Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
22-09-2023 23:18
Static task
static1
General
-
Target
TLauncher-2.885-Installer-1.1.3.exe
-
Size
22.6MB
-
MD5
bd3eefe3f5a4bb0c948251a5d05727e7
-
SHA1
b18722304d297aa384a024444aadd4e5f54a115e
-
SHA256
f1b132f7ecf06d2aa1dd007fc7736166af3ee7c177c91587ae43930c65e531e0
-
SHA512
d7df966eeda90bf074249ba983aac4ba32a7f09fe4bb6d95811951df08f24e55e01c790ffebc3bc50ce7b1c501ff562f0de5e01ca340c8596881f69f8fed932d
-
SSDEEP
393216:KXGWOLBh2NPfs/dQETVlOBbpFEjdGphRqV56HpkoaH3D8P2Q6YS6x9DOc:K2/BhSHExi73qqHpu34kYbzOc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2960 irsetup.exe -
Loads dropped DLL 3 IoCs
pid Process 2960 irsetup.exe 2960 irsetup.exe 2960 irsetup.exe -
resource yara_rule behavioral1/files/0x000700000001afe3-4.dat upx behavioral1/files/0x000700000001afe3-5.dat upx behavioral1/memory/2960-8-0x00000000011D0000-0x00000000015B8000-memory.dmp upx behavioral1/memory/2960-322-0x00000000011D0000-0x00000000015B8000-memory.dmp upx behavioral1/memory/2960-478-0x00000000011D0000-0x00000000015B8000-memory.dmp upx behavioral1/memory/2960-511-0x00000000011D0000-0x00000000015B8000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1195155995" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5058d148abedd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c1655fa699e13748ab5202304d038d6e000000000200000000001066000000010000200000009e28efb8d6d41a1a83b8cb5cd7121bd5f950543c9b27300e0d26b4ac8013dc54000000000e8000000002000020000000953cb72415c4873c054d42841f0cf202340f3bf6a60b208728d67385bd6d7d3820000000d4d9225dc6e1459e238b08788ae48e76d4d71449bd52acb25d9cef8269134a9540000000b2318cabc9c03d43e83942f10a9d5cb639aa8dcdd85da424ea026e5c81f54c996969f94a98b41cb66c9886830e5fd51045c6a9b2428a369d4159bcddcd940d79 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c1655fa699e13748ab5202304d038d6e0000000002000000000010660000000100002000000024592afd8251fda8321d13397e221c414c2edea199a603c294b9c45ba4b76222000000000e8000000002000020000000266e5d312b70c2a8b8650af0aab9805ce33af47b931ac132402e4f122f4e8db820000000e13a33b89a616b8bf1964437227328ccf034857b973aa5702f9cdb185c683daf40000000d93a4213e7b424fe053e9a0083a191a6733b72559db131485c80dea5610cdab719c85a23e2e9ab4a4e6feabd03ef8b5379293d1d1f008a9ca027f59b5b453ea4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31059371" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1195166021" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c1655fa699e13748ab5202304d038d6e00000000020000000000106600000001000020000000b4d2945d5f95cb6c5e8e1e03550d488a463d69201c7cbc3f55f0ab0ab945c296000000000e80000000020000200000000a0d99a6ab815601ce914b3dd598ccc5ccab2e6a3b8fdf83f4f6a4adb1e7f33e200000007c2290efb782239003023e12ca80baf57202a9d8ef73ae5431edfb39b5eaf8ab4000000060f231caad58888fe0cadf57e920e48de5e6422f8c3a46aa947809a4e0e919b7de53ef7274ced56eda8ebafec675ef4a541e7282f684614524ba86e3dae455d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e085e562abedd901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A73D47C-599E-11EE-8566-6E0EE6976593} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72CA13D0-599E-11EE-8566-6E0EE6976593} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31059371" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a032e348abedd901 iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4464 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 3076 EXCEL.EXE 4660 vlc.exe 352 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4660 vlc.exe 352 vlc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3076 EXCEL.EXE 3076 EXCEL.EXE 2960 irsetup.exe 2960 irsetup.exe 1796 iexplore.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe 4660 vlc.exe -
Suspicious use of SetWindowsHookEx 50 IoCs
pid Process 2960 irsetup.exe 2960 irsetup.exe 2960 irsetup.exe 2960 irsetup.exe 2960 irsetup.exe 3076 EXCEL.EXE 3076 EXCEL.EXE 3076 EXCEL.EXE 3076 EXCEL.EXE 3076 EXCEL.EXE 3076 EXCEL.EXE 3076 EXCEL.EXE 3076 EXCEL.EXE 3076 EXCEL.EXE 3076 EXCEL.EXE 3076 EXCEL.EXE 1796 iexplore.exe 1796 iexplore.exe 4752 IEXPLORE.EXE 4752 IEXPLORE.EXE 4752 IEXPLORE.EXE 4752 IEXPLORE.EXE 4660 vlc.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 2152 OpenWith.exe 4420 iexplore.exe 4420 iexplore.exe 3444 IEXPLORE.EXE 3444 IEXPLORE.EXE 3444 IEXPLORE.EXE 3444 IEXPLORE.EXE 3444 IEXPLORE.EXE 352 vlc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2960 1276 TLauncher-2.885-Installer-1.1.3.exe 70 PID 1276 wrote to memory of 2960 1276 TLauncher-2.885-Installer-1.1.3.exe 70 PID 1276 wrote to memory of 2960 1276 TLauncher-2.885-Installer-1.1.3.exe 70 PID 1796 wrote to memory of 4752 1796 iexplore.exe 75 PID 1796 wrote to memory of 4752 1796 iexplore.exe 75 PID 1796 wrote to memory of 4752 1796 iexplore.exe 75 PID 2152 wrote to memory of 4464 2152 OpenWith.exe 80 PID 2152 wrote to memory of 4464 2152 OpenWith.exe 80 PID 4420 wrote to memory of 3444 4420 iexplore.exe 82 PID 4420 wrote to memory of 3444 4420 iexplore.exe 82 PID 4420 wrote to memory of 3444 4420 iexplore.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\TLauncher-2.885-Installer-1.1.3.exe"C:\Users\Admin\AppData\Local\Temp\TLauncher-2.885-Installer-1.1.3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1910546 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\TLauncher-2.885-Installer-1.1.3.exe" "__IRCT:3" "__IRTSS:23661420" "__IRSID:S-1-5-21-844837608-3875958368-2945961404-1000"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2960
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\FormatWait.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3076
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RemoveOpen.mhtml1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4752
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ReadComplete.rm"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4660
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\UnblockUpdate.dll2⤵
- Opens file in notepad (likely ransom note)
PID:4464
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -nohome1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4420 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3444
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnblockSend.mpg"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{15222CC5-53AE-11EE-855F-7E84DCF5EFA4}.dat
Filesize5KB
MD5ca48d46bd4cb142df1f4877c9e8f1f1f
SHA14b79f6e0aee1d7ced4d206b0179baaf3e5dd74bd
SHA2562de6393b87527688fe7ae4fee91388cd59b6083bd4bf35ca504e45f9a7de596f
SHA512b8a4b80ce28f2a885278f97ce24cfa7b23ac506ab969655350d1987bfe90852a155d82a089de1a0be5758d6488199dc4cbcffce09a1e88901385ecc078aad06b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{7BAA351D-599E-11EE-8566-6E0EE6976593}.dat
Filesize4KB
MD58e68f2dc3e89329047a69ab2f3ec4cf7
SHA1875228f1462c5c88c450aa37e964c256d2ae65c8
SHA256b29c5e0f1c22ce5d230b646266e7f3b3d0cbef53750d15dbc3b5f8c239008c0c
SHA5120183b3385fe94ec60e7523f5119b382870bcaef2433356de1f68ca0e749d62bd70def9a1ba3bd0add2b0c5def536cf9bc5503065d3f0766dc41d22215248451b
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
116KB
MD5e043a9cb014d641a56f50f9d9ac9a1b9
SHA161dc6aed3d0d1f3b8afe3d161410848c565247ed
SHA2569dd7020d04753294c8fb694ac49f406de9adad45d8cdd43fefd99fec3659e946
SHA5124ae5df94fd590703b7a92f19703d733559d600a3885c65f146db04e8bbf6ead9ab5a1748d99c892e6bde63dd4e1592d6f06e02e4baf5e854c8ce6ea0cce1984f
-
Filesize
1.8MB
MD5cb50d496ae05fa1c8bfbcb3b7f910bfe
SHA13ec4d77b73c4d7e9858b11224314e99d082497a8
SHA2567616c72f6659a3a2439d0452190459cd4ceb83fab2307e3e47c9604fa29d9f34
SHA51222051de06c7e52a37ad36250aa095a8ccc0b0e1cdbfa2e9073c146e77e278cbdbe89bdb078dcfd8babf48baec1902b303ac39cc9db4114ce1516b06552dc924d
-
Filesize
1.7MB
MD51bbf5dd0b6ca80e4c7c77495c3f33083
SHA1e0520037e60eb641ec04d1e814394c9da0a6a862
SHA256bc6bd19ab0977ac794e18e2c82ace3116bf0537711a352638efd2d8d847c140b
SHA51297bc810871868217f944bc5e60ab642f161c1f082bc9e4122094f10b4e309a6d96e3dd695553a20907cb8fea5aef4802f5a2f0a852328c1a1cd85944022abaab
-
Filesize
97KB
MD5da1d0cd400e0b6ad6415fd4d90f69666
SHA1de9083d2902906cacf57259cf581b1466400b799
SHA2567a79b049bdc3b6e4d101691888360f4f993098f3e3a8beefff4ac367430b1575
SHA512f12f64670f158c2e846e78b7b5d191158268b45ecf3c288f02bbee15ae10c4a62e67fb3481da304ba99da2c68ac44d713a44a458ef359db329b6fef3d323382a
-
Filesize
1.3MB
MD5a70accbc1f1001cbf1c4a139e4e5d7af
SHA1138de36067af0c8f98e1f7bc4c6bea1d73bc53ab
SHA256b000fef41ce0267255701aacc76c02159d207212c4595437077e7904b7968ca6
SHA51246fde27847dfab38d2f6fefca31677a0d5a5ac775951fc19f1fc0b4ec56969622f0c4f036ecacc05b33854871f03232a4944f3e93a747280cac622503f5c4f04
-
Filesize
1.3MB
MD5a70accbc1f1001cbf1c4a139e4e5d7af
SHA1138de36067af0c8f98e1f7bc4c6bea1d73bc53ab
SHA256b000fef41ce0267255701aacc76c02159d207212c4595437077e7904b7968ca6
SHA51246fde27847dfab38d2f6fefca31677a0d5a5ac775951fc19f1fc0b4ec56969622f0c4f036ecacc05b33854871f03232a4944f3e93a747280cac622503f5c4f04
-
Filesize
326KB
MD580d93d38badecdd2b134fe4699721223
SHA1e829e58091bae93bc64e0c6f9f0bac999cfda23d
SHA256c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59
SHA5129f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4
-
Filesize
16KB
MD5e0d704fb1613b47a7edf508f594ab082
SHA10e0af8b453799abd7c313e89118c15513d3996df
SHA256172d7d7e31db1bf9f6ea939a1af7817631a753d1e90b921ea03b5574aaa931b1
SHA512c4bb28d352f3f6e0f15e729b54d4b27aba6abf677d3507fd1dd0ebc4ae3ce05ad73be561e89129edc2089e543d2c0b5368f4afc63587d92023462fa83ee59fd4
-
Filesize
77B
MD5734dd4009cc9f8bc95866494ed797e71
SHA18d3b698727a81328f1ff7630d763faeffcc05bb3
SHA256c6205d344a5d2beac508b02cef2babf1e3b819b7329dbcf30a42e31c870778d9
SHA51268a0c54d0770c20d7390bf1c527bcbe1bdbb580f2cf5b4b2f5bab9dad988daaada746759bf82edeec801758dc560da0337d516fdba58037c91a0a5c4ca327e30
-
Filesize
1.7MB
MD51bbf5dd0b6ca80e4c7c77495c3f33083
SHA1e0520037e60eb641ec04d1e814394c9da0a6a862
SHA256bc6bd19ab0977ac794e18e2c82ace3116bf0537711a352638efd2d8d847c140b
SHA51297bc810871868217f944bc5e60ab642f161c1f082bc9e4122094f10b4e309a6d96e3dd695553a20907cb8fea5aef4802f5a2f0a852328c1a1cd85944022abaab
-
Filesize
97KB
MD5da1d0cd400e0b6ad6415fd4d90f69666
SHA1de9083d2902906cacf57259cf581b1466400b799
SHA2567a79b049bdc3b6e4d101691888360f4f993098f3e3a8beefff4ac367430b1575
SHA512f12f64670f158c2e846e78b7b5d191158268b45ecf3c288f02bbee15ae10c4a62e67fb3481da304ba99da2c68ac44d713a44a458ef359db329b6fef3d323382a
-
Filesize
326KB
MD580d93d38badecdd2b134fe4699721223
SHA1e829e58091bae93bc64e0c6f9f0bac999cfda23d
SHA256c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59
SHA5129f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4