Overview
overview
10Static
static
3CareAbout.exe
windows7-x64
10CareAbout.exe
windows10-2004-x64
10HTCTL32.dll
windows7-x64
3HTCTL32.dll
windows10-2004-x64
3ExtExport.exe
windows7-x64
ExtExport.exe
windows10-2004-x64
1iediagcmd.exe
windows7-x64
8iediagcmd.exe
windows10-2004-x64
8ieinstal.exe
windows7-x64
ieinstal.exe
windows10-2004-x64
1ielowutil.exe
windows7-x64
ielowutil.exe
windows10-2004-x64
1PCICHEK.dll
windows7-x64
1PCICHEK.dll
windows10-2004-x64
1PCICL32.dll
windows7-x64
1PCICL32.dll
windows10-2004-x64
5TCCTL32.dll
windows7-x64
1TCCTL32.dll
windows10-2004-x64
1msvcr100.dll
windows7-x64
3msvcr100.dll
windows10-2004-x64
3pcicapi.dll
windows7-x64
1pcicapi.dll
windows10-2004-x64
1remcmdstub.exe
windows7-x64
1remcmdstub.exe
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-09-2023 01:20
Static task
static1
Behavioral task
behavioral1
Sample
CareAbout.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
CareAbout.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral3
Sample
HTCTL32.dll
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
HTCTL32.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral5
Sample
ExtExport.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
ExtExport.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral7
Sample
iediagcmd.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
iediagcmd.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral9
Sample
ieinstal.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
ieinstal.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral11
Sample
ielowutil.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
ielowutil.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral13
Sample
PCICHEK.dll
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
PCICHEK.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral15
Sample
PCICL32.dll
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
PCICL32.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral17
Sample
TCCTL32.dll
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
TCCTL32.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral19
Sample
msvcr100.dll
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
msvcr100.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral21
Sample
pcicapi.dll
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
pcicapi.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral23
Sample
remcmdstub.exe
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
remcmdstub.exe
Resource
win10v2004-20230831-en
General
-
Target
iediagcmd.exe
-
Size
503KB
-
MD5
47848682b029e73d50db21b036234db3
-
SHA1
cfb5e4cf260a4d8ca0daf135429332f7d27c93a3
-
SHA256
879aebf76db4528f0f4747b38e0cb9ba66ad983c171fb54a4e548ff1c004e459
-
SHA512
5052094b2033ae5b4a4334f7067086e2266bae5e34f8eef26535e70600c4162b48930ea5040a465511c10eb517ea128211b512fb5822b2b8ca4445498ef828cf
-
SSDEEP
12288:vjQJGJ17jTmepq1Zi2HDG2YIwgj5rp21ZZ:LQJGJIW05YIww5tK
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Drops file in Windows directory 1 IoCs
Processes:
dxdiag.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.app.log dxdiag.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 2680 ipconfig.exe -
Modifies registry class 34 IoCs
Processes:
dxdiag.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\ProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\ = "DxDiagClassObject Class" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID\ = "DxDiag.DxDiagClassObject" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ThreadingModel = "Apartment" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\ = "DxDiagProvider Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32 dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1 dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\ = "DxDiagProvider Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7} dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\InprocServer32 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\CLSID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\VersionIndependentProgID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B} dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ = "C:\\Windows\\SysWOW64\\dxdiagn.dll" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove\ = "Programmable" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1 dxdiag.exe -
Processes:
iediagcmd.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 0f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d432000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 iediagcmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 iediagcmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 iediagcmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 iediagcmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 iediagcmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 iediagcmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 iediagcmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 iediagcmd.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
dxdiag.exeiediagcmd.exepid process 1924 dxdiag.exe 1924 dxdiag.exe 2152 iediagcmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
dxdiag.exeiediagcmd.exedescription pid process Token: SeRestorePrivilege 1924 dxdiag.exe Token: SeRestorePrivilege 1924 dxdiag.exe Token: SeRestorePrivilege 1924 dxdiag.exe Token: SeRestorePrivilege 1924 dxdiag.exe Token: SeRestorePrivilege 1924 dxdiag.exe Token: SeRestorePrivilege 1924 dxdiag.exe Token: SeRestorePrivilege 1924 dxdiag.exe Token: SeBackupPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe Token: SeSecurityPrivilege 2152 iediagcmd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
iediagcmd.exedxdiag.exepid process 2152 iediagcmd.exe 2152 iediagcmd.exe 1924 dxdiag.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
iediagcmd.exedxdiag.exedescription pid process target process PID 2152 wrote to memory of 2080 2152 iediagcmd.exe dxdiag.exe PID 2152 wrote to memory of 2080 2152 iediagcmd.exe dxdiag.exe PID 2152 wrote to memory of 2080 2152 iediagcmd.exe dxdiag.exe PID 2080 wrote to memory of 1924 2080 dxdiag.exe dxdiag.exe PID 2080 wrote to memory of 1924 2080 dxdiag.exe dxdiag.exe PID 2080 wrote to memory of 1924 2080 dxdiag.exe dxdiag.exe PID 2080 wrote to memory of 1924 2080 dxdiag.exe dxdiag.exe PID 2152 wrote to memory of 2680 2152 iediagcmd.exe ipconfig.exe PID 2152 wrote to memory of 2680 2152 iediagcmd.exe ipconfig.exe PID 2152 wrote to memory of 2680 2152 iediagcmd.exe ipconfig.exe PID 2152 wrote to memory of 2716 2152 iediagcmd.exe route.exe PID 2152 wrote to memory of 2716 2152 iediagcmd.exe route.exe PID 2152 wrote to memory of 2716 2152 iediagcmd.exe route.exe PID 2152 wrote to memory of 1144 2152 iediagcmd.exe netsh.exe PID 2152 wrote to memory of 1144 2152 iediagcmd.exe netsh.exe PID 2152 wrote to memory of 1144 2152 iediagcmd.exe netsh.exe PID 2152 wrote to memory of 984 2152 iediagcmd.exe netsh.exe PID 2152 wrote to memory of 984 2152 iediagcmd.exe netsh.exe PID 2152 wrote to memory of 984 2152 iediagcmd.exe netsh.exe PID 2152 wrote to memory of 876 2152 iediagcmd.exe netsh.exe PID 2152 wrote to memory of 876 2152 iediagcmd.exe netsh.exe PID 2152 wrote to memory of 876 2152 iediagcmd.exe netsh.exe PID 2152 wrote to memory of 2712 2152 iediagcmd.exe makecab.exe PID 2152 wrote to memory of 2712 2152 iediagcmd.exe makecab.exe PID 2152 wrote to memory of 2712 2152 iediagcmd.exe makecab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\iediagcmd.exe"C:\Users\Admin\AppData\Local\Temp\iediagcmd.exe"1⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\dxdiag.exe"C:\Windows\system32\dxdiag.exe" /x C:\Users\Admin\AppData\Local\Temp\dxdiag.xml2⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\dxdiag.exe"C:\Windows\SysWOW64\dxdiag.exe" /x C:\Users\Admin\AppData\Local\Temp\dxdiag.xml3⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
-
C:\Windows\system32\ipconfig.exe"ipconfig" /all2⤵
- Gathers network information
PID:2680
-
-
C:\Windows\system32\route.exe"route" print2⤵PID:2716
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" in tcp show global2⤵PID:1144
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall show rule name=all verbose2⤵
- Modifies Windows Firewall
PID:984
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" winsock show catalog2⤵PID:876
-
-
C:\Windows\system32\makecab.exe"makecab.exe" /F "C:\Users\Admin\AppData\Local\Temp\iediag_makecab_directives.txt"2⤵PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
530B
MD55e275db761aa5a23ac651af8f6c4a000
SHA1583fe93323b8fee3be1469f2d1bfc16a091ebc70
SHA2563b9b2f75b724fe5354d24a0ef729b8a2aaa8a9313166eafb1f73b07cf1a745ef
SHA512892fd01ee561591cee4d00ae4cd3cc91a07587c097d6969f8392af87582f93c259c52dae17d161e22ba12bf47b0d4d9953cddcb7df91a4a0e4de1a9873c936ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52968c490630b1b03ef613069d6b1ba5e
SHA136d80368ee53349e2a6b5f987606f1da5154259e
SHA25648f8f8d4582f897cc70c51a823f30577b32f5a37ea7d890436a755836f33c62f
SHA512e18799d67c1c5496cf9c30e4878cefc36be22886ff89320130bb7d58ecc22abfc5a08b9df7cfdc03ee71e8f14126d1b1e29271a819b3aecee16245a9b10d712b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B8CC409ACDBF2A2FE04C56F2875B1FD6
Filesize222B
MD577148bffc5892e5f51c05101aa9e942b
SHA1f11853d52eaa6e33d190a88ba518ca5eed0e4996
SHA2567e4a1a379c37486e543b86a726c5c0925c5e56a7e02846f55a275c723b7399a7
SHA512bcf053485b43152000e85e5f4b6271e554ad56a8daa72d72709e6e03044bd6ad686379f9d3c0548e8f65cb06c22ae549d26922a2fab7bf0c92ae489aec36f0b3
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
770KB
MD5a12a6c32d949279eafedb39e35687dbe
SHA123997454b00cab64822c1e076475401b032fcb9e
SHA2567dca96c967d11c16121797e09a9610996780d247fa4f1da05a6d490d60209dd2
SHA5125732a33c03926326512288ee358ee383a6229939ee769a90d349d1cb6ac71e080825e92d74e324172b2bb31eb07c148356aee8477d308069b5451dd3a6f30f45
-
Filesize
1.8MB
MD59324f825a728eb44412cb9ffa1870bd4
SHA1b690fd578b14e27ee9540a69637a86487e8b4d8d
SHA256de7ad9b20d10858d7ae20f5657637d9e87a65c92759edf68012a0162ccbba894
SHA51265757ded53be92bf133f2282a4030c3d1f0770fff51a68ac2b386a8d05f5498b720edb170cd563b7ae673825e0a528d010de8c956d1134a95345ef3ce61456a0
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
39KB
MD5e6108f4280703ebe3346f5de311834da
SHA163400d3abe5ac3cffe3144743a1632faefce25df
SHA25676f35681208aaf7825ff23d37eea85b31ce4d0500248bbcfd49bab07b3638b63
SHA512aef81b72d708d10f718f89a13e3ac291a73d86d1252cebe4e6ad4decacb63691d4f9a3ba86017649bee6f9b9e11c213434cde1d3d595393a1f1c985c5ab9eea0
-
Filesize
515B
MD514c148857af11ebcee263a2fb2b359ee
SHA1710cb526ed69db7fdcc5da6b49241f70101e12fb
SHA256810a37010bd4e6eed276310610dc4ebc7cc91535edf65e6ba6d9ed6edbe793ac
SHA512d47ff7bdb40d518cf8daed410f29fea0f990457ed2da25ff2840a3bdcda77abe0b1b9948198a105a217fadbd4e4eed80fd0eb4338db7202892b9b4b910189e12