Analysis
-
max time kernel
122s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-01-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
3f0ac30243cda7a1e685422fa8562876.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f0ac30243cda7a1e685422fa8562876.exe
Resource
win10v2004-20231222-en
General
-
Target
3f0ac30243cda7a1e685422fa8562876.exe
-
Size
50KB
-
MD5
3f0ac30243cda7a1e685422fa8562876
-
SHA1
820b4794d5a896b17ff6cee43b372378ab9ca33e
-
SHA256
79e9b5dceccec273446db7930a29243dba1e3b2a2da8bfa965f444daee444bdd
-
SHA512
45d5d3e9337691e4cae9c24ec396aec890959c77b00b7c8ccd252ee81d4ca62ff23bbadf0bb56da8ebdcaed77acdcf58223d04eb6c9c9373e474ad4a92125423
-
SSDEEP
768:5cVJYDePPUXb5CKvBmAbDCLOhRjMss59QLfN2ssvVEyewqHBCohL3quOlsCT:KqDQPUXb5zBmAKLImmZ1s+yewq0tlLT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2604 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2860 ins88A0.tmp -
Loads dropped DLL 2 IoCs
pid Process 2688 cmd.exe 2688 cmd.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\WinRAR\winRarExt64.dat 3f0ac30243cda7a1e685422fa8562876.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B33A591-AA79-11EE-BF28-E6629DF8543F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B3AC9B1-AA79-11EE-BF28-E6629DF8543F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410476846" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B3D2B11-AA79-11EE-BF28-E6629DF8543F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2216 3f0ac30243cda7a1e685422fa8562876.exe Token: SeIncBasePriorityPrivilege 2860 ins88A0.tmp -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2564 iexplore.exe 2780 iexplore.exe 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2564 iexplore.exe 2564 iexplore.exe 2792 iexplore.exe 2792 iexplore.exe 2780 iexplore.exe 2780 iexplore.exe 436 IEXPLORE.EXE 436 IEXPLORE.EXE 1492 IEXPLORE.EXE 1492 IEXPLORE.EXE 388 IEXPLORE.EXE 388 IEXPLORE.EXE 388 IEXPLORE.EXE 388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2688 2216 3f0ac30243cda7a1e685422fa8562876.exe 27 PID 2216 wrote to memory of 2688 2216 3f0ac30243cda7a1e685422fa8562876.exe 27 PID 2216 wrote to memory of 2688 2216 3f0ac30243cda7a1e685422fa8562876.exe 27 PID 2216 wrote to memory of 2688 2216 3f0ac30243cda7a1e685422fa8562876.exe 27 PID 2216 wrote to memory of 2936 2216 3f0ac30243cda7a1e685422fa8562876.exe 29 PID 2216 wrote to memory of 2936 2216 3f0ac30243cda7a1e685422fa8562876.exe 29 PID 2216 wrote to memory of 2936 2216 3f0ac30243cda7a1e685422fa8562876.exe 29 PID 2216 wrote to memory of 2936 2216 3f0ac30243cda7a1e685422fa8562876.exe 29 PID 2216 wrote to memory of 2588 2216 3f0ac30243cda7a1e685422fa8562876.exe 31 PID 2216 wrote to memory of 2588 2216 3f0ac30243cda7a1e685422fa8562876.exe 31 PID 2216 wrote to memory of 2588 2216 3f0ac30243cda7a1e685422fa8562876.exe 31 PID 2216 wrote to memory of 2588 2216 3f0ac30243cda7a1e685422fa8562876.exe 31 PID 2936 wrote to memory of 2820 2936 cmd.exe 33 PID 2936 wrote to memory of 2820 2936 cmd.exe 33 PID 2936 wrote to memory of 2820 2936 cmd.exe 33 PID 2936 wrote to memory of 2820 2936 cmd.exe 33 PID 2216 wrote to memory of 2780 2216 3f0ac30243cda7a1e685422fa8562876.exe 34 PID 2216 wrote to memory of 2780 2216 3f0ac30243cda7a1e685422fa8562876.exe 34 PID 2216 wrote to memory of 2780 2216 3f0ac30243cda7a1e685422fa8562876.exe 34 PID 2216 wrote to memory of 2780 2216 3f0ac30243cda7a1e685422fa8562876.exe 34 PID 2588 wrote to memory of 2608 2588 cmd.exe 35 PID 2588 wrote to memory of 2608 2588 cmd.exe 35 PID 2588 wrote to memory of 2608 2588 cmd.exe 35 PID 2588 wrote to memory of 2608 2588 cmd.exe 35 PID 2216 wrote to memory of 2792 2216 3f0ac30243cda7a1e685422fa8562876.exe 36 PID 2216 wrote to memory of 2792 2216 3f0ac30243cda7a1e685422fa8562876.exe 36 PID 2216 wrote to memory of 2792 2216 3f0ac30243cda7a1e685422fa8562876.exe 36 PID 2216 wrote to memory of 2792 2216 3f0ac30243cda7a1e685422fa8562876.exe 36 PID 2216 wrote to memory of 2564 2216 3f0ac30243cda7a1e685422fa8562876.exe 37 PID 2216 wrote to memory of 2564 2216 3f0ac30243cda7a1e685422fa8562876.exe 37 PID 2216 wrote to memory of 2564 2216 3f0ac30243cda7a1e685422fa8562876.exe 37 PID 2216 wrote to memory of 2564 2216 3f0ac30243cda7a1e685422fa8562876.exe 37 PID 2216 wrote to memory of 2604 2216 3f0ac30243cda7a1e685422fa8562876.exe 38 PID 2216 wrote to memory of 2604 2216 3f0ac30243cda7a1e685422fa8562876.exe 38 PID 2216 wrote to memory of 2604 2216 3f0ac30243cda7a1e685422fa8562876.exe 38 PID 2216 wrote to memory of 2604 2216 3f0ac30243cda7a1e685422fa8562876.exe 38 PID 2564 wrote to memory of 436 2564 iexplore.exe 42 PID 2564 wrote to memory of 436 2564 iexplore.exe 42 PID 2564 wrote to memory of 436 2564 iexplore.exe 42 PID 2564 wrote to memory of 436 2564 iexplore.exe 42 PID 2792 wrote to memory of 388 2792 iexplore.exe 41 PID 2792 wrote to memory of 388 2792 iexplore.exe 41 PID 2792 wrote to memory of 388 2792 iexplore.exe 41 PID 2792 wrote to memory of 388 2792 iexplore.exe 41 PID 2780 wrote to memory of 1492 2780 iexplore.exe 43 PID 2780 wrote to memory of 1492 2780 iexplore.exe 43 PID 2780 wrote to memory of 1492 2780 iexplore.exe 43 PID 2780 wrote to memory of 1492 2780 iexplore.exe 43 PID 2688 wrote to memory of 2860 2688 cmd.exe 44 PID 2688 wrote to memory of 2860 2688 cmd.exe 44 PID 2688 wrote to memory of 2860 2688 cmd.exe 44 PID 2688 wrote to memory of 2860 2688 cmd.exe 44 PID 2860 wrote to memory of 2704 2860 ins88A0.tmp 50 PID 2860 wrote to memory of 2704 2860 ins88A0.tmp 50 PID 2860 wrote to memory of 2704 2860 ins88A0.tmp 50 PID 2860 wrote to memory of 2704 2860 ins88A0.tmp 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f0ac30243cda7a1e685422fa8562876.exe"C:\Users\Admin\AppData\Local\Temp\3f0ac30243cda7a1e685422fa8562876.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\ins88A0.tmpC:\Users\Admin\AppData\Local\Temp\ins88A0.tmp inlink-verycm.tmp3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\ins88A0.tmp > nul4⤵PID:2704
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵
- Drops file in Windows directory
PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_deskurl_cab.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\desktop_url.cab" -F:*.* "C:\Users\Admin\Desktop"3⤵
- Drops file in Windows directory
PID:2608
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://jump3.35638.com:27889/report3.ashx?m=E6-62-9D-F8-54-3F&mid=21663&tid=1&d=90555df91d6e4a86557838c2849d7a55&uid=13729&t=2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://tc.58816.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:388
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.38522.com/bhy.html?popup2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
PID:436
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3F0AC3~1.EXE > nul2⤵
- Deletes itself
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6e1124853ddab1018798e647ae11d85
SHA13fade9151845bc956f58f1dd035cc3bbe4f4d780
SHA2567898cb27c2a98be9ffe8af810214b3b8b7fd3c9af569b272b3a014ef01574c2c
SHA51219fca3fdf16adf40a1e2d759ed8b91727d4442da49b1ed0adf3ff9719648c3a2b5990de01929705cfb89491ffc6a5418264d5b0601b718ec052aebb95a9451ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57df6e7a3d5cce06cf76b2e477ed33088
SHA115f96c08a137b78d2114bed713fc1b8783c470cc
SHA2566f22b69dd1e8f3db82313c037de4e268b8c34df92c68a757a0fcb65f76f094f3
SHA51235bcea918e440611f8c1232bd6532f6a954e3146ebc38148dd671ea2d9a748eb67c36d010c30ce867212abf15b1a001372b820170000ca80850417cc1bfb6e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d2b6547f56206542ac0853f17c90ca2
SHA1e1f8f603d3d811b7933d4f0cb265b92e8cd98f6f
SHA25604f36cdd83cccddfd24a58c92dcd3db02e2e1614b2e8ec5e3bcf42c86bb280ac
SHA51215fd261c1be5b493bd90beb4f9994a06c9f98006b2554fa7a0b9af480df59a8a06df737ef6882f97c0426308f08a13d60d001015eeb76be9b1c198b45073a541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c106ae8cacd2839a0660f0bff9f2def1
SHA1e92c7a8672134dc6fed7d364fbdbd64161001f3a
SHA256a282625509daf90b6349f39c9bc49ca404fde8a0a360e3c9465b32626a9181e0
SHA5125728342a722af4cca30bff309c7c6010d20838a80e4816a0cf588b6909ff3869a77a42c20d30efcc4ef75d6c30ad16bf8566bdf0053173f8db38916a8c3e2424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5688640402cfc07cf86e5fec197d829ce
SHA1969b2a0640516f34991978088dafaaf572996110
SHA256fb450e45ad1ba81d84be9b9d613e7e072455536cbb8f766802878dc34853e611
SHA512171237abbda6bf134e88b73544b8c0000abc796fa19e8a8e627b536a8aa68e8f4562bffd28ad7b53240b13c48490bc3fab40f63c816a1b02de1a385907740bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e94592c6952ed3920701203e0292df8
SHA1ed4bebb6cb6fecc0ff07f54201d6ae3d71fcad9c
SHA25668463c8732c91d4744d4631f90e35890bcbbfb74a4f51f640ec78b55cf1a3d88
SHA51279b56b3a8818ca63d11f06a1b2661a18fa70f11162b426bf61c04fc435f4b922f0e625a4e57388e759fab307f696eb81acb669eb48a2a48d5c2c998a96d97e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7e45298acbfee88818f043bb0dd2875
SHA11e0d6e49bdec07b090ef931842e48671286dced5
SHA256967cb5e2e3af1968c59486b6e30441c6ca7637020056c78e6ef8ea916cfc4eeb
SHA51291103620b9016bd9e587e61ae2665a3482af8f10c62b2fe03d1be89e54623955fc65d4cc8525a32748f9f077dda2155811a30c4c2a03c99e241887e62e094890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db964a6dc11888417d3239a4475876f3
SHA17021a57e4706485c11ccd2b5d738220c6965694b
SHA2560960e425d60ff9e325f643013106f089ef2f068c639181280419b9851960b31d
SHA512d29a277c5d2670f5ffb00a55af5e4595ca82afc0d85b2c6c076b37ae1d4355c6a397715117812540aee695d21df3404aeed6164efcb0c435f103533ec94b91af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5550e6810d04041febf072cc22f33f78c
SHA1148f542dd890bcec9d309c89ab4c9a5d749a37fb
SHA25636c4539fe57dc5cc0cc164e9900ba04c0e889f975c70155c78b56a3028329b8a
SHA512c4f5a40555e609e86be761a18d5dfdee73e7deb866f397efee7c4d0cee4d2afb01a4a39515000b7adbbdbd69fbfe9c8cf086af36f50ea7ef38dba06d6a85629e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b12da16d53815222b3cf3b1ef0bca93
SHA113e07bfaf7f52007fdb3ad7f7d1ab7d6e92411e4
SHA25659231195475f018965d497560397f45407e66d06b0d0bb9be4811b02b11404d5
SHA512383bb5cbec8ed0d9bdc6a06b731661d0449db124ab2d9e678175bbcce53f6961a4c1ac16195d93278a1080fde463f77343800d3c73946d7eedc3e9e9650e20a9
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9B3AC9B1-AA79-11EE-BF28-E6629DF8543F}.dat
Filesize4KB
MD5985b1eb17097bad62ad607cd241deaea
SHA11b7a4e57283a6f1ea0d4573fcf3267be024bb192
SHA256da90e5aebc7dec4e7343cdfec4fbd557c7ce51cea2c753676e114b3a66c05b4b
SHA512e61ee409c21554dad86387d7cb7f20738997bc805c9ea6be3df19a3a8e6adf80085f34083929298aba3d975d9d5dad940fc27643d85a3280ca015ccfcaefdb2f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9B3AC9B1-AA79-11EE-BF28-E6629DF8543F}.dat
Filesize5KB
MD56fa8ade8836e451d94aa401c12994e14
SHA17e1641af5e1087fe3d7747889c2ce44ee153936a
SHA256198a52e85cf108ff48cc47181f183783626b9df2db34a9060a63d3a7a9ecb42e
SHA512f336c06fad5bd7c8ece970ee2672f44214d57354bcf471a12da47aa54f85aafbdff1b1cd38022ea46b8e494fbb78d2a494c2d216022300bbbc0cb73754588abd
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9B3D2B11-AA79-11EE-BF28-E6629DF8543F}.dat
Filesize5KB
MD5e743903631d70948d1865991d3e14cec
SHA181db89cb3cda516e6da197a5a74970737086af5d
SHA256e7248536eea34d11263bae4ef4551341b7570a2de478dc4f418f8a10cf8cbaf5
SHA512369a55d61e2b50714d85a4c2c02a76f9dfd9b5589ee0a0eac003e98ecf7df15f0d6ce65db914569333ccbf8df5eb287cf37e297276202108e232d58bba357eab
-
Filesize
22KB
MD59c4695721e47add985d56e2fa510f42c
SHA17ed6dbb18cea447bf18050f9db55e8dd86435297
SHA256d72b0fff33f73cd8ec9ec04dcb76868fe12eb3778d69c55668f6b5c766aea0c2
SHA512e41e415815eb7c58d60eb94865ea202337ed6d04ca4032f0b5bd220f8443c1a3e6298054f0ecd055efc95239ced5cd86955be0391549416687fe702c077d01f6
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
787B
MD5b3f64ef34df4e66d7555ca857f86ca82
SHA1243ea301795726eb1940757b0a948ef417b0c01c
SHA2562c5861dd96d30519a5b3bb22b1ac2b4d7ffaae196de1b47501b86a7c17a8977c
SHA5125fe666498ee7e1385e5d3a65ab9840790359972e8bd0515a25e6d8f194ef8cc550e1e0e02eeeec1b83188cae7f628247fd21fd99e233a17dc2c18399a124cce2
-
Filesize
2.2MB
MD53aafcf440595335f63375e5052f471f7
SHA19f60ca175911c9f70819fcb64beec3017a3481fe
SHA256b04e27be57cb863ce202391622e6a3b259877553fd368247080240055a354898
SHA51226b113413db71c87a3f74c3ab809b5f88882d36f3e52c93b7f39729fc3cab9691c3cac7c21afa28760e260cc1e5de578779c9816791c8cdb37e3658dcbeee564
-
Filesize
3.7MB
MD5ff048e5a44b2f15dd33112b961bfa279
SHA1f292473b556b12bbe2ae6af5f7c2924739eec813
SHA2564a0322ed9dabf720fd6d9ba8e5fbd4f0b4f57ff5f8b7f2349722441b16bf9544
SHA5120d5a34715fd34a2cbbb12b2996566f8f2cc63167b2e08056dd40098a079539581e8c5f93ed1f128bb3ccc7a65c9d311f55a113d72bd37b174c77227b2e96e0bf
-
Filesize
63B
MD5955aef532ed405fa55f6d4977347f11f
SHA1b997f0ba06605bd8c28e1cae5e34b624778b2f3f
SHA2565e70fef5ad98792c3992c607e680a9a9bfdffacb5ba17f32b521cc79fb8fab40
SHA5120251137e0e975d875a589c74a182e064896a1c8557c226e403915c1baf199647240f5b275dd7c6592d478352184a20bc8377564873714b7da6fd639e3c9a4fd2
-
Filesize
94B
MD5d5fc3a9ec15a6302543438928c29e284
SHA1fd4199e543f683a8830a88f8ac0d0f001952b506
SHA256b2160315eb2f3bcb2e7601e0ce7fbb4ed72094b891d3db3b5119b07eeccc568d
SHA5124d0378480f1e7d5bee5cf8f8cd3495745c05408785ab687b92be739cd64c077f0e3ee26d6d96e27eb6e2c3dec5f39a2766c45854dc2d6a5b6defc672aeafa0f9
-
Filesize
98B
MD58663de6fce9208b795dc913d1a6a3f5b
SHA1882193f208cf012eaf22eeaa4fef3b67e7c67c15
SHA2562909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61
SHA5129381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688
-
Filesize
6KB
MD532ae1470ebbd3e7317d9a2ebfe0789f6
SHA107fcc35d51a5cd8dc2b14168c1873d4ffbfdd191
SHA2562b0d32a92614c7ec75e542f652d9fee5fff9479d252adc4b40bd9b8d6f8dbb58
SHA5122a8509115fc089a945d2e0aac6430dc3a3814bf1a30859df0dae3878f516c9a4b1de67af44436098743233384c90145dce3157ca901a2651916638b623393d03
-
Filesize
524B
MD562a2126d86b4aa489e696d593a3579d7
SHA11925bad55c4ab7d6b7e7f3118f31c2ebac9ded5a
SHA256d62cef36cbd98e7a37d716ffda5ca0da77144625a5c43b1322e980020884fbf5
SHA512a53e4e8b74dae3e6ab367cba50ed4cac925727a40c8962277ecea5604d9ae76cd1e42c78c04235bd80e82755de3f374f89c6885eec60620881c246379ff067f6
-
Filesize
425B
MD5da68bc3b7c3525670a04366bc55629f5
SHA115fda47ecfead7db8f7aee6ca7570138ba7f1b71
SHA25673f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5
SHA5126fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0
-
Filesize
73KB
MD5aaf271b20ac6f0d61c351abeeefce1d5
SHA128a2cc8daecdd8711e5dd3702fc0f3ec50824855
SHA2565913517a100af30018fd246d992d28f59f0b3635c9b84ce6e80e68f2b5cc8297
SHA51289383365809fb659cf9932f81adecb7e0bd5a775513b5de903e895156d748fe861c84c9d4e99be9a56a0f58830ef5ed42d4a89e69c756bad37f92b4510763dec
-
Filesize
2.9MB
MD58e8c558b3b96147e8ca442eaaa057a65
SHA15ceb3982ac3be0658301e975a22ec6baee6cc5a8
SHA25646b8a8224b7cd4e00d8ee90e8cfeaa8d069a4b06b2da0a434ebc22bf16086d23
SHA5126182e6aca8704c4b4ef45eb61677dc76ab31e3a52742f232b7f7cb666f01eb48df11b875ae670b67a66749a6fcedf4d7f315f727699afcc632c194015961106e