Analysis
-
max time kernel
152s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 23:20
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Install.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Setup_00.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Setup_00.exe
Resource
win10v2004-20231215-en
General
-
Target
Setup_00.exe
-
Size
1.2MB
-
MD5
d59834b63e2b500a74130c07bb801ce6
-
SHA1
2bb98af8a9f643d4ba1ec1b7166b197526e3c30a
-
SHA256
c3c52be4316da1412f125ed5551a282ca977fb2764ad15074ec3bf91803e8678
-
SHA512
89011e6bffb19121b2751b8cfe777bed8f5e898dcadf764f38d4726eebbbc5889874a7ee5c58ccbb77f268566807626845b815e71b7d7be0fa5d43b06e491ae4
-
SSDEEP
24576:bPkPHxZN84YhACUpsjQ9XaqK/FSCwhSQoQWD7zBNDujvbOHMm:b6ODhAmWK/vXDPfHMm
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Active Setup\Installed Components Explorer.Exe -
Executes dropped EXE 5 IoCs
pid Process 2180 eToro_MusicOasisInstaller.exe 2996 vd.exe 2912 Forextrading.exe 2952 appsetup.exe 3036 eToroSetup.exe -
Loads dropped DLL 19 IoCs
pid Process 2212 Setup_00.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2996 vd.exe 2996 vd.exe 2180 eToro_MusicOasisInstaller.exe 2996 vd.exe 2952 appsetup.exe 2952 appsetup.exe 2912 Forextrading.exe 2912 Forextrading.exe 2912 Forextrading.exe 3036 eToroSetup.exe 3036 eToroSetup.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe -
resource yara_rule behavioral3/files/0x00090000000170e2-16.dat upx behavioral3/files/0x00090000000170e2-41.dat upx behavioral3/memory/2952-48-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral3/files/0x00090000000170e2-46.dat upx behavioral3/files/0x00090000000170e2-45.dat upx behavioral3/files/0x00090000000170e2-44.dat upx behavioral3/memory/2996-43-0x0000000000410000-0x00000000004B2000-memory.dmp upx behavioral3/files/0x00090000000170e2-42.dat upx behavioral3/memory/2952-66-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral3/memory/2952-80-0x0000000000400000-0x00000000004A2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Setup_00.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral3/files/0x000c000000012266-4.dat autoit_exe behavioral3/files/0x000c000000012266-7.dat autoit_exe behavioral3/files/0x000c000000012266-5.dat autoit_exe behavioral3/files/0x000c000000012266-10.dat autoit_exe behavioral3/files/0x000c000000012266-9.dat autoit_exe behavioral3/files/0x000c000000012266-8.dat autoit_exe behavioral3/memory/2952-48-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral3/memory/2952-66-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral3/memory/2952-80-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2296 3036 WerFault.exe 37 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40938251ae37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c000000000200000000001066000000010000200000002ba2e2749dc72b17f6b2c4b6f4abd28119cad0b81d650e1c197a3ed4c0ed5718000000000e800000000200002000000028431368b735d654a7517db237104a0ee882eaf0264494f349cc8a29301b039a2000000094acd236378daf267e7955fcf087edf996de973a5c94281b3b40d3a8170a049f40000000fe5f29e60d32501246f2a7bae1ba8d88d2b40f73ce714b2964825718f94359361b1fd12b8ae8a34bb0ede504e5901f290d52f4da7a37477ab56f70e3d067d484 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409724292" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C497E51-A3A1-11EE-B092-D2016227024C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.Exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.Exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_Classes\Local Settings Explorer.Exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Explorer.Exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.Exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2952 appsetup.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2680 Explorer.Exe Token: SeShutdownPrivilege 2680 Explorer.Exe Token: SeShutdownPrivilege 2680 Explorer.Exe Token: SeShutdownPrivilege 2680 Explorer.Exe Token: SeShutdownPrivilege 2680 Explorer.Exe Token: SeShutdownPrivilege 2680 Explorer.Exe Token: SeShutdownPrivilege 2680 Explorer.Exe Token: SeShutdownPrivilege 2680 Explorer.Exe Token: SeShutdownPrivilege 2680 Explorer.Exe Token: SeShutdownPrivilege 2680 Explorer.Exe Token: SeShutdownPrivilege 2680 Explorer.Exe Token: SeShutdownPrivilege 2680 Explorer.Exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2952 appsetup.exe 2952 appsetup.exe 2952 appsetup.exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2636 iexplore.exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2180 eToro_MusicOasisInstaller.exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe 2680 Explorer.Exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 892 IEXPLORE.EXE 892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2180 2212 Setup_00.exe 28 PID 2212 wrote to memory of 2180 2212 Setup_00.exe 28 PID 2212 wrote to memory of 2180 2212 Setup_00.exe 28 PID 2212 wrote to memory of 2180 2212 Setup_00.exe 28 PID 2212 wrote to memory of 2180 2212 Setup_00.exe 28 PID 2212 wrote to memory of 2180 2212 Setup_00.exe 28 PID 2212 wrote to memory of 2180 2212 Setup_00.exe 28 PID 2180 wrote to memory of 2996 2180 eToro_MusicOasisInstaller.exe 29 PID 2180 wrote to memory of 2996 2180 eToro_MusicOasisInstaller.exe 29 PID 2180 wrote to memory of 2996 2180 eToro_MusicOasisInstaller.exe 29 PID 2180 wrote to memory of 2996 2180 eToro_MusicOasisInstaller.exe 29 PID 2180 wrote to memory of 2996 2180 eToro_MusicOasisInstaller.exe 29 PID 2180 wrote to memory of 2996 2180 eToro_MusicOasisInstaller.exe 29 PID 2180 wrote to memory of 2996 2180 eToro_MusicOasisInstaller.exe 29 PID 2180 wrote to memory of 2912 2180 eToro_MusicOasisInstaller.exe 36 PID 2180 wrote to memory of 2912 2180 eToro_MusicOasisInstaller.exe 36 PID 2180 wrote to memory of 2912 2180 eToro_MusicOasisInstaller.exe 36 PID 2180 wrote to memory of 2912 2180 eToro_MusicOasisInstaller.exe 36 PID 2180 wrote to memory of 2912 2180 eToro_MusicOasisInstaller.exe 36 PID 2180 wrote to memory of 2912 2180 eToro_MusicOasisInstaller.exe 36 PID 2180 wrote to memory of 2912 2180 eToro_MusicOasisInstaller.exe 36 PID 2996 wrote to memory of 2680 2996 vd.exe 30 PID 2996 wrote to memory of 2680 2996 vd.exe 30 PID 2996 wrote to memory of 2680 2996 vd.exe 30 PID 2996 wrote to memory of 2680 2996 vd.exe 30 PID 2996 wrote to memory of 2952 2996 vd.exe 35 PID 2996 wrote to memory of 2952 2996 vd.exe 35 PID 2996 wrote to memory of 2952 2996 vd.exe 35 PID 2996 wrote to memory of 2952 2996 vd.exe 35 PID 2996 wrote to memory of 2952 2996 vd.exe 35 PID 2996 wrote to memory of 2952 2996 vd.exe 35 PID 2996 wrote to memory of 2952 2996 vd.exe 35 PID 2680 wrote to memory of 2272 2680 Explorer.Exe 33 PID 2680 wrote to memory of 2272 2680 Explorer.Exe 33 PID 2680 wrote to memory of 2272 2680 Explorer.Exe 33 PID 2636 wrote to memory of 892 2636 iexplore.exe 34 PID 2636 wrote to memory of 892 2636 iexplore.exe 34 PID 2636 wrote to memory of 892 2636 iexplore.exe 34 PID 2636 wrote to memory of 892 2636 iexplore.exe 34 PID 2636 wrote to memory of 892 2636 iexplore.exe 34 PID 2636 wrote to memory of 892 2636 iexplore.exe 34 PID 2636 wrote to memory of 892 2636 iexplore.exe 34 PID 2912 wrote to memory of 3036 2912 Forextrading.exe 37 PID 2912 wrote to memory of 3036 2912 Forextrading.exe 37 PID 2912 wrote to memory of 3036 2912 Forextrading.exe 37 PID 2912 wrote to memory of 3036 2912 Forextrading.exe 37 PID 2912 wrote to memory of 3036 2912 Forextrading.exe 37 PID 2912 wrote to memory of 3036 2912 Forextrading.exe 37 PID 2912 wrote to memory of 3036 2912 Forextrading.exe 37 PID 3036 wrote to memory of 2296 3036 eToroSetup.exe 39 PID 3036 wrote to memory of 2296 3036 eToroSetup.exe 39 PID 3036 wrote to memory of 2296 3036 eToroSetup.exe 39 PID 3036 wrote to memory of 2296 3036 eToroSetup.exe 39 PID 3036 wrote to memory of 2296 3036 eToroSetup.exe 39 PID 3036 wrote to memory of 2296 3036 eToroSetup.exe 39 PID 3036 wrote to memory of 2296 3036 eToroSetup.exe 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup_00.exe"C:\Users\Admin\AppData\Local\Temp\Setup_00.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\eToro_MusicOasisInstaller.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\eToro_MusicOasisInstaller.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vd.exevd.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\Explorer.Exe"C:\Windows\Explorer.Exe"4⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:2272
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\appsetup.exe"appsetup.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forextrading.exeForextrading.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\eToroSetup.exe"C:\Users\Admin\AppData\Local\Temp\eToroSetup.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 11365⤵
- Loads dropped DLL
- Program crash
PID:2296
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c087db0cb353989f38ab94fab076320
SHA1310d572ebc303009dfe6f8e1bcc12b54e933977a
SHA25686116c280b15e173f4d2a264a76b3330fb92b606c71142270fce405989eba1ca
SHA51269f4b056762828d6db91971b62cfca1f844348d07e014a76397efb49dd039c43a4f0204aa6f571b06eaacd80c0ef87229fa2fc1436f3b89bf486e06ddc22c5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56457679289750e32c5a74ea05238ea19
SHA126ec8b297637dadc5606b3e8bd8ce43b4f82dc1d
SHA256c040f52865957b54a22511a13b73961922db26e6844d20159b33d3c960fb83ae
SHA5123afe37be19cb024ba840453c3dc26ecb9c063c9c747c426bfdce58845828621e42910be11193e4576a74c7e2b2912c25f18ea4ad458c5ce0a4c1f23653992de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50958c8b90235959cce40ba20b30b807d
SHA13348c1bd247d31ff3b8eb8301c718472bce6171f
SHA25688aa37c91e4335251e531426657d71d5ef0e3c7b96558b2c13f1885458dc6f22
SHA512befcd1c878c56577816c379c42832837ae4c411ad317df1a5c7b0ce307c3606d060833f25a7141b50ef5e6aeeb4211bc7b8afc2a572391e137f336613319054d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b770d7e4134242bba41c27c6a0e05bf6
SHA1c42c1513c1f868bd98f7f466f0aa7128c8588165
SHA256b3988b9a82ddec9c5ffacba1095a3511eacd3b94883c421d0fbf644c7141e329
SHA512b642ee9710bea9014eee2962d659eb25262b06dbc05023fd390b6db10090e367c3296c4129f8f1eaa88dc89ed487c1826aa5ebc08ef7d6be1e2c8702fd27d1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ee26017c6e6035c56b59c5667077beb
SHA15c7cb4f61aa3676d5227fafeeeeffb8ac93afae8
SHA25650a891cfe618dc684c6b6069359e06104240da04d58453f0aff3be552da28285
SHA512dcabf67e03cc4359a7d97a806d519c56141949e64fc8779f5e72c3cd75ea4d1cc260e733a0df1c3cfa70c203ba39e77b8c6187e0268eaa109582c6503a678c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a04286eddea15cc17374495f8efb415
SHA1df142fa45b3890e1f1850effb4f50e1add73d723
SHA25629601c8d69456f5458542df73df90648b7cebcdf07bccc058fc8af947b28f99e
SHA5123549987de1bf544015c09463d7141d8b8a18b9f6da427d39bf197534fb9c93f233a8b3fd051b01372c0c50faf38935630c110b853b45f16e9221693a4d3a1b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5170b2c9a4ce28137cfd857ac13503144
SHA13246866478aa4cfc56e738a7374ca58a1e234f64
SHA256a022ef4a784c50df23553b83db0cbdbf51efd61643f41d1a3f82d53f81511abd
SHA512b2db3e37d8a44d1d6dfe3713531c21cb40b3bb618ee49e3325a9405704a220544a463ac6eef5fb5f91105fe63dc2433a454b77af9aa307e08f5775eecede2469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f77a87ccd41c86692eed93551179b493
SHA13e79ed05e4f81f72457bc84ddc8006fcbff31f94
SHA2568ceb3b5b9266dd4a69e3fc175af5ae8c6445890f36e5cc0d8f3b423fcd63b113
SHA5122105dc6ed84876cf0c610ed91422487eb69aeaf270637698e0f078e3212704a58ff265bb989c61d1792fb3f96e7608f19991e9308e43507bdac6689e1d2a094e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a87658e5def478790ee1d1a289a0902
SHA1a1d4e63f42e9ecf4080a11af285bce7d93680516
SHA256f811040f0278e3fd37b915e1e7dd954ae336bc28c750dda959b269f22a953bc8
SHA512d28c84e07ad68add0c341cbad9b5900e9cc00ba2f3051f4fe5ac4f4e1436f50f2d614b45dcc0e940a72a523a0dd3655a3c36735c22cdfca44d467d10068b3999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54becb0b5a956c7da041f685b0218db9d
SHA147a0051aa69705e5a47c20cf582fe672005c053a
SHA2560359dcd8b33ad5c80307ffe8e4942192179619e17c59801b7621ee2814e1d1ac
SHA51291fee4295c3c13aaf70e7f0f74f5b99c7313991a32b839fb8fdf6b0d2cc1765253cf5d932980cbbc5ab9f78d46216bd5ff2637d4953d93f6c7fdac89ac34e569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52903b1a8227f94eb8d59b3e330158177
SHA1efb7d4db64c0e9929b5d8754ed31832575bed324
SHA256e1ece6d5e3aab7addebf440eb5d4de5dbca922d27c03a7bf1a878cd0ab47ce7c
SHA512203670150e39e14295bcb35641fae621311a8fbdf5dd4e63bb9d6c3bc028664281a0b160112e64d011dbbcc006c2489c67d9637aa42403d903b11647bdb9313d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552821c9feb1ce26d164bfb34139c21b7
SHA1ca5b0f028ec63540dee4baf07ff94f2eaa22b37b
SHA25666bc0018a280712950ac4337605f0369e09b5ae92eb92a8f0ed50e6952f1a1ef
SHA5126f489066da6bf18df4affc25a78edfc88285fa0d36f275e740c03832dc095b9c3d6c4264136857a61ec494b2ff418b9b127a66b7d9ba5c618f721474eecc0696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b04132a284b0299d588a2c3896606b2b
SHA12b88a12086e2205d37e5c460e6104edf4077b5a2
SHA256d683985050ac706ba55560cfd09d0146140f5718e9838a9c497aea8290f86a56
SHA512fb6c466a73c011bad58399998f9a75e60fb694ba16457bdaba7e15fd4fe363714fd304cd8081aafa78eae34d71dc829f3755339223bc0be684ae48608041a707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d74e781f7a0c60ba054a8badda416b48
SHA115cf9f66529ed038c3a28bdb594f3e90d29f4fe0
SHA25643ff3d4f2919f286885c6b1d4f973f794a0ed536ecc6a23e50f293362535ae22
SHA5120dd6865d6841825751adbbbff1822b6d500ec1077dfb1fca5cbc64153c8b3e4ddb33e2867b3066d23be86b970aa36bd88087e0ae4089f75e2384c0f7bbd2808d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa18f3e0a9f41212d6d3dcb52e935db8
SHA11b6df8d9e4b467f1aa398050bdf083f9ffcbc2d5
SHA256e1bac862d87a505b5095d5e295d98d87e2fd246f0e6a53547b9cee7e1f91601a
SHA512a8f3ce6eac5b4d55c82baf20aa107870bd046ef1de578d05d3e978794d7ec3c7f27bb7dd032444d9977a46dd6512f295df1c850307b33e03c8eeef42d1fa22ba
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
91KB
MD5bdba7f72a218e7f1bfcb4fc16da4cd70
SHA17080262d3c8ec0e826e4f975c0fbfaa54d252e87
SHA256a893b2d7399a7fdcaa174a663928509ab1f25d7948374279775ab9141c1706e1
SHA5122dd797871bbdfe1969de3a979cdb0bf43e167dad61ec235a5f966176b86d503eaa8d25d4be2121a771ccb15a48341d5843b6627be7247b71b50148c76d62a87e
-
Filesize
65KB
MD599e37e5eaa3c52838b73ba96f2e135ba
SHA1d20555dd6e4d185be5514c99521ad9b3771e9c0b
SHA2568a3052f8403684f07e75397a9ba2065e8ae88f1199bafe4de08945e740616c8c
SHA512e0dae5fb171226e82d7a8b4a5ee7d028adfb12105da9a850d14d834f60180d2fb7d433cd574937b581083ba2ae809d50dde1be6c4fce8df629a63da4f76d2a68
-
Filesize
54KB
MD547e83ea76060fafb570da9427631e623
SHA12174ebddf9ac2278282b0d7f3eaa2198c2de2a7c
SHA256005570f6d7f4f4511ae268bbc42f253a1576d17b4533ceec348733feb290eebb
SHA5123779473596a8eed0c291f1f4fb8c828a60a5b1b3f3f280f067878e0430493e10909e810628ca544c999238a365f7d6744f93687bfdc0f412668c44012afdcf96
-
Filesize
82KB
MD5ca107e1db99d2548c1228ef24193246a
SHA17800179b1550656903c4e95a8668aaaaff87e4f0
SHA2564c14dec8774a79d1ddaaab2861c2616602c00d31d122b6e72c13e3a5df55e727
SHA5121580b1deb49ce4b89057e6c199dcbaa4d40ec4d5209677764cdb0ca78dad652d3cc52903971e65597a54229009f0f38b27822c8543b4ad82028b1d8dfd618d18
-
Filesize
110KB
MD5e38317066ccba19917e36cd33e6e3554
SHA1cfdd087af7e461bbd4ca7ffe54078a7cdcc003ee
SHA256aaa0a73e8b3e1191e0cd988587c0fa021dc4a1958403297422dcad070ea605bf
SHA512c394764799c5ef8f18dd3085eec6aec63326a0649aa168fd24bc53e5aee88526acd890fbea6c7ce80310aa4ef406f9a00f10de6445e650c004a868b750f3b9bd
-
Filesize
95KB
MD581f3fcd3970e56f54af8b4ff6a7acfd9
SHA123dda6e5fec4607b6ed117857267da9dfa03eda0
SHA256ec492cd88a42c738b82ac5e75fd89c5380053a95e39a12d29d72aadb45dba67a
SHA512b5f090e3c3a8b4dfd1de3a05e1b1978dc1da2893fc9a3b3e20bd000ddcc9712246f52bb46571ed7324ae8be7dcc4a1df9f5a4abd1fc418876fa7963273fa413f
-
Filesize
881KB
MD501162668f50e680bb6d92ba17411d00c
SHA182a2c6ffa9115b22191cc4029154e9d94c8bcba1
SHA256c0da604728c1734ff1eb53e5809f4712469e1898b2f4dbd536dd5e12d2929bd4
SHA51269540f51444bbb09c9e9cba60a2621d6dafd31138ad2fe197114f1689e8f97e1234178e478a0a5e0c9035b3ebe1089d3ae8706ce5041b7c0fa555ffd127d833d
-
Filesize
785KB
MD5d605166dc1711de68df5b2416dc056fd
SHA17f718e91ec2b137f2c9e17c692ac92a3c67e5437
SHA256b71a272400c2508b4a60be03df99ad089294816905405bf4573483eea15109bb
SHA512b5e0f39cf3781eb202f6d3a72aa6240913af03c45ed9d7dce79baa59b5fe96d1dd156be496bfe2f7e2dc610f5f4c099f95cfa08618f26a1befaf711e8fe365dd
-
Filesize
176KB
MD5eb73f7beb853eb0d539703c1a8efed6b
SHA14509e0ac5e83caee07300585dac6f37e3b7bcd75
SHA2561d4c8fcd7fd32adfcb7ce62b2ab5956ee6f59cc99fa7318e6ef7514fe5ac91d9
SHA51212ca652f9b4987ccb6e8343a1e0600079a4f8f95efec241b4d0dfad2141479fd6aab1c17b22ff3b81cdedc085e1cf4cc540258ab722168c95932b9035cf9f21b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
82KB
MD5eecc1ea4891d379ca92f54e25731319a
SHA175fbd661c32c8e322957e76ce03f32bad4722460
SHA2562b046821e37abc5aa91b822493e4c5fbb802c483b79d114be5aee30fc8332c4b
SHA512a1db4e916c0d8d9633690b0a83cdee6db173c00ba1da933831006d058668fdc469f9d1b2d202d69ab9c3e4159c10190deb9130f7ab256816c248dddd66cafe40
-
Filesize
92KB
MD5ae43c4e21eb3ce59abc11a05715b3ded
SHA171ff6401da206f316ac0763d458dd5035c74349b
SHA256cfbb3ee7d20862277a2f64c4bd375769a3f94434d7440b3c70302e4ca204d451
SHA512f45ca34601c36333b4842c592381677fa042ee7c8e40d83bce71758f3288c3e261ee83a65e3226416545a0506a0c1c3ca1058e2fbd7d082c45b1c5cdf3bc47a7
-
Filesize
45KB
MD56f989cedc2a1bcaa24b04eacfcd53245
SHA1b311f8c8b247585067a2e48a37ff228e71efb7e8
SHA2568e6dd82386168ef56221393f856c41fc2389c1736ca304f9240840be3034620e
SHA51203b763e4846c20b81fe851b43fd1f5969043b22f6aab4d5d418d57785819e43c093489b7622245ba9ed09dc7de357b5808f568b0653c3664ebe6e9e5f2763675
-
Filesize
68KB
MD5f2dfba9ac47605f67bb5c0d185fa6b6b
SHA15711494354b231832cfe1558af76b47dfe91694d
SHA256bcfa6f63ce9fc1dbeeb379c99a347efa0c3f92e9e5ecd9759014ce1a3fdcb6cc
SHA512ecef57501f6357debb476aa06d2e9ffc4f33518adda0301159d1b16ecf03d8242246dea4f1d5e8d84bb4447be58cc9401e5f84d310dc2d7cc38b4e7980f11c9a
-
Filesize
65KB
MD535a46215a31d90d9be96f82bc8f401ea
SHA15d44913c4cb6226ba2c38fb02dff55b507f0a4e3
SHA2568e4612ca798bdcf20cf5366bef64ec4a5f4246dbed589f0e248ff940726d7bb9
SHA51205e069a0f1b7255adca5daa95d0c90b92b060f972c4e0f5f7e203c9edb7fa70365923e4d261f7e62c0ec725328ebae69177f1829bf23cdbe86019971172ccecd
-
Filesize
89KB
MD52627c73deba4d5e885dcd37c1f6404b0
SHA1390276f126d42f68ed22b36bd6b6e032b359e3ad
SHA256bedd18a90131167464c26f05d3991c04fc1a664bf62bb74cb7c44edb18d9202c
SHA512f7d44478696f109d8a9bcdec9fe75d2496d9e1d337c8b9217e4b462d3eb2526e27d29bc4e5f6be346c1cf5d578a2757ac2c16209a1a09f9dfb4c9eb4be65ce08
-
Filesize
59KB
MD5ba624eacde1ad3d0721ea65627adab76
SHA1031153f194d755cfa337664fa2012f18e157a822
SHA2565338b6d214e6b423ae380855bd826a07ac0533cf85637f5d3bd971709048a1b9
SHA5126eae204c382ee232561309317852ddeb830bcc44db7d5f159d0dd384dd8a22dd48f94c2db18121d97f20918f81d8b7fa548057e56dcc85644ad5ae41bf55e524
-
Filesize
154KB
MD51adc1467e385361aed13103eb31f304b
SHA136cd6196edb62ecb86dd0f813dbff46972e483be
SHA2565a4a89e7d2fcbbb617876e1549e92946f0c8bc3ca67dbbf0185194c8d5e23116
SHA512a919dc0d334943db88424167c9416e48d8db64d5e4f348e7509a895817be12429d97334246bb940852496bca81f52f5ab165e55d300558e33605aac8c4bb0ea4
-
Filesize
919KB
MD5b9e27522dcd5281a191334f67963435b
SHA1071cb583655309b904d2728728f515480714779c
SHA25658d41adc6815e2d19fdb23549e3db2137963416b695cc6fe9154af24d870df62
SHA512b2d328d4dd814ef01ea9b4fcfea0e04a04a0c8646e73b8660704aa57dd58d34c197f5ab8d4295219244fb39b0fb8fe153a2a7bd23e3a03b1e7288a43e3089aa7
-
Filesize
307KB
MD54c60a35f4e9ad1dbf8a4b50ca25b03af
SHA1cecd3d6b104273d9b2881ff137be10588e015edd
SHA256d4137a2f5d24e4ce76465dc8af0a7df06a4839266ed988a9e8bbd45fcfffc2e6
SHA512e03356ecb77d046e3756844121762032bfa97a124b89173433bbe9c1db5d6c5e9841c55dec00bd2035db6091609587a479b83b75f924817b1202e4b3b4e3db05
-
Filesize
50KB
MD55e9015cf5ded25fa0e03f67d4d6e472e
SHA1db44fdea94feae4a3df03d6ca966aeef86a9557e
SHA2565ba4b4e98cc0f75e94c2f9e24ad0ce1be23c0d9ac0a022b90b96c8d304a4608a
SHA5125e18f2948e984c61db186a16621c303338a10f733050b5362b5539c6b04a5e1e51a1f64553f2f7d00d40326e4e7a3b94d0f65a27a0561991c93490a026d4693b
-
Filesize
72KB
MD55189c15387de17b627765ac3d8c9f34b
SHA1e90de0b2158b02ef345b8bc3904a6eca1ee4a520
SHA256a3d51693013624959c979dd4bcb6f7b84b0767294ac74463361eb47f39e125ac
SHA51276138e0493f533f5654445a3999721935ad22613319f03b06146af609e987ba75839e663588878fcaa516e60915ff3677cdb1d8587655bcb287caff17f1a2ebd