Analysis
-
max time kernel
180s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
3eabd4053ac40f9008c16911e099c68f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3eabd4053ac40f9008c16911e099c68f.exe
Resource
win10v2004-20231215-en
General
-
Target
3eabd4053ac40f9008c16911e099c68f.exe
-
Size
172KB
-
MD5
3eabd4053ac40f9008c16911e099c68f
-
SHA1
ecb6005c816b53ea13c9636bb976f8af9295f2d3
-
SHA256
77dba7da62a2c1c47511025fe702bf9cc57ead9fca4ee981c96ec6585fde82ae
-
SHA512
0b91940db9794f73f862d5243ca5873707e18f0324e129aae79cd8b84a9bc4210c30dfe9b49bab0162d700101ce369fc7b2c6f26b44bca0b23077b818cd70789
-
SSDEEP
3072:/zhAOUGEtxGW+nKORrkKxm5uGcECoH/fey6J:/dA+OxmKEu5urQ3e
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\PMouie = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcconsol.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RegClean.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AppSvc32.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SDGames.exe 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrssvc.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvol.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVStub.kxp\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QHSET.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SmartUp.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adam.exe 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\runiep.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shcfg32.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.kxp 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxPol.exe 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logogo.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Discovery.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVSetup.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMailMon.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pagefile.exe 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASMain.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVDX.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cross.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit32.Exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KsLoader.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREng.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\isPwdSvc.exe 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.exe 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.exe 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVCenter.kxp 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwProxy.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pagefile.pif\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAV32.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TxoMoU.Exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.com\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVDX.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvol.exe 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcconsol.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFWLiveUpdate.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sos.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\niu.exe 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UFO.exe 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP_1.kxp 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QHSET.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\runiep.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxAgent.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32X.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NAVSetup.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccSvcHst.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvupload.exe 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMonD.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\XP.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kernelwind32.exe 3eabd4053ac40f9008c16911e099c68f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 3eabd4053ac40f9008c16911e099c68f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxCfg.exe 3eabd4053ac40f9008c16911e099c68f.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system32StopAor.exe 3eabd4053ac40f9008c16911e099c68f.exe File opened for modification C:\Windows\system32StopAor.exe 3eabd4053ac40f9008c16911e099c68f.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1070449442" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1224200876" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31080010" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{69686213-AA3D-11EE-9BE3-52EF8B93895E} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1224200876" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1070449442" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31080010" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31080010" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31080010" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe 3872 3eabd4053ac40f9008c16911e099c68f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3872 3eabd4053ac40f9008c16911e099c68f.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3280 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3280 IEXPLORE.EXE 3280 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3872 wrote to memory of 3280 3872 3eabd4053ac40f9008c16911e099c68f.exe 90 PID 3872 wrote to memory of 3280 3872 3eabd4053ac40f9008c16911e099c68f.exe 90 PID 3280 wrote to memory of 2400 3280 IEXPLORE.EXE 91 PID 3280 wrote to memory of 2400 3280 IEXPLORE.EXE 91 PID 3280 wrote to memory of 2400 3280 IEXPLORE.EXE 91 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer 3eabd4053ac40f9008c16911e099c68f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3eabd4053ac40f9008c16911e099c68f.exe"C:\Users\Admin\AppData\Local\Temp\3eabd4053ac40f9008c16911e099c68f.exe"1⤵
- Adds policy Run key to start application
- Sets file execution options in registry
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3872 -
C:\Program Files\Internet Explorer\IEXPLORE.EXEOpen2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3280 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d