Analysis
-
max time kernel
52s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
1bbbbc82d10f76fb55e59db6ef5a9646.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1bbbbc82d10f76fb55e59db6ef5a9646.exe
Resource
win10v2004-20231222-en
General
-
Target
1bbbbc82d10f76fb55e59db6ef5a9646.exe
-
Size
27KB
-
MD5
1bbbbc82d10f76fb55e59db6ef5a9646
-
SHA1
960c9c18f6331aa7c8456697558547b1a14ea45d
-
SHA256
715407f67e1d86df046811c6953cc1ac107bc0b56a0ee946addd88eb974f70c0
-
SHA512
5f2896483349c8619acebe7d21b8cc8790a15944c6d41d17ef3d891b6487b43d2ce4c5ea8acc9912a910f56543566a4d32f8d925ad9ddb74abfcdc20590d211a
-
SSDEEP
768:liNvieDmMeGcJSi5YJ64xCbNBX5M2Z21b/hQdvZi5Wj1F0:MNRD0G+G6oCbNBBZkhQdvZi5WP0
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4512 csrss.exe 5000 csrss.exe 3300 csrss.exe 1752 csrss.exe 3972 csrss.exe 1932 csrss.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wbem\csrss.exe 1bbbbc82d10f76fb55e59db6ef5a9646.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File created C:\Windows\SysWOW64\n.ini 1bbbbc82d10f76fb55e59db6ef5a9646.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini 1bbbbc82d10f76fb55e59db6ef5a9646.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe 1bbbbc82d10f76fb55e59db6ef5a9646.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CBB41F4A-A3BD-11EE-A0B6-6AA3E029E500} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31078346" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B3EAE7D7-A3BD-11EE-A0B6-6AA3E029E500} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015a2f750fe9ee1479ecf0c8cfb11934c00000000020000000000106600000001000020000000750b56d1674be03986c8c8ac500a482d8e10afeb39e22eadc2fca72545d7104f000000000e800000000200002000000078234559209300ff1adf10f5a1cb6638bc2cf22644f23113cff91e09b74f69672000000056a58f05ea1f07458cf177fa0011955471708efde4df200136d043f3ac16fa7b40000000c3a82d506ded62a49210d1052b30449f88dee280d870ce1f5222f06c22d9d9c13d920face238c6387013a3dc37a2e17ea11a82ea67b9a2f6450897bdecb0598c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0039018dca37da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c8fe8cca37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2302079556" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015a2f750fe9ee1479ecf0c8cfb11934c000000000200000000001066000000010000200000007b67cfcbf832c2768332c94795187e4b776b24b9c8037994573fbaba3fd8d8fe000000000e8000000002000020000000a472cb5934ab8153d8ff0e25ce7e84e13b4230b8f622dc1edcc0731b6e9664fa200000006c103c1fefc4ec0cd4f0da46fb5eeac23eb1a972d0cd2e1c3ce45449c12e52a540000000049829690afeb211054c60538aad9c58c2dd18f0afbf90b71b4c8d3ff34604d5b1251cf96d4ac43e221996d713c9d23206b3febe546f7344ed08f2212f0bd889 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31078346" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2302079556" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3604 1bbbbc82d10f76fb55e59db6ef5a9646.exe 3604 1bbbbc82d10f76fb55e59db6ef5a9646.exe 4512 csrss.exe 4512 csrss.exe 5000 csrss.exe 5000 csrss.exe 3300 csrss.exe 3300 csrss.exe 1752 csrss.exe 1752 csrss.exe 3972 csrss.exe 3972 csrss.exe 1932 csrss.exe 1932 csrss.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1560 iexplore.exe 4452 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1560 iexplore.exe 1560 iexplore.exe 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 4452 iexplore.exe 4452 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2020 1560 iexplore.exe 92 PID 1560 wrote to memory of 2020 1560 iexplore.exe 92 PID 1560 wrote to memory of 2020 1560 iexplore.exe 92 PID 3604 wrote to memory of 4512 3604 1bbbbc82d10f76fb55e59db6ef5a9646.exe 93 PID 3604 wrote to memory of 4512 3604 1bbbbc82d10f76fb55e59db6ef5a9646.exe 93 PID 3604 wrote to memory of 4512 3604 1bbbbc82d10f76fb55e59db6ef5a9646.exe 93 PID 3604 wrote to memory of 4968 3604 1bbbbc82d10f76fb55e59db6ef5a9646.exe 94 PID 3604 wrote to memory of 4968 3604 1bbbbc82d10f76fb55e59db6ef5a9646.exe 94 PID 3604 wrote to memory of 4968 3604 1bbbbc82d10f76fb55e59db6ef5a9646.exe 94 PID 4512 wrote to memory of 5000 4512 csrss.exe 96 PID 4512 wrote to memory of 5000 4512 csrss.exe 96 PID 4512 wrote to memory of 5000 4512 csrss.exe 96 PID 4512 wrote to memory of 1476 4512 csrss.exe 97 PID 4512 wrote to memory of 1476 4512 csrss.exe 97 PID 4512 wrote to memory of 1476 4512 csrss.exe 97 PID 5000 wrote to memory of 3300 5000 csrss.exe 101 PID 5000 wrote to memory of 3300 5000 csrss.exe 101 PID 5000 wrote to memory of 3300 5000 csrss.exe 101 PID 5000 wrote to memory of 3060 5000 csrss.exe 102 PID 5000 wrote to memory of 3060 5000 csrss.exe 102 PID 5000 wrote to memory of 3060 5000 csrss.exe 102 PID 3300 wrote to memory of 1752 3300 csrss.exe 104 PID 3300 wrote to memory of 1752 3300 csrss.exe 104 PID 3300 wrote to memory of 1752 3300 csrss.exe 104 PID 3300 wrote to memory of 2268 3300 csrss.exe 105 PID 3300 wrote to memory of 2268 3300 csrss.exe 105 PID 3300 wrote to memory of 2268 3300 csrss.exe 105 PID 1752 wrote to memory of 3972 1752 csrss.exe 111 PID 1752 wrote to memory of 3972 1752 csrss.exe 111 PID 1752 wrote to memory of 3972 1752 csrss.exe 111 PID 1752 wrote to memory of 2784 1752 csrss.exe 110 PID 1752 wrote to memory of 2784 1752 csrss.exe 110 PID 1752 wrote to memory of 2784 1752 csrss.exe 110 PID 3972 wrote to memory of 1932 3972 csrss.exe 114 PID 3972 wrote to memory of 1932 3972 csrss.exe 114 PID 3972 wrote to memory of 1932 3972 csrss.exe 114 PID 3972 wrote to memory of 2496 3972 csrss.exe 113 PID 3972 wrote to memory of 2496 3972 csrss.exe 113 PID 3972 wrote to memory of 2496 3972 csrss.exe 113 PID 4452 wrote to memory of 1528 4452 iexplore.exe 116 PID 4452 wrote to memory of 1528 4452 iexplore.exe 116 PID 4452 wrote to memory of 1528 4452 iexplore.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bbbbc82d10f76fb55e59db6ef5a9646.exe"C:\Users\Admin\AppData\Local\Temp\1bbbbc82d10f76fb55e59db6ef5a9646.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat6⤵PID:2784
-
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat7⤵PID:2496
-
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat8⤵PID:5008
-
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe8⤵PID:636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat9⤵PID:2320
-
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe9⤵PID:4292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat10⤵PID:2560
-
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe10⤵PID:4904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat11⤵PID:548
-
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe11⤵PID:3880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat12⤵PID:4908
-
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe12⤵PID:1524
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe13⤵PID:4800
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe14⤵PID:4308
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe15⤵PID:1156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat16⤵PID:4864
-
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe16⤵PID:3212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat15⤵PID:3740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat14⤵PID:1208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat13⤵PID:5056
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat5⤵PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat4⤵PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat3⤵PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat2⤵PID:4968
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:3532
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4452 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:3488
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3488 CREDAT:17410 /prefetch:22⤵PID:1448
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:1136
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1136 CREDAT:17410 /prefetch:22⤵PID:5020
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:1300
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:17410 /prefetch:22⤵PID:4808
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:3648
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3648 CREDAT:17410 /prefetch:22⤵PID:4464
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:4512
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4512 CREDAT:17410 /prefetch:22⤵PID:3544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dfeabde84792228093a5a270352395b6
SHA1e41258c9576721025926326f76063c2305586f76
SHA25677b138ab5d0a90ff04648c26addd5e414cc178165e3b54a4cb3739da0f58e075
SHA512e256f603e67335151bb709294749794e2e3085f4063c623461a0b3decbcca8e620807b707ec9bcbe36dcd7d639c55753da0495be85b4ae5fb6bfc52ab4b284fd
-
Filesize
748B
MD5c4f558c4c8b56858f15c09037cd6625a
SHA1ee497cc061d6a7a59bb66defea65f9a8145ba240
SHA25639e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781
SHA512d60353d3fbea2992d96795ba30b20727b022b9164b2094b922921d33ca7ce1634713693ac191f8f5708954544f7648f4840bcd5b62cb6a032ef292a8b0e52a44
-
Filesize
4KB
MD5d65ec06f21c379c87040b83cc1abac6b
SHA1208d0a0bb775661758394be7e4afb18357e46c8b
SHA256a1270e90cea31b46432ec44731bf4400d22b38eb2855326bf934fe8f1b169a4f
SHA5128a166d26b49a5d95aea49bc649e5ea58786a2191f4d2adac6f5fbb7523940ce4482d6a2502aa870a931224f215cb2010a8c9b99a2c1820150e4d365cab28299e
-
Filesize
2KB
MD52dc61eb461da1436f5d22bce51425660
SHA1e1b79bcab0f073868079d807faec669596dc46c1
SHA256acdeb4966289b6ce46ecc879531f85e9c6f94b718aab521d38e2e00f7f7f7993
SHA512a88becb4fbddc5afc55e4dc0135af714a3eec4a63810ae5a989f2cecb824a686165d3cedb8cbd8f35c7e5b9f4136c29dea32736aabb451fe8088b978b493ac6d
-
Filesize
11KB
MD59234071287e637f85d721463c488704c
SHA1cca09b1e0fba38ba29d3972ed8dcecefdef8c152
SHA25665cc039890c7ceb927ce40f6f199d74e49b8058c3f8a6e22e8f916ad90ea8649
SHA51287d691987e7a2f69ad8605f35f94241ab7e68ad4f55ad384f1f0d40dc59ffd1432c758123661ee39443d624c881b01dcd228a67afb8700fe5e66fc794a6c0384
-
Filesize
232B
MD5d660babbde3280a78076e7398277e217
SHA1fbf50b16a3dc2192ff944dc9fa3cf5b21deafd21
SHA2564fdabfe4f6906c981d0cf252b85bfe35e87cf7fff36afb6c49ffff5d187e3fbe
SHA51247ee63d62ee6e8b10c4bf83dcd575c834861a2e9c8d3f5b8e7aa9ac04a788a8581363c1d623cda867b428b0eeda1bbb182f6ebf9c19156ad24d24b7c6b99f121
-
Filesize
160B
MD5688de2c11d07cd1a0f0a22aaba2f38fe
SHA1c693ee247172adf49b1fe68c597358b0e0e2477e
SHA2568fd8370941a44a938f35789dae430fe4ee8bb1443f05baad544b48c261ae40d7
SHA512d1ecc15e5e1da8d9f35f95ed2b66763ed314e9b523dacd1eb42332b8f3d9c8256f46830c7b9c107ada42cc51d4dfe6ac9cd845b6fdbcf25677c5c50b138bde0a
-
Filesize
16KB
MD5a71db28c9a8cb623d33bca8a548e808e
SHA1944f1645eafb79c63ffb1f4638dc73c6753d9eef
SHA256557a41e01980adb1d13d7f8db657ef8f69ec73408afd3f64b73dcf46c5d755b9
SHA512aafd2ae6427e958aa0e50e984073227dc7ddb985976c84538555bb2d7583c979ddb25e65b26d534a1658909c5b9f2f7db9b74e11929f5f92b04afa6fef0b2eb2
-
Filesize
19B
MD5e415f059d8566da0d8d44108e0e915fe
SHA134dff1c646f465308c2804f0f046bbdcdfb53661
SHA256b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782
SHA512fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b
-
Filesize
26KB
MD559f5beb8d19f33e36da97078110eb201
SHA19d8359c56fed22ad55afd3787c5209ac875baec3
SHA256936de229673f930dc6c60d3cdf6c582bd51914ca41177310995b57552a560703
SHA512a7d43235c5918fac117835b15425b57bc1b6876b85e7cce5e28f92600394b61e591962e88f0f54deecf59aa5174b5d2c14df9f386d7adccff8c4f10c2800dcf1
-
Filesize
27KB
MD51bbbbc82d10f76fb55e59db6ef5a9646
SHA1960c9c18f6331aa7c8456697558547b1a14ea45d
SHA256715407f67e1d86df046811c6953cc1ac107bc0b56a0ee946addd88eb974f70c0
SHA5125f2896483349c8619acebe7d21b8cc8790a15944c6d41d17ef3d891b6487b43d2ce4c5ea8acc9912a910f56543566a4d32f8d925ad9ddb74abfcdc20590d211a