dbae6869396a123e72ab3dc3e8272812554a28e58fdba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5408a8dba3d64093159d2735dd6bb4cba
SHA1fb4c2269e9922f07d4dac27102791c19e2f3f155
SHA2565513449afdddee0473f32d7c550fc2b63b79cebedffe9b0a006dcf5f53eca53a
SHA51200fecd4c99aacb010ad8331285b97a4589388236fc5fe852530f153a014beb4ee1f825b0ba35d41ba0af15339f77fab1b32c1d08ffb7f0e3376b29e72cc15dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3ced3eb54635e83e1b8ed18647bfb54
SHA11475f8bc53cf6af9a1ec269d657a65179168a3e6
SHA256eab0e28544c5ce55cef94ba7c6878771a06e403be1220b88571ab82cfbae938b
SHA5128cfedf24e7eefb58f63b2a1ea0bd8231d5492046f6fa899bf8cd12deae4009b66d5cd41955cffdbf7b8d1b4c413a5cdafe72a0aa3a4ef17bc61b65e69076ea25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5430525b99229d2c92c49b594704398a6
SHA1a0a28ab7a4e0f44e6e07a239fcca2999567d0302
SHA25604de1923e634ec0bd36b60834a5d16918b4538a339d75aefd66ba6245a58d1df
SHA51247ee3588852e8b6908f2a1c9db68beed7665a5ad0b5e336666368a6b6b4a2723543ced70fa96fd3a32e050bd55bfd22f5d0ab294675e297124b134f712fa4a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f3a57f373a0c651d70711b2d549be275
SHA1a961487c83a57f3fd2d81c8ef135d4dc0b986da4
SHA256838ef5be2f8b31822a551172179ef6806e3aa54d82ba879fa85a20f271962e98
SHA512cb387564e9077f3161ebba01890dafd99d6db58a13b38781121cf1b1d344f47ced2ff974ad307bf29531f8a953791cb9ba79c0765cb1f43bb637d4d2ae248442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb1498de2d253d783971a6a79fc9cc37
SHA1e8f43a81d4e85189fdfe9d507cd734eb58f4005b
SHA256e9ab966649f9834fd867224014f7ff52c9ddf8c664832f54499b24dc0eee3138
SHA5123dbc3441136e366eb5bff0bb8796c04f1375a934985fa8a5cd26a63ba81cc71686152749e25f6eb3d14a985fec049d6635c305507ceb33a732fdbe78c213bfb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54d4a31900bef905dcac1494bf7af3215
SHA12bf4d9e4857b7a61cff8752b27f4d266a26cbaa4
SHA2568aeca5756e4f5fbb77c17aeb786931fd9c5ef962243f829f9ade7cbe58cc9f1e
SHA5127c36e90f30be36ad7f83ac722442c3e64e612dd993fe0e5d46b1ccc296cb7721748108b68b2d2937ece59474fba8794eaf16e48caad23019310d405bcee73219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5afb266b2f15b311f1d76baf9e545b870
SHA15818fa4dce66fe47e23a1f98ad083bdbbf8ed95b
SHA2564cd264940debb100ade5249d5981bbad9f4841073cc090c3411687be380bdae1
SHA512dd59fb2f3bcf54d261d43de8532ca82530b8319f7557994f177a12c00fc5a7361cd9f2e8d185f9080f84254518b36d67d6cdd35eae1dfc7f3c38e56b30967a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5232d6381763e324ca2b6cb2ecccc1f9f
SHA16dfec90605e0d67e5ad83bab7f48c296bf1034c8
SHA256400901bb328c17e59377ed363f440a37c45631011f69e2f397792b3095536a9f
SHA512ec9434adee4b56f486eb515b7e0ce47c27a674c29f756a2eaa28661d61676f8b1ff02b2306be6accc3061768081718f2653a572aed387a18face913fb811ce17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55b3e44a550e104f9c6d13b43e94beae7
SHA156ea7fa4ba7eb20659c745e54f4e790e95cd223b
SHA256026f0327b72e454d83c76760d10be06a090f10531046a91abea1fb8849e1cef4
SHA5123ccca8e1fdb0b7ca2e6c17bd4dddc64c0fd8e56a22f504a63c1f0bbaf624759906193e57814357b9081366a177c4c8f2fc02c094025c94a90046918e04d87a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56ec4d01335922fbf9390f50ba8b7a3e2
SHA1d66b78645d6a51e6b28eb0d8fba5028616dfc406
SHA2569e204318bab621af70e2d4bb269f1a50071f1716c6630b5e7893aa723733fd6b
SHA512e828ef14285445ca3b2771c9e3184572e1af666ac667afef0f4b5aff43c7ff712c2d48ef1830ab7fe251acce9d0070e6fc49b658dc2f583452313eeb2beb6aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD523c335ff225fa0dd3e4745c6adf1dc7b
SHA175524a7154452cf0a3d0706515d5e54d0523965c
SHA2562ee90b5a33e1c94a941b230bf63f65672e8639bd1d00bcfc5a4022dbb2387bd5
SHA512a13056d86491ef7e2532205e3cd91525b8ea3d42945310277822580841934b506663a956ecbc094178b9fededf5a21ce4d6959766ec14bec5c9c40927d2453a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51eb3e27c562953f5071d1096e0b434dd
SHA1767fd1625bfa951339fea44dfe287f3e02991201
SHA256a5328b34a23a364564916b561cd1611a33c4b63d72423e61799823441614c064
SHA51226ad2ddec4202051c7c6de9d44824ff202ef502b1f2b8fb43e1be26f8ff098b61bc14eb25632a370a4d35f8f332712296dc98f6ae210bd7a9ae4fa196bddccdc
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{15CE0861-3FA2-11EE-B524-CEADDBC12225}.dat
Filesize3KB
MD5733f1053d4fc9baf0190f2993eb6b2b2
SHA1a7c61317a854376624d1970a7a51322ccfcaa9d4
SHA2567af0ba49f129079c11e18284a8c49d1cc80df10ed3e1b245976bbad2c04c212b
SHA5129d9000b5f5b2be18e23e6ab98ce0130f69a0360be779ba11270caa00564dbc840ad14c4ba38159e35ea66aec7208b38aedf9d6e474400ee33d2b870c6adee99b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{15D069C1-3FA2-11EE-B524-CEADDBC12225}.dat
Filesize3KB
MD51cb3d1dea83661b7114ba7c057172192
SHA1dfbbac688683cdf66fcfc61fd7b12adebd536a99
SHA256c5f9a7aad9e94e798d9d7e0a61d4cfa25f725cca395ac614480604cd1e8542fb
SHA5127085bfeb6dd3d63b0ebe8ee13ce4fc099966c4f244722db9299347626cc4a8264d6e227ccf6cc1da56d1d1633f25e1ea2d32e825eaee29036cd4264f5a5aa277
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
C:\Users\Admin\AppData\Local\Temp\e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe
Filesize105KB
MD5dfb5daabb95dcfad1a5faf9ab1437076
SHA14a199569a9b52911bee7fb19ab80570cc5ff9ed1
SHA25654282ec29d4993ed6e9972122cfbb70bba4898a21d527bd9e72a166d7ec2fdc0
SHA5125d31c34403ab5f8db4a6d84f2b5579d4ea18673914b626d78e458a648ac20ddd8e342818e807331036d7bb064f596a02b9737acac42fbead29260343a30717e8
-
C:\Users\Admin\AppData\Local\Temp\e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe
Filesize105KB
MD5dfb5daabb95dcfad1a5faf9ab1437076
SHA14a199569a9b52911bee7fb19ab80570cc5ff9ed1
SHA25654282ec29d4993ed6e9972122cfbb70bba4898a21d527bd9e72a166d7ec2fdc0
SHA5125d31c34403ab5f8db4a6d84f2b5579d4ea18673914b626d78e458a648ac20ddd8e342818e807331036d7bb064f596a02b9737acac42fbead29260343a30717e8
-
\Users\Admin\AppData\Local\Temp\e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe
Filesize105KB
MD5dfb5daabb95dcfad1a5faf9ab1437076
SHA14a199569a9b52911bee7fb19ab80570cc5ff9ed1
SHA25654282ec29d4993ed6e9972122cfbb70bba4898a21d527bd9e72a166d7ec2fdc0
SHA5125d31c34403ab5f8db4a6d84f2b5579d4ea18673914b626d78e458a648ac20ddd8e342818e807331036d7bb064f596a02b9737acac42fbead29260343a30717e8
-
\Users\Admin\AppData\Local\Temp\e73c55f734bef3ee8ba23d0dce9495a1f0ee0f1c1b4138d21e2c43019bd6a244mgr.exe
Filesize105KB
MD5dfb5daabb95dcfad1a5faf9ab1437076
SHA14a199569a9b52911bee7fb19ab80570cc5ff9ed1
SHA25654282ec29d4993ed6e9972122cfbb70bba4898a21d527bd9e72a166d7ec2fdc0
SHA5125d31c34403ab5f8db4a6d84f2b5579d4ea18673914b626d78e458a648ac20ddd8e342818e807331036d7bb064f596a02b9737acac42fbead29260343a30717e8