Analysis
-
max time kernel
58s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20231222-en
General
-
Target
sample.html
-
Size
45KB
-
MD5
9592146a8c930c56adc011f65c1b546a
-
SHA1
3a2f81c776a588d70dffb2b173c7199a77a17b1b
-
SHA256
a3da0ea84a9eb15e0accf16f0abfede1f937a602af3badb6184839ebc26149a7
-
SHA512
3967e24a480b632c1f92ef7fcbf0cd8e43d01c05d373a9d5fb4379c7a186413913e840f62bff36eb4b6fe9728d81437bd803b7875f61fe30d38865bd4317595c
-
SSDEEP
768:qCsf8CdvAjCsEMQyAAgJtA2VpMM4h9AibbUebnQUfSQJfvIqAmGt/MDbaw/oxzRv:qCQsguZei/tpIbmKMbo1RVMG7
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\NDF\{3154D2DE-7DB8-4E9E-AF01-D6641BB88682}-temp-01082024-1456.etl svchost.exe File opened for modification C:\Windows\system32\NDF\{3154D2DE-7DB8-4E9E-AF01-D6641BB88682}-temp-01082024-1456.etl svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1432 ipconfig.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\UpgradeTime = 0d1285d26635da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTLogoPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F053D7F5-AE35-11EE-AA35-E2FF52840C3F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003c221304981e5f4bbaa9a99b1399bd8a00000000020000000000106600000001000020000000b8b65ff16e99df17e4b370c6f266862c4a100b5300b79b2c2ecc41fb62f102ea000000000e8000000002000020000000451d8103e2dc3f5f948dddbf96940c1ecb0c493d81354d0af2b555c51849aa6920000000f1144b8949202c4f18d9fe5f7fe14590b62c2bc82ca77d129f4191e1323a7bce40000000da7257cda99224eac5d66c6b04695d8330a1481efde86ccb6a4ca29194de622d54d622b3ddcbaf9194e8e87c5fcf9c6b0b91c7999a643803d6009e36d23167fc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003c221304981e5f4bbaa9a99b1399bd8a00000000020000000000106600000001000020000000b324ef208104160c1ebd6792a58deb123f7b24e42e21a6da774720aa15b29a0e000000000e800000000200002000000040fc5cc063bf3142539c948c83c2d23423eed6b1573e07f4ff331cd7374c9b0120000000c9aac373ecaa7ce6a3e1e27b76be3a7f9b7246f9210cb16e011a1c6973afef0440000000d6bd49cf1f13f56cd26689f185705d2e5185ced9d83bdcc5b067f2998726182fd8e8bb5edbd96bd18a8561b5cd4d768e2ce67f422bbed37b1304c7e8d5cbcd2d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307eafc84242da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\AskUser = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURL = "http://www.bing.com/favicon.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003c221304981e5f4bbaa9a99b1399bd8a000000000200000000001066000000010000200000003d54cc1171b8e5433dd6da3c115edead9e767468793197b83a5f909df47e0c55000000000e80000000020000200000009900846315f34f4912cfb101bf199b07d74f088df25169daa77f6822ce8b3d782000000052e040e40b83cc08957869a55e5dea4ed5c2c400f1730a64ca12eb3196ffe8834000000059c5578b852fe11997388612c09dbd9ea4758e40ed05427ef0b23783d8d635abd18b7219f270868da3094591773e11eadb61bbf77f7603462ff1d8d5b17538f9 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTSR" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3300027174" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10aad0cd4242da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\User Preferences iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3300027174" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3308934084" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31081026" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31081026" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31081026" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURLFallback = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{0633EE93-D776-472f-A0FF-E1416B8B2E3A}" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTTopResultURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTTR" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\User Preferences\3DB9590C4C4C26C4CCBDD94ECAD790359708C3267B = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURLFallback = "http://www.bing.com/favicon.ico" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTLogoURL = "http://go.microsoft.com/fwlink/?LinkID=403856&language={language}&scale={scalelevel}&contrast={contrast}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\Version = "5" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTSuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&market={language}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IENTSS" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IESR02" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\User Preferences\2BB20B33B4171CDAAB6469225AE6A582ED33D7B488 = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003c221304981e5f4bbaa9a99b1399bd8a000000000200000000001066000000010000200000003bbebb247ed8f8df81e13378999becab23589a16442aff85f9ea6f9f38d32f46000000000e800000000200002000000019e891cf17b4abc78532c9f2771bff31f4e1304d3a3c9cd95c2cb96716000f96100000002630864e7ae186251b00b773a03704aa40000000b44db34fb8f22ae53975f6a7eb49cb80f0b4c285e0d7396443ec264966cb2964a831c68ce4c288ad1af939098d7e603054e4a751f3e9f39663fd2aa202359d52 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4052a8c84242da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 848 sdiagnhost.exe 848 sdiagnhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 848 sdiagnhost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3320 iexplore.exe 5068 msdt.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3320 iexplore.exe 3320 iexplore.exe 5112 IEXPLORE.EXE 5112 IEXPLORE.EXE 5112 IEXPLORE.EXE 5112 IEXPLORE.EXE 5112 IEXPLORE.EXE 5112 IEXPLORE.EXE 5112 IEXPLORE.EXE 5112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3320 wrote to memory of 5112 3320 iexplore.exe 89 PID 3320 wrote to memory of 5112 3320 iexplore.exe 89 PID 3320 wrote to memory of 5112 3320 iexplore.exe 89 PID 5112 wrote to memory of 5068 5112 IEXPLORE.EXE 102 PID 5112 wrote to memory of 5068 5112 IEXPLORE.EXE 102 PID 5112 wrote to memory of 5068 5112 IEXPLORE.EXE 102 PID 848 wrote to memory of 1044 848 sdiagnhost.exe 105 PID 848 wrote to memory of 1044 848 sdiagnhost.exe 105 PID 848 wrote to memory of 1044 848 sdiagnhost.exe 105 PID 848 wrote to memory of 1804 848 sdiagnhost.exe 110 PID 848 wrote to memory of 1804 848 sdiagnhost.exe 110 PID 848 wrote to memory of 1804 848 sdiagnhost.exe 110 PID 848 wrote to memory of 1432 848 sdiagnhost.exe 115 PID 848 wrote to memory of 1432 848 sdiagnhost.exe 115 PID 848 wrote to memory of 1432 848 sdiagnhost.exe 115 PID 848 wrote to memory of 4208 848 sdiagnhost.exe 113 PID 848 wrote to memory of 4208 848 sdiagnhost.exe 113 PID 848 wrote to memory of 4208 848 sdiagnhost.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3320 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\msdt.exe-modal "786498" -skip TRUE -path "C:\Windows\diagnostics\system\networking" -af "C:\Users\Admin\AppData\Local\Temp\NDFF7DD.tmp" -ep "NetworkDiagnosticsWeb"3⤵
- Suspicious use of FindShellTrayWindow
PID:5068
-
-
-
C:\Windows\SysWOW64\sdiagnhost.exeC:\Windows\SysWOW64\sdiagnhost.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter2⤵PID:1044
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter2⤵PID:1804
-
-
C:\Windows\SysWOW64\ROUTE.EXE"C:\Windows\system32\ROUTE.EXE" print2⤵PID:4208
-
-
C:\Windows\SysWOW64\makecab.exe"C:\Windows\system32\makecab.exe" /f NetworkConfiguration.ddf2⤵PID:3692
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /all2⤵
- Gathers network information
PID:1432
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNoNetwork -p -s DPS1⤵
- Checks processor information in registry
PID:1556
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost1⤵PID:4152
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s WdiServiceHost1⤵
- Drops file in System32 directory
PID:4556 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\winethc.dll",ForceProxyDetectionOnNextRun2⤵PID:3704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\460911090\2024010814.000\NetworkDiagnostics.debugreport.xml
Filesize209KB
MD5c77173c63cc125f7f542bcba9c12a263
SHA16827691bcf73191a741099159be2de306909537d
SHA256206458fa479259e0ced8363b2a549437b767defa2e56a54224406213ef4a2a58
SHA51280bf020e08acdee8de6812932f3e902351d0c0e3441648482fdb2fedfdae3f556644ce7130c3c5dd372b37fcd98a0dce3025951f8debddad3ec704ebc706ac7e
-
Filesize
37KB
MD52be61998b95c57554ac4e3157af2dfd4
SHA12b5c9777d7174c34f986ffbe54d5c68339c3ac0e
SHA256fdfd86585d33a0397dcb62a14cef33afb22b6805f3cdcda612ba4fd7dfe12007
SHA512b7098b8ff43fe8f8ef2829b2a1b5050d73e3d24b03471fc571e3047088b40a4ea0f29cae2ab48d6fcda1989894caf397366bc46c3536d155ee072539387624f4
-
Filesize
47KB
MD5310e1da2344ba6ca96666fb639840ea9
SHA1e8694edf9ee68782aa1de05470b884cc1a0e1ded
SHA25667401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c
SHA51262ab361ffea1f0b6ff1cc76c74b8e20c2499d72f3eb0c010d47dba7e6d723f9948dba3397ea26241a1a995cffce2a68cd0aaa1bb8d917dd8f4c8f3729fa6d244
-
Filesize
15KB
MD56e46ed5d23144138e7160bd4022e5d90
SHA1a00fca2be2e168a1866c6f0999906aa097e852cf
SHA25611c29b04d648e154f652b00b5873272f6c25614bea428542f115eae3bf6a387c
SHA5123a839e2e7c891bcc080f508dc57794ba9819f7ee331f8d7931a2b6ddb4e8d59e8c769a38dfe97e9fa226310d8cdf02c52a4c08a514b2231936dc72c2c55cf22a
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
3KB
MD5152baf1b6df3ec6b64446e53be751028
SHA12d28a7592da1da19632799f5f16baed9ff22a098
SHA2563a610578f583beb0607b598e8be6280469d34d2ae3a4acc25762a36dc3bed730
SHA512a743875d61823703c9eb24ac4440e5a7e4146d5ce09e679eacbe55100ff2027194fdff588acbf71919f4fa9da557b0a21693f3586e83468e4c4e77d5ac23a3b4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5b314fc6410233434005f5d81ea96bf97
SHA141222f24896af9ecb42d5a8578c8a748ab65ce9c
SHA2564dc74ef85f707d82df6f986f15f6fe01f24d3a5d6fe8db88dc085b0b647f5e1e
SHA512664e4f0e696259e3d7f2dcb91d2fd61205fc55be7acdac2586ad7ed98a6463694f702333f678aca0f90487e6fad5ecbc47ee5a46eb853c66acfa8cd27624ffd9
-
Filesize
231B
MD500848049d4218c485d9e9d7a54aa3b5f
SHA1d1d5f388221417985c365e8acaec127b971c40d0
SHA256ffeafbb8e7163fd7ec9abc029076796c73cd7b4eddaeeda9ba394c547419769e
SHA5123a4874a5289682e2b32108740feea586cb9ccdad9ca08bf30f67c9742370c081ad943ea714f08dbf722f9f98f3b0bb307619a8ba47f96b24301c68b0fd1086d9
-
Filesize
2KB
MD5840e3dd0e05cc190a726cadb82bdb82c
SHA1e2ae8ad03c8ce238b55ad4245bd3813c25840e4b
SHA256d823d6e163ff1735bfc0fee6eb6f980a28e434466345c5e421d276e2ca5adf4d
SHA512250766853d11099bf16bca0b349d8d976b6f835b9dfda8db40da6aecb92704f8babeb190a31011396989b36c30bcf8c083af7f7592521b6bb8cf30968669a178
-
Filesize
4KB
MD5c5a8c938f0c2863e1f0f8b44a7e1797f
SHA14c741d5bdf4634f3912c52dab37f2add67bd3e29
SHA25659671447e4ddb790f0442011c43c61a4cd0fe5aa2f3e298bf7b612ea99f5584e
SHA512969f41bc1bfde8d458c07b3d15decae52190d2e3b8e682c9ddc5145ae250c460d122c650ecc26b23e3745530b2a6b10d29f2e2e73b6895c189cd023aae566651
-
Filesize
978B
MD5043f011154ec41f4f2ba32121378b8fa
SHA16760db006daf26203bef1c52eca5bf288d04d2bf
SHA2564bbbeb6125214c034d710f94a22bceda0b23586669f3cd0b854f39a92c05e566
SHA512c70e56f74e6bd4c7a4253712e97ee7a439d5785dab7ca16522761835b0646fe8152065f3a55c180a9b17643323950e582b6bc6b3358ea392bab8e585281bcfb1
-
Filesize
283B
MD5c1ccabc9226bfb6a41f8b5d658872fa3
SHA1560eed367f662fbd25d75fb737067a3cf5222bcc
SHA256f936ebb9deeab8b23c8844a57bced581732902d95d684e9eb4404b6fc1f10470
SHA512d1ff8c4258204efccf33775afc6a5cd3a8d2a060be4a91be7c8c875becea09464e7095d14d6bb728a479047e2cbae85ac0496fe518efd2217ba1c40990deb597
-
Filesize
25KB
MD5d0cfc204ca3968b891f7ce0dccfb2eda
SHA156dad1716554d8dc573d0ea391f808e7857b2206
SHA256e3940266b4368c04333db89804246cb89bf2073626f22b8de72bea27c522282a
SHA5124d2225b599ad8af8ba8516f12cfddca5ec0ce69c5c80b133a6a323e9aaf5e0312efbcfa54d2e4462a5095f9a7c42b9d5b39f3204e0be72c3b1992cf33b22087c
-
Filesize
10KB
MD59b222d8ec4b20860f10ebf303035b984
SHA1b30eea35c2516afcab2c49ef6531af94efaf7e1a
SHA256a32e13da40ac4b9e1dac7dd28bc1d25e2f2136b61ff93be943018b20796f15bc
SHA5128331337ccb6e3137b01aeec03e6921fd3b9e56c44fa1b17545ae5c7bfcdd39fcd8a90192884b3a82f56659009e24b63ce7f500e8766fd01e8d4e60a52de0fe67
-
Filesize
567B
MD5a660422059d953c6d681b53a6977100e
SHA10c95dd05514d062354c0eecc9ae8d437123305bb
SHA256d19677234127c38a52aec23686775a8eb3f4e3a406f4a11804d97602d6c31813
SHA51226f8cf9ac95ff649ecc2ed349bc6c7c3a04b188594d5c3289af8f2768ab59672bc95ffefcc83ed3ffa44edd0afeb16a4c2490e633a89fce7965843674d94b523
-
Filesize
53KB
MD5c912faa190464ce7dec867464c35a8dc
SHA1d1c6482dad37720db6bdc594c4757914d1b1dd70
SHA2563891846307aa9e83bca66b13198455af72af45bf721a2fbd41840d47e2a91201
SHA5125c34352d36459fd8fcda5b459a2e48601a033af31d802a90ed82c443a5a346b9480880d30c64db7ad0e4a8c35b98c98f69eceedad72f2a70d9c6cca74dce826a
-
Filesize
2KB
MD50c75ae5e75c3e181d13768909c8240ba
SHA1288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA5128fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b
-
Filesize
5KB
MD5380768979618b7097b0476179ec494ed
SHA1af2a03a17c546e4eeb896b230e4f2a52720545ab
SHA2560637af30fc3b3544b1f516f6196a8f821ffbfa5d36d65a8798aeeadbf2e8a7c2
SHA512b9ef59e9bfdbd49052a4e754ead8cd54b77e79cc428e7aee2b80055ff5f0b038584af519bd2d66258cf3c01f8cc71384f6959ee32111eac4399c47e1c2352302
-
Filesize
478KB
MD5580dc3658fa3fe42c41c99c52a9ce6b0
SHA13c4be12c6e3679a6c2267f88363bbd0e6e00cac5
SHA2565b7aa413e4a64679c550c77e6599a1c940ee947cbdf77d310e142a07a237aad2
SHA51268c52cd7b762b8f5d2f546092ed9c4316924fa04bd3ab748ab99541a8b4e7d9aec70acf5c9594d1457ad3a2f207d0c189ec58421d4352ddbc7eae453324d13f2
-
Filesize
17KB
MD544c4385447d4fa46b407fc47c8a467d0
SHA141e4e0e83b74943f5c41648f263b832419c05256
SHA2568be175e8fbdae0dade54830fece6c6980d1345dbeb4a06c07f7efdb1152743f4
SHA512191cd534e85323a4cd9649a1fc372312ed4a600f6252dffc4435793650f9dd40d0c0e615ba5eb9aa437a58af334146aac7c0ba08e0a1bf24ec4837a40f966005
-
C:\Windows\Temp\SDIAG_ca49efc0-48f9-47bf-a313-e18947668a86\result\3154D2DE-7DB8-4E9E-AF01-D6641BB88682.Diagnose.Admin.0.etl
Filesize92KB
MD5ba3a5b876bb14a91e40945c257981508
SHA173fabdf8650d48267df36c7490ab9c7327f11167
SHA25605dd6a066e761ffe57cffcc2d4d54a2d29d634e603b142c5ed9d6d391605e424
SHA512a23dfb897f981fa660507b02b4692ba35b174c4f7ff3d8e1e5d5965cdccbe48a25dc099c4c86028569c32d1dfe4487a802904849613f188e5f9b5f9760e4bf60