Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 18:21
Static task
static1
Behavioral task
behavioral1
Sample
341ed3991f065eeebd9131d9ad5917e0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
341ed3991f065eeebd9131d9ad5917e0.exe
Resource
win10v2004-20231222-en
General
-
Target
341ed3991f065eeebd9131d9ad5917e0.exe
-
Size
361KB
-
MD5
341ed3991f065eeebd9131d9ad5917e0
-
SHA1
a99e53405f7c26773d44d95d55578d876a76bbf2
-
SHA256
35e6a90808f8f464ae34a7d2d87fb7e92d967a468066b25d3de43e13eba9598c
-
SHA512
7fc6abaad325bd715e6ed34ccc8f3034ca779503cb919a442fb85f7c346b5af4cd44cbc5bd671fa7a7894d7e163642ffc74cf1936057a757954522f2117f2cf5
-
SSDEEP
6144:QflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:QflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 26 IoCs
pid Process 2292 mjecwrojgbvtolga.exe 2176 CreateProcess.exe 2836 lfdxsqkicx.exe 1636 CreateProcess.exe 476 CreateProcess.exe 2948 i_lfdxsqkicx.exe 2516 CreateProcess.exe 760 fcxupjhczu.exe 2024 CreateProcess.exe 1752 CreateProcess.exe 1708 i_fcxupjhczu.exe 2680 CreateProcess.exe 2560 wuomgbztrl.exe 2872 CreateProcess.exe 2416 CreateProcess.exe 2620 i_wuomgbztrl.exe 2068 CreateProcess.exe 2128 usmhfzxrmj.exe 1160 CreateProcess.exe 2812 CreateProcess.exe 2256 i_usmhfzxrmj.exe 2072 CreateProcess.exe 1856 eywqoidbvt.exe 1144 CreateProcess.exe 2356 CreateProcess.exe 436 i_eywqoidbvt.exe -
Loads dropped DLL 17 IoCs
pid Process 3032 341ed3991f065eeebd9131d9ad5917e0.exe 2292 mjecwrojgbvtolga.exe 2292 mjecwrojgbvtolga.exe 2836 lfdxsqkicx.exe 2292 mjecwrojgbvtolga.exe 2292 mjecwrojgbvtolga.exe 760 fcxupjhczu.exe 2292 mjecwrojgbvtolga.exe 2292 mjecwrojgbvtolga.exe 2560 wuomgbztrl.exe 2292 mjecwrojgbvtolga.exe 2292 mjecwrojgbvtolga.exe 2128 usmhfzxrmj.exe 2292 mjecwrojgbvtolga.exe 2292 mjecwrojgbvtolga.exe 1856 eywqoidbvt.exe 2292 mjecwrojgbvtolga.exe -
Gathers network information 2 TTPs 5 IoCs
Uses commandline utility to view network configuration.
pid Process 2312 ipconfig.exe 1252 ipconfig.exe 1768 ipconfig.exe 1948 ipconfig.exe 1460 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c000000000200000000001066000000010000200000004fa2fa79f7fe25a9c61a8964015d1c5d5a54ecde1b0d5f1f266329e209bc2e1b000000000e80000000020000200000007aa9fe14ec4903d85ac133f97e1b3acdc5260e03a32e1f241adb9516afb9acc520000000bb9fee5a8bf1fff58ae0a4d0fe0e8ccdc75336595e7e16cf3bbff2d64d2b24be4000000005a60d348e1b65284b057ebf2e69efc7578e53b9a1b027008f32c5bfa142627e93efc51a4008e56be792ded369ddfd57fff73119235df5b36187d452ef00a1d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0bd7f061338da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{260726D0-A406-11EE-BD5F-6E3D54FB2439} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409767561" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 3032 341ed3991f065eeebd9131d9ad5917e0.exe 2292 mjecwrojgbvtolga.exe 2292 mjecwrojgbvtolga.exe 2292 mjecwrojgbvtolga.exe 2292 mjecwrojgbvtolga.exe 2292 mjecwrojgbvtolga.exe 2292 mjecwrojgbvtolga.exe 2292 mjecwrojgbvtolga.exe 2836 lfdxsqkicx.exe 2836 lfdxsqkicx.exe 2836 lfdxsqkicx.exe 2836 lfdxsqkicx.exe 2836 lfdxsqkicx.exe 2836 lfdxsqkicx.exe 2836 lfdxsqkicx.exe 2948 i_lfdxsqkicx.exe 2948 i_lfdxsqkicx.exe 2948 i_lfdxsqkicx.exe 2948 i_lfdxsqkicx.exe 2948 i_lfdxsqkicx.exe 2948 i_lfdxsqkicx.exe 2948 i_lfdxsqkicx.exe 760 fcxupjhczu.exe 760 fcxupjhczu.exe 760 fcxupjhczu.exe 760 fcxupjhczu.exe 760 fcxupjhczu.exe 760 fcxupjhczu.exe 760 fcxupjhczu.exe 1708 i_fcxupjhczu.exe 1708 i_fcxupjhczu.exe 1708 i_fcxupjhczu.exe 1708 i_fcxupjhczu.exe 1708 i_fcxupjhczu.exe 1708 i_fcxupjhczu.exe 1708 i_fcxupjhczu.exe 2560 wuomgbztrl.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2948 i_lfdxsqkicx.exe Token: SeDebugPrivilege 1708 i_fcxupjhczu.exe Token: SeDebugPrivilege 2620 i_wuomgbztrl.exe Token: SeDebugPrivilege 2256 i_usmhfzxrmj.exe Token: SeDebugPrivilege 436 i_eywqoidbvt.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2292 3032 341ed3991f065eeebd9131d9ad5917e0.exe 28 PID 3032 wrote to memory of 2292 3032 341ed3991f065eeebd9131d9ad5917e0.exe 28 PID 3032 wrote to memory of 2292 3032 341ed3991f065eeebd9131d9ad5917e0.exe 28 PID 3032 wrote to memory of 2292 3032 341ed3991f065eeebd9131d9ad5917e0.exe 28 PID 3032 wrote to memory of 2888 3032 341ed3991f065eeebd9131d9ad5917e0.exe 29 PID 3032 wrote to memory of 2888 3032 341ed3991f065eeebd9131d9ad5917e0.exe 29 PID 3032 wrote to memory of 2888 3032 341ed3991f065eeebd9131d9ad5917e0.exe 29 PID 3032 wrote to memory of 2888 3032 341ed3991f065eeebd9131d9ad5917e0.exe 29 PID 2888 wrote to memory of 2372 2888 iexplore.exe 32 PID 2888 wrote to memory of 2372 2888 iexplore.exe 32 PID 2888 wrote to memory of 2372 2888 iexplore.exe 32 PID 2888 wrote to memory of 2372 2888 iexplore.exe 32 PID 2292 wrote to memory of 2176 2292 mjecwrojgbvtolga.exe 38 PID 2292 wrote to memory of 2176 2292 mjecwrojgbvtolga.exe 38 PID 2292 wrote to memory of 2176 2292 mjecwrojgbvtolga.exe 38 PID 2292 wrote to memory of 2176 2292 mjecwrojgbvtolga.exe 38 PID 2836 wrote to memory of 1636 2836 lfdxsqkicx.exe 36 PID 2836 wrote to memory of 1636 2836 lfdxsqkicx.exe 36 PID 2836 wrote to memory of 1636 2836 lfdxsqkicx.exe 36 PID 2836 wrote to memory of 1636 2836 lfdxsqkicx.exe 36 PID 2292 wrote to memory of 476 2292 mjecwrojgbvtolga.exe 41 PID 2292 wrote to memory of 476 2292 mjecwrojgbvtolga.exe 41 PID 2292 wrote to memory of 476 2292 mjecwrojgbvtolga.exe 41 PID 2292 wrote to memory of 476 2292 mjecwrojgbvtolga.exe 41 PID 2292 wrote to memory of 2516 2292 mjecwrojgbvtolga.exe 46 PID 2292 wrote to memory of 2516 2292 mjecwrojgbvtolga.exe 46 PID 2292 wrote to memory of 2516 2292 mjecwrojgbvtolga.exe 46 PID 2292 wrote to memory of 2516 2292 mjecwrojgbvtolga.exe 46 PID 760 wrote to memory of 2024 760 fcxupjhczu.exe 44 PID 760 wrote to memory of 2024 760 fcxupjhczu.exe 44 PID 760 wrote to memory of 2024 760 fcxupjhczu.exe 44 PID 760 wrote to memory of 2024 760 fcxupjhczu.exe 44 PID 2292 wrote to memory of 1752 2292 mjecwrojgbvtolga.exe 48 PID 2292 wrote to memory of 1752 2292 mjecwrojgbvtolga.exe 48 PID 2292 wrote to memory of 1752 2292 mjecwrojgbvtolga.exe 48 PID 2292 wrote to memory of 1752 2292 mjecwrojgbvtolga.exe 48 PID 2292 wrote to memory of 2680 2292 mjecwrojgbvtolga.exe 49 PID 2292 wrote to memory of 2680 2292 mjecwrojgbvtolga.exe 49 PID 2292 wrote to memory of 2680 2292 mjecwrojgbvtolga.exe 49 PID 2292 wrote to memory of 2680 2292 mjecwrojgbvtolga.exe 49 PID 2560 wrote to memory of 2872 2560 wuomgbztrl.exe 51 PID 2560 wrote to memory of 2872 2560 wuomgbztrl.exe 51 PID 2560 wrote to memory of 2872 2560 wuomgbztrl.exe 51 PID 2560 wrote to memory of 2872 2560 wuomgbztrl.exe 51 PID 2292 wrote to memory of 2416 2292 mjecwrojgbvtolga.exe 54 PID 2292 wrote to memory of 2416 2292 mjecwrojgbvtolga.exe 54 PID 2292 wrote to memory of 2416 2292 mjecwrojgbvtolga.exe 54 PID 2292 wrote to memory of 2416 2292 mjecwrojgbvtolga.exe 54 PID 2292 wrote to memory of 2068 2292 mjecwrojgbvtolga.exe 56 PID 2292 wrote to memory of 2068 2292 mjecwrojgbvtolga.exe 56 PID 2292 wrote to memory of 2068 2292 mjecwrojgbvtolga.exe 56 PID 2292 wrote to memory of 2068 2292 mjecwrojgbvtolga.exe 56 PID 2128 wrote to memory of 1160 2128 usmhfzxrmj.exe 58 PID 2128 wrote to memory of 1160 2128 usmhfzxrmj.exe 58 PID 2128 wrote to memory of 1160 2128 usmhfzxrmj.exe 58 PID 2128 wrote to memory of 1160 2128 usmhfzxrmj.exe 58 PID 2292 wrote to memory of 2812 2292 mjecwrojgbvtolga.exe 61 PID 2292 wrote to memory of 2812 2292 mjecwrojgbvtolga.exe 61 PID 2292 wrote to memory of 2812 2292 mjecwrojgbvtolga.exe 61 PID 2292 wrote to memory of 2812 2292 mjecwrojgbvtolga.exe 61 PID 2292 wrote to memory of 2072 2292 mjecwrojgbvtolga.exe 63 PID 2292 wrote to memory of 2072 2292 mjecwrojgbvtolga.exe 63 PID 2292 wrote to memory of 2072 2292 mjecwrojgbvtolga.exe 63 PID 2292 wrote to memory of 2072 2292 mjecwrojgbvtolga.exe 63
Processes
-
C:\Users\Admin\AppData\Local\Temp\341ed3991f065eeebd9131d9ad5917e0.exe"C:\Users\Admin\AppData\Local\Temp\341ed3991f065eeebd9131d9ad5917e0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Temp\mjecwrojgbvtolga.exeC:\Temp\mjecwrojgbvtolga.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\lfdxsqkicx.exe ups_run3⤵
- Executes dropped EXE
PID:2176
-
-
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\i_lfdxsqkicx.exe ups_ins3⤵
- Executes dropped EXE
PID:476
-
-
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\fcxupjhczu.exe ups_run3⤵
- Executes dropped EXE
PID:2516
-
-
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\i_fcxupjhczu.exe ups_ins3⤵
- Executes dropped EXE
PID:1752
-
-
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\wuomgbztrl.exe ups_run3⤵
- Executes dropped EXE
PID:2680 -
C:\Temp\wuomgbztrl.exeC:\Temp\wuomgbztrl.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:2872 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:2312
-
-
-
-
-
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\i_wuomgbztrl.exe ups_ins3⤵
- Executes dropped EXE
PID:2416 -
C:\Temp\i_wuomgbztrl.exeC:\Temp\i_wuomgbztrl.exe ups_ins4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
-
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\usmhfzxrmj.exe ups_run3⤵
- Executes dropped EXE
PID:2068 -
C:\Temp\usmhfzxrmj.exeC:\Temp\usmhfzxrmj.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1160 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:1252
-
-
-
-
-
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\i_usmhfzxrmj.exe ups_ins3⤵
- Executes dropped EXE
PID:2812 -
C:\Temp\i_usmhfzxrmj.exeC:\Temp\i_usmhfzxrmj.exe ups_ins4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
-
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\eywqoidbvt.exe ups_run3⤵
- Executes dropped EXE
PID:2072 -
C:\Temp\eywqoidbvt.exeC:\Temp\eywqoidbvt.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1856 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1144 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:1768
-
-
-
-
-
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\i_eywqoidbvt.exe ups_ins3⤵
- Executes dropped EXE
PID:2356 -
C:\Temp\i_eywqoidbvt.exeC:\Temp\i_eywqoidbvt.exe ups_ins4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
-
-
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release1⤵
- Gathers network information
PID:1948
-
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release1⤵
- Executes dropped EXE
PID:1636
-
C:\Temp\lfdxsqkicx.exeC:\Temp\lfdxsqkicx.exe ups_run1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2836
-
C:\Temp\i_lfdxsqkicx.exeC:\Temp\i_lfdxsqkicx.exe ups_ins1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release1⤵
- Gathers network information
PID:1460
-
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release1⤵
- Executes dropped EXE
PID:2024
-
C:\Temp\fcxupjhczu.exeC:\Temp\fcxupjhczu.exe ups_run1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:760
-
C:\Temp\i_fcxupjhczu.exeC:\Temp\i_fcxupjhczu.exe ups_ins1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD562d7bb24c9e9391ee948da2622a0b666
SHA1a8e53a21f6079089b6e241d78ea50a1b8de4a268
SHA25692e73f882929dd0d51073ff96336ed80491ed6c6e1ee61e717583938e320fb7e
SHA5124c2f35b4188572bb99833d6eb269b455777aadf55b084ffa64244a2c4874e4ef8f2a7998769903c638c7c7ed66565bc3542f749bad895ce20f2c1931c6b29c8d
-
Filesize
361KB
MD583f5a8b51cecb4d6cc8ec0f3604aafa7
SHA186d2a00ccb1c5cd07666a4f9e00368abe0158109
SHA256a208a7932e2c247917d4c0b82b7f722335f69532e514c1dfdd2d40c4349c6190
SHA512c25fad35eca5740d6e6a71321c8888bdc9f757b1bd612f78b88b5619a2cf43b2b699bab70c91cc7007eb9a678d31cc3d48dfb0a7f0fe4da9ed6cc20f75fbc2a6
-
Filesize
361KB
MD534b47812da9b2d09d618aa80657c8e5e
SHA12ca95201151983020bf79be20bd86420a205b92b
SHA256e351d6f82c687d4cdd6ebd48d6d55eed5cf6791dfc767eea876b6fd1e4ed046e
SHA51293ca3d67ca802c8c5d89a198e7bd983d3ecd9b5e963678714f861f0ee56d2ca8bf546f1a34d6b80388311a048ca70ee3f58962568c4ef3e059eb229736b3653d
-
Filesize
361KB
MD5955e3e05444a9d5720c688b26efb99da
SHA1dc82b4b465dc49a058865a037c575c8360defa2a
SHA25622fa6a75dcea8086e8ca6a5db25f40deec19b7f8d4a48aee630aa277b40455a6
SHA512534975ef520a172a0ca73afa5013887c9248f7aa77e6c5217f4a3fa0a4f77450e7ba5f915451830125fac635cf4faff174ec9ff0372bd9b60fd3827d5dc0d8e1
-
Filesize
361KB
MD5e2cc52e989ed0e16dbf16af0deda5d86
SHA1f0522422cfb39a198ff25ac27ba2cd9e4192241c
SHA256956a173aad475785b09d2b6ca9ba227470f2902322d2496b89a7e9aac29ce7a6
SHA51215c31ece464d02cf451c04375bce7443f14c04f6f3d8e3b5008a4986f809cf59834c873386a7c91e6f62c1b0207c6868ccb0985640d7331aff38a48f78da26e5
-
Filesize
361KB
MD5e2bce6ac0620f16b2a81e940cb9e4efb
SHA1163591ca830cb352e53dde1c59899a82c910cea5
SHA256d4d53d7ea49484c3566be0eb7155e6e5dfcaccafc4237fb5b54d30183462fc86
SHA512dc637e306f259695b5f2b7c0c7ad9f7fcdf529da8c80375c5cc478669f0c660ad74a2700ed34cbdc94830ad42a27644c1099514dd44a5a37d13bad73180e6476
-
Filesize
311KB
MD5869de25882b13dc46418f3fd40ab8760
SHA128854b757827ae2a7a343ff32b0c4de0bb431808
SHA2563aac6af8a32ab70c1822adc7f027e72d7d1b57647616942f4e4dead17d6504bd
SHA51273af1a6d7331effc8c881fe8bb93b7f93019ce693954c381862bc8a250ae890731e54de4af97a35b0e275d61106a451e8077d7d43d12373fec6cb49ddd3f5fdf
-
Filesize
361KB
MD548f3705405ad563a9a29018030396dc7
SHA1b20b7026fdb1d4a0b2ddb6745b5af604a2ad027d
SHA2566d077e73bb2e17d0a08f45c16610769cc3cc2af18e8809ba72c6384a88948a6e
SHA512d391d4e176610b85120bbd1eed24e18d5f1b6e021c90e739dd1ced635d0e803f909b5db96ebd722fb23bc39a6a452ed2c1f42e80b799436b787d4309223b5dc1
-
Filesize
361KB
MD588ae7fb0200d58f6563fea3e7d20a142
SHA1cd467c8aaae7ba6c65f135ac0aa251e1338a4fca
SHA2568ccec09c904c882b0c7f46a708d4beaa0132cc3aa692015547ad385e07949953
SHA512a8b4136a76f87ef0d983eedd41238b2f3adf4141a837fd107f9a9e48681cf387cb1e292cc6f1344e96ef30a0e6de88afc8c5f332542441c6884783a83a6cbdff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b00ef8a6e30717fc454ae90e9122d95
SHA1978c56e24292bf32dbc5a723b9d864a0570ca001
SHA25644bfc72d0b43a056d4dc073875cec80da52a9effe07ce798ce4240fe5aeee834
SHA51299505624d0ae1d828472005c0b695960ed6da6e181e4f9151c99e59866207809bdc2adb85f3ef6be8cfb467fe801b9aa3090f1abc1598ac4a671908cbd4e7d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb4d682f33ed909578df1f22ead96dc6
SHA17479b2fc9c9ec73624b1bdda79818819dccfd163
SHA256982e2db8137ff07ad2d3758e8c9836a42cae1cc0f5f33563f1081557c91ea241
SHA512a598480a0767ea5605386b72cc2a1e3cf10a68d1f0637b17c1d0845a5d0034b08edcc7144effd54f567af3328da54b56d70e1b4dd0e2b79eb5f6225d7e7858b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59174fcb799bee6662da74acaa551b143
SHA16b35a40da21b7b98cc5b25f887fea676f08d4ada
SHA256060694e795cb5438fc9d763c7e000c019b5105807c31e440fb26a6e7e2d7142d
SHA512aa154ef243e90ede287f4b7e8f3ce89e1087008bb88f787bc931fcd57ffb72cf6d37177f53c06c059da2654f174d5749ea8d264dc922f130b2bfd7971871abb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0d78a0e78e5e58753f36d8dfceef672
SHA11366c463c750e4e478e980cd1c207ec33bad4b3c
SHA25635f0f07c82c92b4ff3e1d34daa651dba7ddf9ca3db3e86774c737c6e26e52077
SHA51232c0aacc9078e0cf1d84013254f83470d1b635361d928b67e88a1b14416f06b0e13b0bca406921ee73f550984bd790f593198049712bdfca140b706f11df810f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e9aa4aafa7792604f92fe515cfa2cc7
SHA16e81ac8ca18206e128352a817515bc34c31e40ad
SHA25617ba4f3f4621f7f7a78da4966d72e3ee31053af1f43d8968cada5804dac7a633
SHA51259697ec90211cf3b9dd4d618e8720db6711011c828cede26a28636dfa9d1d91f0f351569af591b0cb55d3df180f91ebb068790da152b39468661a0cdb01f841b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ddb88902517233e1bbfa885b121ad69
SHA16cafe487053e10b745e197b33f0df9296ace43ec
SHA256f09901aef75fbbe61d43e696915d6c814e78cb742d0bc593c3ab131678a6343e
SHA512e7637e33ec40c8561a11117ade9bf4939fc36f46521e470ffcd248562d6b6d134ab043371208c83cea07ab129306ca9782cee9851e98d4eec11b536d11754be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baf79f100d3adcfc15adb0168f510dfa
SHA1e9e970a6e0af2e0d339f219c022c05941e722823
SHA256c567a0c81b8db49893b6af8789767c6e609d73e534485caa7798dd5cf0dc94c9
SHA512b1a1248332188a3c18f96d6638beeeb8802245bf3de87ad54efd8b303d909ffa7231db32a006d517999735bb1d7755953911e487452cbf294ecbf5de557d3352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5480407ae34ca556ba1835a2de5812740
SHA136da93850ce449075d631fb8d7d50f4d033e1d82
SHA25633bf4752a703973800a69c057e2ef5b5e0baeedcdf4efa06f143ea3419747b3d
SHA5126f70c7e12be7f1e9525656a1efc4c1e931ddca6255e691dfc96a5aba7c3a49f07e91f56980e79b342db528d3e38b65ca9d4dc6afb84e3998fdbc3934cab7694b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f396c6052fb8e838a0feffde45661d0
SHA1432abce456cbacc4b2b51a1f1940ffc7d987c88c
SHA25681448816c8598b4ef131f7b4b7ff0a4de48a49cebbc7a5bc85e96cab48cbf18e
SHA5124763d181b372c4c51d8262ffad2d6c70c785cf5cff5254659328950cd59c6ea28525159ad155e6bd886e0046e088253523c685852a3046cca123e037a0402bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5abb05618f25cae8944f665696cbcc8
SHA18bcb3fcf5a3cf7eeae9e303c1421d71250706c98
SHA2566f8a768d72b832d924327643b766f40d51adaf57d9f840c0a73e3cfcff46bd8a
SHA5120df4bbd020af0a123d704238bbd6092991f7675af28c780422b8df5e5bd2daddb0446e5e08ce6a0a4ce58dbe5a8fdb494c5f045f33077f36b9c91fdc5e996c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bdb5c6ece7788f2cc4e98120fc76913
SHA19f51af8fe7e2d36812f29c2302a8a91c1cd848b4
SHA256f083e2b5346108dfbc49ac52146493daa64991fcd6fc30db27ec502269ca58a9
SHA512dc940447a04efeb5db1fb7f6bad0ee16f93c5911d57d3516040360f9ab90482a168dc1254d918b0d9f79496d44a2d4a3cbf1deef3bbd575e2a98a5de06293d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a82622a73b3fefc8d945263811d299f6
SHA14f49418a7db7c0224669c67a862c89f8019fb97f
SHA256b6cc56d62dc030697c58ba5012a78a729275c028bd12e65af7d8287fc5949e66
SHA512c89ddbfaff998e76f764973fc44eaf31a07dcb1bfe6ae0a77a0931100ddb1e3eca64f87167998d30513891f843ed3b527053b51580fafcef96c9a99dd0ff508f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee497d6c32bce415ea2ae56c1d9b38bd
SHA114d567c0f8b9dc56e4a025fe1cd7c1d69e57e27e
SHA256974426b13316066dc980b40e39c1038fa24cca62fc9faf55573e56d022d6ca3f
SHA512c98cc5713e31df6c00010c4ff02751929d90734129d8d35c040c30f47e10f5af969506d0c424cb4628dd455b18b498ad50db377da62536ba4456000756aa0d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505411a5bd04c8cf7c820b39a6be1eeaf
SHA16d19993134891c9130658a06a60f9df55f51fb59
SHA2566942b2fd873331ec4c5e1561de6e81da0bb49448e0398308f718157c8dd45c53
SHA512945416b11b21fcee6ddbacf52b277daaeb86c14b7c9ce83d9fce09d459fc2f322f6bdafa940de5c77f2fe8c4d05cc27edd819a5384d2e9384d62fbdbdf0b91c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8b895d80531de88c12fa8aa4c2e2f70
SHA10e4f613110ee0bfc335d4e6c1753a04a96bc006c
SHA2564edad147837044bc380732ed34f8400842fb70e3ea825cda49fc6f7bee29adab
SHA5129fee7a1a5fc451c497d0940bd8176b03ba89ec583f56239710f939d8c44026a8ba40dcdaa732af32b7283d140d3457a8a9fbdd19bca0baa491999fe021f53434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e4c8971f14754a1581c4358c09a6a15
SHA1908d572ad2c2031d91c24b4d216fe03aa6cbbadf
SHA25694e639d38ebf3d417be7129aca28868103d367d0b671aa4feacc602d0fbaf2a9
SHA51212ba262dba877b9b304ff82e2ffcc0dc52d6f1b973817e8a90f14941dc10f94e24347600eaa78d55523b3ec917d3ebfb6e55f35e31bd2d4da68e16697a854363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59939c0b6ecd04621bea25af839d8a300
SHA1f1a24f20da0dab9665ac8380256d475e01504d7d
SHA256ef5fb25bd3c208fb11f9737910e36b1fb35864c134a34641967dbcbb12667933
SHA51271feb0606c0bfc87dea26a0fe40ce297fa18d740e8eb12cfe4e2ac8cf27846f2e99387b14a6e7a66a995893337a61db32443962ea2930cf6a77fc6be40380b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aef2f58e9580d66fc1428e8bd2b894ef
SHA1788fadca6d0665581be84c6825e075bd45c714ea
SHA25623691f6b5e52a1d3ce1c9fc612c8776e888d55ff4bf7bc134e78ffa34172e65d
SHA512dd73eb027e3b3ec4d2244d1dca6c4cb39a74f7c0c70ed108f9e02f2d367ed10a085b686ffd87f74f3eabd75ba6a3166a033ab5fbe2a463666054a870005391fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b9224f0ccc2f5420bde8d99bfe76162
SHA1480875a5c875989bb2aca908d9ececfc984f9dee
SHA25631f0c4692e0809958f308f6e29a00b1cafd5ba97a087c9e81c28571c90f32699
SHA51213e78cb08790fa276ea8fcc0698ffb3e1e35cd034b0262f68b6f6d3d2044dfe98a3e4fca9b564c7539f218626fab1cc0a394d0b7f8922b06f4f8c452b2c551dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b34b45031ba1b34002468d0184da7e53
SHA10fc1044a572b8df3fadd85717720d354dcd87cb8
SHA2561d559ffa1b33eb7dc26b756230f4511d337e5f0810df29c25c0cb74d7c19c2a0
SHA512033069b2f69bf5176b2c6a9102d9e0e54ec9715c92984e504d602c5171e40b3725cb6d4347473b1ccc9533b5467f7fd72d902561a99efe558ba02f792d340492
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
361KB
MD5151aed396fd79754b863fc0ab8ae4d26
SHA1b9db56694715696b1ed9e1aa0590964a615dbef3
SHA256fd33d74934392fa983e9b18075011344af13a49b6b02c4cba5f8778012eaf2b4
SHA51282bf53be1df7ce59aa7f0e4ec5979321e1ed76acb9a94fd063e7de9c5701163dc211a857120972e51625803610143f73ced8f7286f822685b3b4b63d148644ee