Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
5b4040aa0f20f5d333ee8ce78f08ba05.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b4040aa0f20f5d333ee8ce78f08ba05.exe
Resource
win10v2004-20231215-en
General
-
Target
5b4040aa0f20f5d333ee8ce78f08ba05.exe
-
Size
164KB
-
MD5
5b4040aa0f20f5d333ee8ce78f08ba05
-
SHA1
4c392de7481bf51ad271e7a7e0e6eaed6c307fde
-
SHA256
98bd72c2c82c4f6aeaf4227120ae35d2e1ada98d856bf81671dcd4dbd436fb25
-
SHA512
64e9b63a67e43e470c7f8c6c7ee306000e66efa964d24bc1c7a87448584cbecede4a6ee144b95f782d4681c9bd1614c66f0fa91a4fc03417cc92c7cc70f40b59
-
SSDEEP
3072:TDOlMukj+p7fIDxz189f6WBDluJ0b5GGjq+9kEe6KFsP4:T3Q7fID3kv5Fjq+GWKFsP4
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\5b4040aa0f20f5d333ee8ce78f08ba05.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b4040aa0f20f5d333ee8ce78f08ba05.exe:*:Enabled:Firewall Admin" 5b4040aa0f20f5d333ee8ce78f08ba05.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\5b4040aa0f20f5d333ee8ce78f08ba05.exe = "C:\\Windows\\infocard.exe:*:Enabled:Firewall Admin" 5b4040aa0f20f5d333ee8ce78f08ba05.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 5b4040aa0f20f5d333ee8ce78f08ba05.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 2780 netsh.exe 2784 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 2624 infocard.exe 2600 infocard.exe 868 infocard.exe 2656 infocard.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Firewall Admin = "C:\\Windows\\infocard.exe" 5b4040aa0f20f5d333ee8ce78f08ba05.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Firewall Admin = "C:\\Windows\\infocard.exe" 5b4040aa0f20f5d333ee8ce78f08ba05.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 5b4040aa0f20f5d333ee8ce78f08ba05.exe File opened for modification \??\PhysicalDrive0 infocard.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 808 set thread context of 2500 808 5b4040aa0f20f5d333ee8ce78f08ba05.exe 19 PID 2500 set thread context of 2836 2500 5b4040aa0f20f5d333ee8ce78f08ba05.exe 36 PID 2836 set thread context of 2916 2836 5b4040aa0f20f5d333ee8ce78f08ba05.exe 20 PID 2624 set thread context of 2600 2624 infocard.exe 23 PID 2600 set thread context of 868 2600 infocard.exe 26 PID 868 set thread context of 2656 868 infocard.exe 27 -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\mdll.dll infocard.exe File created C:\Windows\infocard.exb 5b4040aa0f20f5d333ee8ce78f08ba05.exe File opened for modification C:\Windows\infocard.exb 5b4040aa0f20f5d333ee8ce78f08ba05.exe File opened for modification C:\Windows\infocard.exe 5b4040aa0f20f5d333ee8ce78f08ba05.exe File created C:\Windows\infocard.exe 5b4040aa0f20f5d333ee8ce78f08ba05.exe File opened for modification C:\Windows\infocard.exe infocard.exe File opened for modification C:\Windows\mtdll.dll infocard.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2868 sc.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94500DB1-A4AA-11EE-8301-4A7F2EE8F0A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0476089b738da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd769173341890000000002000000000010660000000100002000000062a224ba9461572fe90b65ec3fd50e34438e6d218d88a11483ca548be55e7b2d000000000e800000000200002000000080dcd1ebbafccc9a8b8082f3edc42cefae01b276c3ec700b5f943f380658156320000000bb3f65048644851cb1ce7fbc735aa9da683a9274f69167d77f69221c6738bcfa40000000017d3b54a6625e28ae8a885e84203aa7553a05799d3bba84b4a9b28d5f3ee80f00bce1975f06224f36aba6b7e05742e88ab352d6080ca03a20638e103d706b37 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409838177" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000009b1e699659b52b82b78d4b0ca35dc9717b3836e5759686faf550c4d00877da0d000000000e80000000020000200000008a5c49687965dd2e5023526e9be40bb66a2018749a83fd6230e2b8c8ac11216a90000000967e02d16f3d83d2d05f23efac2c060f403b475ac921921d76a8eb21dfa46d64b72efc601a5c07c02f8ea730c772089bd766973d08b99cb83dfd7c6066e3c7e0c892c4d050c7d7102899a58672ed5533c22b29f3e232b220b211ef22389c553ed98458369e9ca0d3f1e6d323d4fc89d1d7fb51558c30a7aac9a884f467bccd891dbf570dec0e419f46e412f9e21de8be40000000204535825fd126429d051a02e4f86d34828f2f1eb0974bbb206175d9600b59b8429bc975adddf27a6d15cc6b821a9c42b889581b7cfec917fda246a42fa364d9 iexplore.exe -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 336 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 808 5b4040aa0f20f5d333ee8ce78f08ba05.exe 2500 5b4040aa0f20f5d333ee8ce78f08ba05.exe 2624 infocard.exe 2600 infocard.exe 336 iexplore.exe 336 iexplore.exe 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 808 wrote to memory of 2500 808 5b4040aa0f20f5d333ee8ce78f08ba05.exe 19 PID 808 wrote to memory of 2500 808 5b4040aa0f20f5d333ee8ce78f08ba05.exe 19 PID 808 wrote to memory of 2500 808 5b4040aa0f20f5d333ee8ce78f08ba05.exe 19 PID 808 wrote to memory of 2500 808 5b4040aa0f20f5d333ee8ce78f08ba05.exe 19 PID 808 wrote to memory of 2500 808 5b4040aa0f20f5d333ee8ce78f08ba05.exe 19 PID 808 wrote to memory of 2500 808 5b4040aa0f20f5d333ee8ce78f08ba05.exe 19 PID 808 wrote to memory of 2500 808 5b4040aa0f20f5d333ee8ce78f08ba05.exe 19 PID 808 wrote to memory of 2500 808 5b4040aa0f20f5d333ee8ce78f08ba05.exe 19 PID 808 wrote to memory of 2500 808 5b4040aa0f20f5d333ee8ce78f08ba05.exe 19 PID 2500 wrote to memory of 2836 2500 5b4040aa0f20f5d333ee8ce78f08ba05.exe 36 PID 2500 wrote to memory of 2836 2500 5b4040aa0f20f5d333ee8ce78f08ba05.exe 36 PID 2500 wrote to memory of 2836 2500 5b4040aa0f20f5d333ee8ce78f08ba05.exe 36 PID 2500 wrote to memory of 2836 2500 5b4040aa0f20f5d333ee8ce78f08ba05.exe 36 PID 2500 wrote to memory of 2836 2500 5b4040aa0f20f5d333ee8ce78f08ba05.exe 36 PID 2500 wrote to memory of 2836 2500 5b4040aa0f20f5d333ee8ce78f08ba05.exe 36 PID 2500 wrote to memory of 2836 2500 5b4040aa0f20f5d333ee8ce78f08ba05.exe 36 PID 2500 wrote to memory of 2836 2500 5b4040aa0f20f5d333ee8ce78f08ba05.exe 36 PID 2500 wrote to memory of 2836 2500 5b4040aa0f20f5d333ee8ce78f08ba05.exe 36 PID 2836 wrote to memory of 2916 2836 5b4040aa0f20f5d333ee8ce78f08ba05.exe 20 PID 2836 wrote to memory of 2916 2836 5b4040aa0f20f5d333ee8ce78f08ba05.exe 20 PID 2836 wrote to memory of 2916 2836 5b4040aa0f20f5d333ee8ce78f08ba05.exe 20 PID 2836 wrote to memory of 2916 2836 5b4040aa0f20f5d333ee8ce78f08ba05.exe 20 PID 2836 wrote to memory of 2916 2836 5b4040aa0f20f5d333ee8ce78f08ba05.exe 20 PID 2836 wrote to memory of 2916 2836 5b4040aa0f20f5d333ee8ce78f08ba05.exe 20 PID 2916 wrote to memory of 2780 2916 5b4040aa0f20f5d333ee8ce78f08ba05.exe 21 PID 2916 wrote to memory of 2780 2916 5b4040aa0f20f5d333ee8ce78f08ba05.exe 21 PID 2916 wrote to memory of 2780 2916 5b4040aa0f20f5d333ee8ce78f08ba05.exe 21 PID 2916 wrote to memory of 2780 2916 5b4040aa0f20f5d333ee8ce78f08ba05.exe 21 PID 2916 wrote to memory of 2624 2916 5b4040aa0f20f5d333ee8ce78f08ba05.exe 35 PID 2916 wrote to memory of 2624 2916 5b4040aa0f20f5d333ee8ce78f08ba05.exe 35 PID 2916 wrote to memory of 2624 2916 5b4040aa0f20f5d333ee8ce78f08ba05.exe 35 PID 2916 wrote to memory of 2624 2916 5b4040aa0f20f5d333ee8ce78f08ba05.exe 35 PID 2916 wrote to memory of 2580 2916 5b4040aa0f20f5d333ee8ce78f08ba05.exe 22 PID 2916 wrote to memory of 2580 2916 5b4040aa0f20f5d333ee8ce78f08ba05.exe 22 PID 2916 wrote to memory of 2580 2916 5b4040aa0f20f5d333ee8ce78f08ba05.exe 22 PID 2916 wrote to memory of 2580 2916 5b4040aa0f20f5d333ee8ce78f08ba05.exe 22 PID 2624 wrote to memory of 2600 2624 infocard.exe 23 PID 2624 wrote to memory of 2600 2624 infocard.exe 23 PID 2624 wrote to memory of 2600 2624 infocard.exe 23 PID 2624 wrote to memory of 2600 2624 infocard.exe 23 PID 2624 wrote to memory of 2600 2624 infocard.exe 23 PID 2624 wrote to memory of 2600 2624 infocard.exe 23 PID 2624 wrote to memory of 2600 2624 infocard.exe 23 PID 2624 wrote to memory of 2600 2624 infocard.exe 23 PID 1324 wrote to memory of 336 1324 explorer.exe 25 PID 1324 wrote to memory of 336 1324 explorer.exe 25 PID 1324 wrote to memory of 336 1324 explorer.exe 25 PID 2624 wrote to memory of 2600 2624 infocard.exe 23 PID 2600 wrote to memory of 868 2600 infocard.exe 26 PID 2600 wrote to memory of 868 2600 infocard.exe 26 PID 2600 wrote to memory of 868 2600 infocard.exe 26 PID 2600 wrote to memory of 868 2600 infocard.exe 26 PID 2600 wrote to memory of 868 2600 infocard.exe 26 PID 2600 wrote to memory of 868 2600 infocard.exe 26 PID 336 wrote to memory of 1116 336 iexplore.exe 28 PID 336 wrote to memory of 1116 336 iexplore.exe 28 PID 336 wrote to memory of 1116 336 iexplore.exe 28 PID 336 wrote to memory of 1116 336 iexplore.exe 28 PID 2600 wrote to memory of 868 2600 infocard.exe 26 PID 2600 wrote to memory of 868 2600 infocard.exe 26 PID 2600 wrote to memory of 868 2600 infocard.exe 26 PID 868 wrote to memory of 2656 868 infocard.exe 27 PID 868 wrote to memory of 2656 868 infocard.exe 27 PID 868 wrote to memory of 2656 868 infocard.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b4040aa0f20f5d333ee8ce78f08ba05.exe"C:\Users\Admin\AppData\Local\Temp\5b4040aa0f20f5d333ee8ce78f08ba05.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\5b4040aa0f20f5d333ee8ce78f08ba05.exe"C:\Users\Admin\AppData\Local\Temp\5b4040aa0f20f5d333ee8ce78f08ba05.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\5b4040aa0f20f5d333ee8ce78f08ba05.exe"C:\Users\Admin\AppData\Local\Temp\5b4040aa0f20f5d333ee8ce78f08ba05.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2836
-
-
-
C:\Users\Admin\AppData\Local\Temp\5b4040aa0f20f5d333ee8ce78f08ba05.exeC:\Users\Admin\AppData\Local\Temp\5b4040aa0f20f5d333ee8ce78f08ba05.exe1⤵
- Modifies firewall policy service
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram 1.exe 1 ENABLE2⤵
- Modifies Windows Firewall
PID:2780
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://browseusers.myspace.com/Browse/Browse.aspx2⤵PID:2580
-
-
C:\Windows\infocard.exe"C:\Windows\infocard.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624
-
-
C:\Windows\infocard.exe"C:\Windows\infocard.exe"1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\infocard.exe"C:\Windows\infocard.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\infocard.exeC:\Windows\infocard.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2656 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram 1.exe 1 ENABLE4⤵
- Modifies Windows Firewall
PID:2784
-
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled4⤵
- Launches sc.exe
PID:2868
-
-
C:\Windows\SysWOW64\net.exenet stop wuauserv4⤵PID:2744
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://browseusers.myspace.com/Browse/Browse.aspx2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:336 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1116
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv1⤵PID:1596
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5616a24034cace2b0ee879b2c6b4e534f
SHA153672b0df1aa602611a2afe49ea4f7ad3c50c988
SHA256a2d34817773ea53dc39934bcc61d1b1f8227f834534403fdfdf4ad152b780c1d
SHA5127ab27507679a2800994c1ad46ac80fee1c39b214ba23f8e460728e213ae96c85ebe88da15a57e04307b0be8569b7e5714166ccb808fd1a34382b208fc1edc35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5294c7185d4da7a668e71b00d4171a896
SHA105eb051840afbc6e590ba18ec186e742b1acb765
SHA2560c380774b15f06514822720023fcc0f0ea6b82e306be8847bcc6ee0d433352f0
SHA51231c9220ce354cea9279078662b68bce61cc4b088b88a4dc63159d66c1f4749a4ebf0912a9ebd43645aa746017a55649b88831aa0967acc9605744712b557c5fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9eb47b0f0700995c87d2e2c35567f84
SHA191f80959259d844e1eaa2d041705cb1106beb30e
SHA2569759d73f35ad5ca5e3ceab2dec5d97eded9a132a9c0a7f61fbaa543153d747eb
SHA5125d8f32a8c17fa4e1b771e918159c2369eb3e68135ab05bd034c651687eaa4e71d244f80cb6e61e2184d6d2c5da82998a606f75cd957dcae5eff3459b7379e056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8dc41ba5f4346e161ac11d0e0563e1f
SHA143754672d09c58b5819e9072d2a8f9bda8fd6b56
SHA2560b75b3a0e3fcfdef22ec100db17d73e3d23594880f169393b920aef75b6cd5b6
SHA512f741a2142ecb2e65c780d0654db23e6b05c55f7dc5d6ccaf9679ab0442c43f00492fa8c0a06b621173aa1fe8554175356a17c9f45c564f83a68e3e354905fed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b123461d17049b70adc5a2d22fe950d2
SHA1338e1d82eb2d17b84535a73c65c0e967124ca827
SHA25635f8110081fda88b67ed08aff90c14abed52bcd70b0e6878400cfbdb28d728f8
SHA512a6462c9670e9ea27e943e6f5021d3655d6dc3bb78cff6944aacf0d870d9b873c348ed06ee0cbb579b82820e02996fa852ecb1e9b5bb66ea3bf079dc4441d6ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b613e06cc0481c0fce9c6ad314a56f11
SHA104b594e682ab387db9bbe78134ad2572a2099f1e
SHA2562ff3324e49c38d8cb0a0bad834576eb30bc528299f89aa7145439b5192d4ee84
SHA51203b34a3b43a1b85b130bfe74b169fabb3bb103388dcc799fff58ae0bfe190441bbd722e82515e574fa80de19ad1fac5309c8c4cb5857ca9b77fa05d5e1372c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5087b729e7b4f8120fb05509b34e0302a
SHA1b29d27c9b38d750d9c97ab76efb4dadd25783499
SHA25687fe2788422984cbe33d291600816cca14c5ba128b97182756fb56841a44562c
SHA512b40b2af6c1b389a74d9a2355063030ecd69adfdc7e69c9a57b90a034bf19d2d5cfd2ea26ff0a90356a103ff33f4a3a60bda106a6287da4dc448f4d8d11caf652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a3ffbbd50dc0852c328b430a13894e3
SHA17e2e74611030ad4a2f0d1f4f7f41de201ba25e3b
SHA256243d9f74581a813efca88feaf82f511898437e86dbf2f5a081ef01b35ff8d628
SHA512b86fb305bac1fcabb381ca795c1d9ffff9af25cc18bd9d46de0fbbd2cd388ce7289f18e24711aa17dc7c6aadb8dd9fe0685e1b49151e2ccaee368b4cf155b0d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee4d630e54c4d2ef812cc2159130599e
SHA107fc3363664b28c1aa5377acea03a0397eca7a7e
SHA256c9d6e1366e50900bac273f880f6ef2e3bfc33f23838ff1187e8190b23ef1c3a5
SHA512f0b89825e42e7b0b258deb86b64439a4c79e9f1eb61f1102c27a1fdf8dea86b9cbbf4f8417b866f8afea93e3a7c799dadd4f7b4ac9fd655ea56eefe01f837bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f93645a4f0d698891d1bc4d63d45180a
SHA11a805d174e68f3c4c64b1cb27b76b23b19fa2701
SHA256c0228ef36e7a03445918044679b3d50e075e347ba8ad5ee0efaf5df3fe6eabd0
SHA5128f183d15b3b01d7bbed0ff9a2064589ad8003e8704190a573411a60ead059128758e7b88e9f7fa2ec40f96e5b1e3223358c7dbe49438e2f14970c88a965ad384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a33cb451d4bc78cff20bff55551e47de
SHA1c3b92acbca4f14106dc99ecb7382423ae7457b31
SHA2561aafe69073a331e3a9e2295a14882d7babaeed17c31100cbe3a3a0758abcf8b6
SHA512a8cbb45a5a2ce53ea7b5f8775087f3c798c64b8f72ae9a2cb230b12b93ee3aa4464c3348c8d155ddfc0aaf32deaa456782eb562aa82bbe8f2e713054368f2001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a6c51e4e4b1da7509193bc4011af206
SHA1ea624b1b81218a25fe507162592d219b5e3b022e
SHA256e73015b55e98573926cab01e7106b8b7550e29ef80ca901d4a61479468be47d2
SHA512bf5efd92c0fb87f913ea81e6f03ba9c031338c0fb65834d5fa84192269e7e910aaac111c838815b0121e8f435a7821a2390fb29479cb99c4256eb2897e143a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c058a913de12add1d1c88dfdb0255447
SHA1bd083a954ce645244231a67695b4244cb9f93ef0
SHA2565bc3e994ffb4be908adecffacbb9e57da2e7f5fe8d442ee683c5cda71a2eb292
SHA5121ec00d35da37c45e25368c309951e8e5eb35a72dfefc667e3e728b3c56f091a354d2dad8b87c6b20b697b2d7557a8b73bcbc443f82f3783df67fe067ce7151e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a86eeb227f3bec3ef5e880b3a1ae4974
SHA1f2314438727f0a66d8e13ba0e814572c992106fb
SHA2563a232adf4ce6a1a99cf1df53877c9ebc562f261fdc01ee6b26a953aa1f0e7f47
SHA512a2a900a07e6ba89e7b7c6ed688c08e29b70e63462a23067ab7ea4792b7ea45ccf8483400ab7ee73de0551c504fbde7871472f20933a0996f74d4b44039db5c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d963a9fffc10b5f73dd5548e12f4f6e
SHA1df2a8338d4fb8892eb521607b3bf95c87f8e33f3
SHA256f4ce5b8767746706e95b9dbff74b5af3b394bf42d4debfd37c3c8ad45ef20d3e
SHA512d5d643f049c16163f221a788d909de342d3305abae2a31e86e7941c03ac3cb5c85c05a2782c252b6a7a5d202ef606bcce83f8606628594c54f6ae05f56d62302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f109c8757488e40af06a025750e723e8
SHA1a243ef449456f3f9d5bd205313437a136fa6f07c
SHA256b845f63656286b1620f66e8fd8b3c306dfa0b7a4dd0f48828abbc503c5e953ec
SHA512a51618dede5d5807dba8e142475f9e9e8715b709864bf548b21cd95a6e90fcee8844ed0c1e4b61bdaf81e28a7013c2f88b35a60ccf103f520077e25c4328b0e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598471c74994091909af329cab0bae722
SHA1a4645791585b7ea6d3c2b51803801780a33854b2
SHA256570c29858b0b12a3f3f83b90b99d8952fc0b12a4e44e1b777fe736fe7ee45162
SHA512a19d91bf7e2c5b60b8b0910bf961cea5126c2d610bb780c26b16737e95b25303eac071f02837e6aac0c0a147a4988f5007d27f0aaf9e6236522dce4bae50b270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51afd9f6aa33feb9025bad90ea82fc094
SHA136a3fcbcc8f08f10a1698ecb3619a3114731358e
SHA25673794c169db4d2c6e1d8ab9e60d427f80074ee4861f9b90afd56ce6ad043e74e
SHA512bf7a15c0ae7db3ef26e87d362f88c10ffb3ef8778e25a6e51460bacfe56b79426b1941997a753e6f4e54ab27938608a5ebe91df33f4662682b87ca9dee77955c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5385386c08ef66440df4dadfd771ec1d0
SHA199492cbe5708fa6788c21783333d178a570fbfdb
SHA2563818efbff67c6229a25db5d3e3ac9333e0404e7326bb52f4aa6b288a4c6c1cf4
SHA512579e24a4fcb4ab973fd52ab2f90833c65005d9ed3183c89af974df8dbed965dd34c48592dcdfec1a08188f93e1ce8c2648f9b6d789085bd479ccc57feaa71e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c9d04aff14dd1c450b41a40e7a3d36b
SHA164ef7ec9f73f86212442eb56ffe12bc02d49996d
SHA256929537d00a44a8195769961996ff32d95132519bff5df83d478992517a31c988
SHA5126e52bbb4bd452ca24cf47a814a11c928af4adf71aea6149a0ba664618f0a6a1aff6e19575241c545914424bc9af9c7f04bdf04fc01b88d0d061c19c505c04895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b435ecfbd6cfb9f8f7fe0af14fa35cc
SHA1e0a331f20028ddf3f96f933f668ee7eef8712b91
SHA256fbd91c1a0136c6d8cc3ca2f9f898264c103ea6c84d3d0162c14995c17d0b807e
SHA5120f07ce5ad05523c2486d607d67d26803cf19b8f3c92e5d50f1e0bdd863e4cf40f2c1999282bcd19ea25146f3cd8fb36147a1e2eebe035097479c8a3290d8427b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d42839fa37281899978ea735507f3aa
SHA169a65b8bcd920008a8c079c50d08bca3844544d7
SHA256e7484853a1ae37d4b6cb5ed27ed9ba0670ecbd1d0470bfc7479d4e00519fdbea
SHA5124cd736589a6646ee446e5f112611db35c5d153513ff4e244f543333c024fa747ba5f25c532f7115ee3b73eb125fe532950204d4cd17b826374ab9d77448e9aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf5789c4261571d4e23f5d0aabb701ad
SHA16d54bbe90176b15788983b0ed5272b1c410b3249
SHA256c54bb59974569802c77d4cff3878143694311fd9ebd6a19ae729e9ea463207b5
SHA51287b5f5dc0bceee6c47bf4c4767b4e7ff979cc517c5c53ac14e0fb3e1be0976cf25ce9be7099236f6ee9cefe51fe14616bb3636cdeb8610b7c66e9feaafcfc5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528721682c93253d2aea9d06437873909
SHA1a66ed90a474e6d1a69da27bd89295c5a71be9dc1
SHA256f7a97806663e5a4f285f866d978702593707063e4f9e04a67932d555e2e7b796
SHA512590e40147f072cd29ec70e10ce0073e3d0fae5ba2dbd57de56b4cf38fc74e8e12555b671dca48b296f85547bc3ec11f2f93b57fe4288134a8e174d4f78df0764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5167514b661565767ad0762df4683fb73
SHA19a64ec5bea05fd5110e2a476b854be2dc9c1eea2
SHA25672a258016fa831a28152327e9832dbfa3db09e91b719bec4db90fabcb81bbfbe
SHA512c05e3c185037f1b8394491e19db8ed875725c96d28bc4cef3cbc0c2ce64699f6f28b70907239332eb7bcbc51046737168cdec772ab3dfadd22a95b5e8d466eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b5bc01e70031aebd3420372b051b04d
SHA17709880548a7dfc43e89a139ac0aa33c8caf665c
SHA2560c73f4e1c6cfbe030b0e40d03e50a64f621bbf017c44c26861bcc6638cf427e4
SHA5121cc2e4e407ae4edf0a2032a43c65fc231ae7ca1a681821571250ebac2d411979c1c99a6b67cf38170dcec4dad3c112db24d601b66f77d9dcf2aeb7de83b66f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dddd6e31c6ae7475b54cc0aee247a79f
SHA12a7bf6c88bdede5a531f36363674209cf3dbd8f2
SHA256b4fe14c9728ef2539812ed21b918029b2d3b1a9b51df89fdac5493006b61057d
SHA512b157dd0b876a152e7fc481a7810aae13eaf922710653b96d7f81d470b57311433d4f404ecaea3fa81f4ae1a320719b8ca9124a43c0f3efdd1cc4132d0538612f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f36ef4fd0d2a8a0bec86fc7a1a053343
SHA1f9a68d2263a0f679fad6def3a4d6d05606e43909
SHA256998e2aec67c269bb742ff8b0d4fcbc57f182c2230c471e36b43f52d67eadbbda
SHA5129b7f6efa3e6b35f765e144f243b824be480d3baabc3baf263e71bf504e5e40e0505ac51be654509dc3029394220eec7526336ddbdb0f2ba36f0f60a71b3c851d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fc9a8779313bbad67f5b47620230c3d
SHA1663a556075937c0fa316d57442dbbc3fd4312b0c
SHA25673b8e412b94ed02bc1113160230b533542c2785aa5ce9fe2bea012e038c1692a
SHA512efbf4a2322e8cb8cbb9222e6699d9d3fe9dec10f563ca3fabba3c8bc5b290f33a48db1269b0634a295aa0933b201146089c3ea7785c95aac40801061a78a2d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b3eb3e6a96632cdcb9561dc546eea38
SHA107dfbd5314e2df2af80312cb2531c4053b969390
SHA25689c5f054551d4b8f662dff5fe4c806e5a4a7f4f0b6509866df32961323cdd16a
SHA512e8e1fb09f5fd37f152f9afd31440bca35139d8d1929501bb4bf8536de2df4d8a91888a0babcab3f81ecc09a196cd60d06908690dc8652c5b06db1c15510755ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e37423cff797ac84978775225930bc2
SHA1619bca072200fc729c6f9c437415dcc987d0900a
SHA256bfb629995c138ff93b509172bbe187917f4ed4e1dc6a650968b664ce82df4345
SHA5122aca4a59d073b84a21270d95a225f7a8811adec0043835abaa820974ee07bde3fc7dd44ee530987578bf9ca37f71f02394f94eb38ff3509c7d44de335f6bd426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5600720d8aee07d2832802ccb9faaa0d0
SHA18f8fcdbc442175f7cf7f5298e9a5eae45a71c416
SHA2564eb43449da7a68c7ecd83a7ac10fc25d71d80530dcbeab38001b2bcaa92b0d96
SHA5126ff2f3fc195c08a2502d8b66fa29ab9625c4e8d59db5dd76463d89bfd452b1c5a3a93e21666b151a6277bca0dc01fc6c7a43e689e52d1a4ec5db58c62a72a412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f7085054ff3400e2f12138c34155a5c
SHA12b72dface1466ca2eeca6953dfc6d8fd7ba0f1e0
SHA2566849438980e4f174b2a4ecc9bddad00bb6d639545390b77ea1dd852168549540
SHA51277664c17a8cd8bb9f8adca0d15a39aaa7dbc6608dedb4968f67429efbf863a809f8201ca7f43e419be5f07d8e4d247d4015929bb3ce1036b5b7d4c2588cb322b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c17d628effb48cb3daacbc12c51401f
SHA101ce8e929898d6d50c97fc1402e4233f5063280c
SHA256bcd60aa9f75b0bfa6c97bcf144e02946ec38350dde68c74d86c91eabb2a9775b
SHA51274bf9fc8c9a9459120e01aa4b9dcd48ec30215db7c79bd6355fe8df952dc37b55e650eba3af841682303f748bc7d6a7e41077ebc57da68168f8e0a894a9b9a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522e4fc959bc82d2d088269dc68b09d90
SHA1886ead2e2af4b3e9554aa45641546bf43fc3d8ab
SHA256d6798194ad92b937dfb81ba816f67dd271c9ce4db7c7b791eacb8e5015387643
SHA51261455964c3809744aea66c6a292a5368b59c42a4c9a48e99b1a0ba71e607df8f7397fed2292f3d3bba6edb18cfd510a5057096aa6e3d46db0b46b9c7a48e785d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf45d99ac6527b341a26eef2f400deff
SHA11e035f784bf15d46f55a2b4f426e60dfe9782d04
SHA256c7941a0e0dc9ab52fb269701d46fa33260b801f448a12ef3a571832ba93e1e1f
SHA5127059bf6f99ca31b820f74aa1ba8a6cb967b140e078bd88d0acdfbf99656db588549c9fa68d405a6a2d1a4b50509024fcf510815631c376fd42cde0ec9e3f5e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516d230ac50584e2b38b5f9bfb93fe1fd
SHA1401969267a0384610910128801f88a9f5ed2c82f
SHA256c649e1354de2a0ed3fb5f4af539e5e6296abdbbb96b57c3d2724bed3960c15c9
SHA512b9e260946ec89e9a61bab7323728591f8d1034bab0c44c8d294b372c61a2e9e98f891181fc6c110e7d05646f5bc30e38693533ba10e100809b59dffb22695cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a397c17073883972d619ff5c72f01e1c
SHA1b77d70f63c755ec5e78f8cc11f7d644f3a1aeb2c
SHA256018d56a8c59128c28384ba84e1102d0811ec5606edc6939f1799e4dac0093bac
SHA5120d1638ae3b998ef91faa5e0ddb55cf9139af069beab19425c11890e53d00f3a9a7d0c5945948e9e37c391737259224d0f1a9027443d1ec188a738baef06bc22e