Analysis
-
max time kernel
60s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
0671c5cfbd0ea6344d096ad46cf0fe17.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0671c5cfbd0ea6344d096ad46cf0fe17.exe
Resource
win10v2004-20231222-en
General
-
Target
0671c5cfbd0ea6344d096ad46cf0fe17.exe
-
Size
25KB
-
MD5
0671c5cfbd0ea6344d096ad46cf0fe17
-
SHA1
33a80b4fb446ab1da6457b018b6b3a9a11a184a4
-
SHA256
6c978b13d3a48cb2590123d5fdf3fbf5945ec0a73621caa32af809ffa22b2fa1
-
SHA512
085ea0ec4df5e53e1e1fe5981d4b2c457762a4227c08c6ea18c2ec11b293ad132b59a34c380ec034de2ffb5a2858bfefcd8dc8c25f73a7afd0478c40602e8e21
-
SSDEEP
768:MqbKI+C2pbyw15X/WllPlqZrpvUnYiu+:/KI+C2pWw1kzNq7MnYiu
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 4752 csrss.exe 5052 csrss.exe 2604 csrss.exe 4888 csrss.exe 2060 csrss.exe 3124 csrss.exe 4872 csrss.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe 0671c5cfbd0ea6344d096ad46cf0fe17.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File created C:\Windows\SysWOW64\n.ini 0671c5cfbd0ea6344d096ad46cf0fe17.exe File opened for modification C:\Windows\SysWOW64\n.ini 0671c5cfbd0ea6344d096ad46cf0fe17.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\n.ini csrss.exe File opened for modification C:\Windows\SysWOW64\wbem\csrss.exe 0671c5cfbd0ea6344d096ad46cf0fe17.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe File created C:\Windows\SysWOW64\wbem\csrss.exe csrss.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31079205" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015a2f750fe9ee1479ecf0c8cfb11934c000000000200000000001066000000010000200000002a5d50a00b07b4276c31c5c1b8197cc9c0d7e1fd8ff004c2033a7a82bdbeca89000000000e80000000020000200000005e9cae587ebfac783b5d7f0ecae03e7fd2908f264332385a6ec34ac1cfc80a072000000007b7f7a07528ed6175548bee21127c2962c867a0b3baf0122b43ffc08603ec1a400000000509a11416fe98a916f3656b17d20196320991d782ee7b3db1ecdd0687f123bf584dcd12c6ab3d3f9e9d0ed05a96e9cdf00e71e44d75bd3756f5303446bf184e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5563EFA4-A718-11EE-A0B6-DA96C499C6F0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "722269848" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015a2f750fe9ee1479ecf0c8cfb11934c00000000020000000000106600000001000020000000e6aeedd135d3fd5ec356949a6be0f8938b8640cc88da9d08ab89ca054c8d02a5000000000e8000000002000020000000dda65feabcc54fbab04627df5e16595ac2ce025b18527e9f06c61fbc736fa58920000000459dd16799d01855a6746d83ed1007a2f30d95a7962e5d87d06b42151d0ebe3840000000075a47b25a3ebb0151c7ab037a79f8a7ec909d3d3f9907c5cb4497eb75fff8194cda7409a11e49525f412fe692ab50348988d4aca1e8663cfbcc00633a09179a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f090692e253bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015a2f750fe9ee1479ecf0c8cfb11934c000000000200000000001066000000010000200000008a8f470e112286d40d8136e1e3b43331f9ac73ae3a43cd6b8142142889ae6565000000000e8000000002000020000000a6a46ae767a89a0e056edb62b9753be056e5f094f8f88485796f3c612d5ddae9200000006d25b06d98f7a60ce4b359231e4737df715b1384f0db6dcd360a4375400b71ad400000003c116130efdcc0e9f2f710674fba6ae5ebb3e91b55e86c2b12a8d18d346c08f7b672d14f2a46fb9bde4935fa061fe0a02b4f32162b0c41c16d7edfc597290772 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01f672e253bda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{6D239CB5-A718-11EE-A0B6-DA96C499C6F0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "722269848" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31079205" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09dd634253bda01 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 436 0671c5cfbd0ea6344d096ad46cf0fe17.exe 436 0671c5cfbd0ea6344d096ad46cf0fe17.exe 4752 csrss.exe 4752 csrss.exe 5052 csrss.exe 5052 csrss.exe 2604 csrss.exe 2604 csrss.exe 4888 csrss.exe 4888 csrss.exe 2060 csrss.exe 2060 csrss.exe 3124 csrss.exe 3124 csrss.exe 4872 csrss.exe 4872 csrss.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1020 iexplore.exe 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1020 iexplore.exe 1020 iexplore.exe 4956 IEXPLORE.EXE 4956 IEXPLORE.EXE 1288 iexplore.exe 1288 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1288 iexplore.exe 1288 iexplore.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1020 wrote to memory of 4956 1020 iexplore.exe 100 PID 1020 wrote to memory of 4956 1020 iexplore.exe 100 PID 1020 wrote to memory of 4956 1020 iexplore.exe 100 PID 436 wrote to memory of 4752 436 0671c5cfbd0ea6344d096ad46cf0fe17.exe 103 PID 436 wrote to memory of 4752 436 0671c5cfbd0ea6344d096ad46cf0fe17.exe 103 PID 436 wrote to memory of 4752 436 0671c5cfbd0ea6344d096ad46cf0fe17.exe 103 PID 436 wrote to memory of 4840 436 0671c5cfbd0ea6344d096ad46cf0fe17.exe 104 PID 436 wrote to memory of 4840 436 0671c5cfbd0ea6344d096ad46cf0fe17.exe 104 PID 436 wrote to memory of 4840 436 0671c5cfbd0ea6344d096ad46cf0fe17.exe 104 PID 4752 wrote to memory of 5052 4752 csrss.exe 107 PID 4752 wrote to memory of 5052 4752 csrss.exe 107 PID 4752 wrote to memory of 5052 4752 csrss.exe 107 PID 4752 wrote to memory of 4440 4752 csrss.exe 108 PID 4752 wrote to memory of 4440 4752 csrss.exe 108 PID 4752 wrote to memory of 4440 4752 csrss.exe 108 PID 5052 wrote to memory of 2604 5052 csrss.exe 110 PID 5052 wrote to memory of 2604 5052 csrss.exe 110 PID 5052 wrote to memory of 2604 5052 csrss.exe 110 PID 5052 wrote to memory of 1684 5052 csrss.exe 111 PID 5052 wrote to memory of 1684 5052 csrss.exe 111 PID 5052 wrote to memory of 1684 5052 csrss.exe 111 PID 2604 wrote to memory of 4888 2604 csrss.exe 113 PID 2604 wrote to memory of 4888 2604 csrss.exe 113 PID 2604 wrote to memory of 4888 2604 csrss.exe 113 PID 2604 wrote to memory of 1280 2604 csrss.exe 114 PID 2604 wrote to memory of 1280 2604 csrss.exe 114 PID 2604 wrote to memory of 1280 2604 csrss.exe 114 PID 4888 wrote to memory of 2060 4888 csrss.exe 118 PID 4888 wrote to memory of 2060 4888 csrss.exe 118 PID 4888 wrote to memory of 2060 4888 csrss.exe 118 PID 4888 wrote to memory of 208 4888 csrss.exe 119 PID 4888 wrote to memory of 208 4888 csrss.exe 119 PID 4888 wrote to memory of 208 4888 csrss.exe 119 PID 2060 wrote to memory of 3124 2060 csrss.exe 122 PID 2060 wrote to memory of 3124 2060 csrss.exe 122 PID 2060 wrote to memory of 3124 2060 csrss.exe 122 PID 2060 wrote to memory of 4752 2060 csrss.exe 121 PID 2060 wrote to memory of 4752 2060 csrss.exe 121 PID 2060 wrote to memory of 4752 2060 csrss.exe 121 PID 1288 wrote to memory of 1688 1288 iexplore.exe 125 PID 1288 wrote to memory of 1688 1288 iexplore.exe 125 PID 1288 wrote to memory of 1688 1288 iexplore.exe 125 PID 3124 wrote to memory of 4872 3124 csrss.exe 127 PID 3124 wrote to memory of 4872 3124 csrss.exe 127 PID 3124 wrote to memory of 4872 3124 csrss.exe 127 PID 3124 wrote to memory of 1396 3124 csrss.exe 126 PID 3124 wrote to memory of 1396 3124 csrss.exe 126 PID 3124 wrote to memory of 1396 3124 csrss.exe 126 PID 1288 wrote to memory of 2508 1288 iexplore.exe 129 PID 1288 wrote to memory of 2508 1288 iexplore.exe 129 PID 1288 wrote to memory of 2508 1288 iexplore.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\0671c5cfbd0ea6344d096ad46cf0fe17.exe"C:\Users\Admin\AppData\Local\Temp\0671c5cfbd0ea6344d096ad46cf0fe17.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat7⤵PID:4752
-
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat8⤵PID:1396
-
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat9⤵PID:3180
-
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe9⤵PID:4304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat10⤵PID:2256
-
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe10⤵PID:1984
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe11⤵PID:4820
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe12⤵PID:4808
-
C:\Windows\SysWOW64\wbem\csrss.exeC:\Windows\system32\wbem\csrss.exe13⤵PID:1948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat13⤵PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat12⤵PID:1820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat11⤵PID:1824
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat6⤵PID:208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat5⤵PID:1280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat4⤵PID:1684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat3⤵PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat2⤵PID:4840
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:1600
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1020 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4956
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:17418 /prefetch:22⤵PID:2508
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:3404
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3404 CREDAT:17410 /prefetch:22⤵PID:1816
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:2012
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:17410 /prefetch:22⤵PID:2632
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:376
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:376 CREDAT:17410 /prefetch:22⤵PID:3040
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:1608
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:17410 /prefetch:22⤵PID:2284
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:2500
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:17410 /prefetch:22⤵PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dfeabde84792228093a5a270352395b6
SHA1e41258c9576721025926326f76063c2305586f76
SHA25677b138ab5d0a90ff04648c26addd5e414cc178165e3b54a4cb3739da0f58e075
SHA512e256f603e67335151bb709294749794e2e3085f4063c623461a0b3decbcca8e620807b707ec9bcbe36dcd7d639c55753da0495be85b4ae5fb6bfc52ab4b284fd
-
Filesize
748B
MD5c4f558c4c8b56858f15c09037cd6625a
SHA1ee497cc061d6a7a59bb66defea65f9a8145ba240
SHA25639e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781
SHA512d60353d3fbea2992d96795ba30b20727b022b9164b2094b922921d33ca7ce1634713693ac191f8f5708954544f7648f4840bcd5b62cb6a032ef292a8b0e52a44
-
Filesize
4KB
MD5d65ec06f21c379c87040b83cc1abac6b
SHA1208d0a0bb775661758394be7e4afb18357e46c8b
SHA256a1270e90cea31b46432ec44731bf4400d22b38eb2855326bf934fe8f1b169a4f
SHA5128a166d26b49a5d95aea49bc649e5ea58786a2191f4d2adac6f5fbb7523940ce4482d6a2502aa870a931224f215cb2010a8c9b99a2c1820150e4d365cab28299e
-
Filesize
2KB
MD52dc61eb461da1436f5d22bce51425660
SHA1e1b79bcab0f073868079d807faec669596dc46c1
SHA256acdeb4966289b6ce46ecc879531f85e9c6f94b718aab521d38e2e00f7f7f7993
SHA512a88becb4fbddc5afc55e4dc0135af714a3eec4a63810ae5a989f2cecb824a686165d3cedb8cbd8f35c7e5b9f4136c29dea32736aabb451fe8088b978b493ac6d
-
Filesize
11KB
MD59234071287e637f85d721463c488704c
SHA1cca09b1e0fba38ba29d3972ed8dcecefdef8c152
SHA25665cc039890c7ceb927ce40f6f199d74e49b8058c3f8a6e22e8f916ad90ea8649
SHA51287d691987e7a2f69ad8605f35f94241ab7e68ad4f55ad384f1f0d40dc59ffd1432c758123661ee39443d624c881b01dcd228a67afb8700fe5e66fc794a6c0384
-
Filesize
232B
MD5ca754767517770cb111f822b6a54bb86
SHA1e270aa162803ad6514b5975f7d654347368776eb
SHA2567462be25adb22cb0d7db4cd0e8d36328e59729463ab2f5fc4961e398bcf2b916
SHA512275caf430152b4671379006b319d02c59fc0c154de5a0cbcb68b091886fb001eea6cd1c22985aa2b9c7c1f7b82e7f42bee7de5ec846f3dd8e051ef3347827f03
-
Filesize
160B
MD5688de2c11d07cd1a0f0a22aaba2f38fe
SHA1c693ee247172adf49b1fe68c597358b0e0e2477e
SHA2568fd8370941a44a938f35789dae430fe4ee8bb1443f05baad544b48c261ae40d7
SHA512d1ecc15e5e1da8d9f35f95ed2b66763ed314e9b523dacd1eb42332b8f3d9c8256f46830c7b9c107ada42cc51d4dfe6ac9cd845b6fdbcf25677c5c50b138bde0a
-
Filesize
16KB
MD541c51b027a3293fb6c9211076c20625d
SHA133221d2ff23257297b08b363ad03ba01902ec6fa
SHA2569161eaf48752f44afc7cb7ab617bd3d60b8f19b1f2e8f5cb70a0b147307aa9af
SHA512fbded871b069dfe82b2876f16cefb1b4eb969b7e16a17095e359dd27372e6fdba0bc855d34c86301b3b33ec561cd12a393505e325eb0579758899634e8445fee
-
Filesize
19B
MD5e415f059d8566da0d8d44108e0e915fe
SHA134dff1c646f465308c2804f0f046bbdcdfb53661
SHA256b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782
SHA512fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b
-
Filesize
25KB
MD50671c5cfbd0ea6344d096ad46cf0fe17
SHA133a80b4fb446ab1da6457b018b6b3a9a11a184a4
SHA2566c978b13d3a48cb2590123d5fdf3fbf5945ec0a73621caa32af809ffa22b2fa1
SHA512085ea0ec4df5e53e1e1fe5981d4b2c457762a4227c08c6ea18c2ec11b293ad132b59a34c380ec034de2ffb5a2858bfefcd8dc8c25f73a7afd0478c40602e8e21