Overview
overview
4Static
static
3windows95-....1.zip
windows7-x64
1windows95-....1.zip
windows10-2004-x64
1locales\af.pak
windows7-x64
3locales\af.pak
windows10-2004-x64
3locales\am.pak
windows7-x64
3locales\am.pak
windows10-2004-x64
3locales\ar.pak
windows7-x64
4locales\ar.pak
windows10-2004-x64
3locales\bg.pak
windows7-x64
3locales\bg.pak
windows10-2004-x64
1locales\bn.pak
windows7-x64
3locales\bn.pak
windows10-2004-x64
3locales\ca.pak
windows7-x64
3locales\ca.pak
windows10-2004-x64
1locales\cs.pak
windows7-x64
1locales\cs.pak
windows10-2004-x64
3locales\da.pak
windows7-x64
3locales\da.pak
windows10-2004-x64
1locales\de.pak
windows7-x64
1locales\de.pak
windows10-2004-x64
3locales\el.pak
windows7-x64
3locales\el.pak
windows10-2004-x64
3locales\en-GB.pak
windows7-x64
1locales\en-GB.pak
windows10-2004-x64
3locales\en-US.pak
windows7-x64
3locales\en-US.pak
windows10-2004-x64
3locales\es-419.pak
windows7-x64
3locales\es-419.pak
windows10-2004-x64
3locales\es.pak
windows7-x64
3locales\es.pak
windows10-2004-x64
3locales\et.pak
windows7-x64
3locales\et.pak
windows10-2004-x64
3Analysis
-
max time kernel
143s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
windows95-win32-x64-3.1.1.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
windows95-win32-x64-3.1.1.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
locales\af.pak
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
locales\af.pak
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
locales\am.pak
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
locales\am.pak
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
locales\ar.pak
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
locales\ar.pak
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
locales\bg.pak
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
locales\bg.pak
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
locales\bn.pak
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
locales\bn.pak
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
locales\ca.pak
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
locales\ca.pak
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
locales\cs.pak
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
locales\cs.pak
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
locales\da.pak
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
locales\da.pak
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
locales\de.pak
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
locales\de.pak
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
locales\el.pak
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
locales\el.pak
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
locales\en-GB.pak
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
locales\en-GB.pak
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
locales\en-US.pak
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
locales\en-US.pak
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
locales\es-419.pak
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
locales\es-419.pak
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
locales\es.pak
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
locales\es.pak
Resource
win10v2004-20231222-en
Behavioral task
behavioral31
Sample
locales\et.pak
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
locales\et.pak
Resource
win10v2004-20231215-en
General
-
Target
locales\ar.pak
-
Size
573KB
-
MD5
cbeaafb259a3a0ad76739186e9b2bf75
-
SHA1
11b348534a84c9648eb86c9790bfb7703cde242f
-
SHA256
c28e612cae27402f2a75c9699268f1781b286748b0590d396e0a538e3aa67e49
-
SHA512
2c91f17343d947cd4eb4d8d339e5932a3331445b4e826915d54196c29ce548b7e98a9b5f9857146a9a956ce20d3e624fb04b7c44d3c1a2593e8b6e2cb12662b0
-
SSDEEP
12288:eCYtqr0jXjiRp/DvYUBuGYurA5SNbr+ATg5Y3MgSENFh:Z1Cuk52+k
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico AcroRd32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410473439" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AA45FD61-AA71-11EE-88F9-76B33C18F4CF} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies registry class 40 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\pak_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\pak_auto_file\shell\Read rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots AcroRd32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff AcroRd32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy AcroRd32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 AcroRd32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.pak\ = "pak_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\pak_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_Classes\Local Settings AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC} AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\pak_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders AcroRd32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1092616193" AcroRd32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Sort = 000000000000000000000000000000000200000030f125b7ef471a10a5f102608c9eebac0a0000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff AcroRd32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\IconSize = "16" AcroRd32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1" AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.pak rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\pak_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU AcroRd32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff AcroRd32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" AcroRd32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Mode = "4" AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\pak_auto_file rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 AcroRd32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" AcroRd32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\TV_TopViewVersion = "0" AcroRd32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff AcroRd32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 AcroRd32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9} AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 AcroRd32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff AcroRd32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlgLegacy\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\LogicalViewMode = "1" AcroRd32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2036 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2672 AcroRd32.exe 2036 vlc.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 2672 AcroRd32.exe 2672 AcroRd32.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 584 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe 2036 vlc.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2672 AcroRd32.exe 2672 AcroRd32.exe 2672 AcroRd32.exe 2672 AcroRd32.exe 2672 AcroRd32.exe 1808 AcroRd32Info.exe 1808 AcroRd32Info.exe 2036 vlc.exe 584 IEXPLORE.EXE 584 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2832 2352 cmd.exe 31 PID 2352 wrote to memory of 2832 2352 cmd.exe 31 PID 2352 wrote to memory of 2832 2352 cmd.exe 31 PID 2832 wrote to memory of 2672 2832 rundll32.exe 32 PID 2832 wrote to memory of 2672 2832 rundll32.exe 32 PID 2832 wrote to memory of 2672 2832 rundll32.exe 32 PID 2832 wrote to memory of 2672 2832 rundll32.exe 32 PID 576 wrote to memory of 584 576 iexplore.exe 38 PID 576 wrote to memory of 584 576 iexplore.exe 38 PID 576 wrote to memory of 584 576 iexplore.exe 38 PID 576 wrote to memory of 584 576 iexplore.exe 38 PID 584 wrote to memory of 2436 584 IEXPLORE.EXE 39 PID 584 wrote to memory of 2436 584 IEXPLORE.EXE 39 PID 584 wrote to memory of 2436 584 IEXPLORE.EXE 39 PID 584 wrote to memory of 2436 584 IEXPLORE.EXE 39
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\locales\ar.pak1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\ar.pak2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\ar.pak"3⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe" /PDFShell -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1808
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\WriteDisable.m4a"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2036
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome1⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2436
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541e9c8d275b02153993d763af9dc4b39
SHA158675e8130a18bd50a82d91a3aaf973741e55a24
SHA25663fc7e57eab3ab0b78af5439036ff49bef2233fcc201be70f21a47895253ce40
SHA5125c30e9ac5036a7a84c96be620f72df85ae0620f93fb4b8f41724a475610f132caaa53b75e54176ba7e1cbd8da962d2ce335c785b246452ed24a38f533f0e2af3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
135KB
MD5a3e82779d757fb4faf9cc73237c18b8a
SHA1ea034b8be607b5244f71e3611aea533aba490177
SHA256d4c9d7a37ef7b1dfa3411ff02127df69b6aab8f3e08abd8dacdaae5fb9fe0d9a
SHA512b256f6f0e2566d86188ee56c9cf0e5ad28231a92cbea8368a178347ac75fa653f964340db541bddd7c7de7f66b918f2c51a4e8243b504b475c9ac09dd760c44f
-
Filesize
3KB
MD54e7840c4f0a729ba06421bc79fde02a5
SHA1dcb846150c65492e564556b4f560f2b46855e98d
SHA2568a4866b01fad746105f80f718ab5edf4da1a3b4b38224d32ec554eb2ab79cbde
SHA512fd932a94492fb8c96189087d89ac8dda551d32bc498712ec543f74d47fad945bec26391e39c6ab19026c573fde1e20f101cbe756f676f8ceefb2a77ebea36f14
-
Filesize
70KB
MD58a4ac03151d32a8b50a8a9de78bc2e30
SHA1cc50ef0acdc93dd1e6a74de1ce463906e74b5a8c
SHA256723959d317a8cf3d06eb8a62ba288a7d1032f00fbecff540b56f0b72555b97e5
SHA5125f7b726e05fb2fcf2a4f3422925fdf850b27e9fa5a331981059f19fa4a55f133a4d7904f14d0147dd873a918bb607a5da34ce0aef652ed197170de0efb8cac2b