Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe
Resource
win10v2004-20240226-en
General
-
Target
30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe
-
Size
421KB
-
MD5
c7a72087a3c79b49f8a976e9aa044cdf
-
SHA1
c5ccc17fb40b77dbb32febabd7cb23504d0eb79a
-
SHA256
30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589
-
SHA512
1601c7c7eb58701c202edaff830ee7aa280a167c99ebc693fbdde2692917cbe81426615f77feb48ecf1ca450df6f512167c2c5abad43f01d4a225283f3d439fb
-
SSDEEP
6144:WZT3H5umWrA7oSLvd5Gr83KS1PCG0LlZYO/G/lxRVQinwdYrjzUderlmsOVKkaq5:Wh3ZukLF5fRYZmLd7FDIsOPczRfv3+7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation acrotray.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation acrotray .exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe -
Executes dropped EXE 4 IoCs
pid Process 2980 acrotray.exe 3768 acrotray.exe 4924 acrotray .exe 4540 acrotray .exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "C:\\Program Files (x86)\\Adobe\\acrotray.exe" 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created \??\c:\program files (x86)\microsoft\edge\application\msedge.exe 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe File created C:\Program Files (x86)\Adobe\acrotray .exe 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe File created C:\Program Files (x86)\Adobe\acrotray.exe 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{6F086890-E2FC-11EE-B9F7-DA3E94F6CD86} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e15d6e14f38454ea63b5f1bfd95170200000000020000000000106600000001000020000000b0c63db2ea6e65de081eb4e22fc716abee6de1c59b7094f5217b06688894b9b8000000000e80000000020000200000008ed03f68bfebbc93b9e1f6c6b65d129c015895f12b732ee10d067ff6c7bbf70720000000350c696e2a9025b325535ed754fb9c5caaf77407fbd643cf3cec861cfcdedbef40000000ba411ec151ee5aa1b1f3a033e75a206ddad1553d975ecb53dc838031db1d1b91f84e84c3efd355e07068b9d63e2b4fc1b516ceffcb2419e862c86984eeea1e8a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31094537" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c044935b0977da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417293415" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31094537" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e15d6e14f38454ea63b5f1bfd951702000000000200000000001066000000010000200000006365eb41497a058cc05956b04acafd30fddb949b5cf294b99327c2e4cf54a483000000000e8000000002000020000000670a111e5bf8b770f26ac7edcdd291f705d13ef294c775ad7759b5d81ce65c5620000000eee66e1147732775e18a027634db5d92cf381e7c5375b0f056d212204e7442e04000000054871a509ad382ee4e91afad279ef1ada5a5df63ff28e978880b36692b9a8dc94463b26dee791a00b4b144bae4653d8a0c3074d38e5f34adfcedfadd7709a7dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1145603281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31094537" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1192322758" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03542530977da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1145603281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 3972 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3972 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3972 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3972 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3972 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3972 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 2980 acrotray.exe 2980 acrotray.exe 2980 acrotray.exe 2980 acrotray.exe 2980 acrotray.exe 2980 acrotray.exe 3768 acrotray.exe 3768 acrotray.exe 3768 acrotray.exe 3768 acrotray.exe 4924 acrotray .exe 4924 acrotray .exe 4924 acrotray .exe 4924 acrotray .exe 4924 acrotray .exe 4924 acrotray .exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 4540 acrotray .exe 4540 acrotray .exe 4540 acrotray .exe 4540 acrotray .exe 3768 acrotray.exe 3768 acrotray.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 4540 acrotray .exe 4540 acrotray .exe 3768 acrotray.exe 3768 acrotray.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 4540 acrotray .exe 4540 acrotray .exe 3768 acrotray.exe 3768 acrotray.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 4540 acrotray .exe 4540 acrotray .exe 3768 acrotray.exe 3768 acrotray.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 4540 acrotray .exe 4540 acrotray .exe 3768 acrotray.exe 3768 acrotray.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 4540 acrotray .exe 4540 acrotray .exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3972 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe Token: SeDebugPrivilege 3844 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe Token: SeDebugPrivilege 2980 acrotray.exe Token: SeDebugPrivilege 3768 acrotray.exe Token: SeDebugPrivilege 4924 acrotray .exe Token: SeDebugPrivilege 4540 acrotray .exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4864 iexplore.exe 4864 iexplore.exe 4864 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4864 iexplore.exe 4864 iexplore.exe 4060 IEXPLORE.EXE 4060 IEXPLORE.EXE 4864 iexplore.exe 4864 iexplore.exe 3876 IEXPLORE.EXE 3876 IEXPLORE.EXE 4864 iexplore.exe 4864 iexplore.exe 3808 IEXPLORE.EXE 3808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3972 wrote to memory of 3844 3972 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 100 PID 3972 wrote to memory of 3844 3972 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 100 PID 3972 wrote to memory of 3844 3972 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 100 PID 3972 wrote to memory of 2980 3972 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 108 PID 3972 wrote to memory of 2980 3972 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 108 PID 3972 wrote to memory of 2980 3972 30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe 108 PID 2980 wrote to memory of 3768 2980 acrotray.exe 109 PID 2980 wrote to memory of 3768 2980 acrotray.exe 109 PID 2980 wrote to memory of 3768 2980 acrotray.exe 109 PID 2980 wrote to memory of 4924 2980 acrotray.exe 110 PID 2980 wrote to memory of 4924 2980 acrotray.exe 110 PID 2980 wrote to memory of 4924 2980 acrotray.exe 110 PID 4924 wrote to memory of 4540 4924 acrotray .exe 111 PID 4924 wrote to memory of 4540 4924 acrotray .exe 111 PID 4924 wrote to memory of 4540 4924 acrotray .exe 111 PID 4864 wrote to memory of 4060 4864 iexplore.exe 115 PID 4864 wrote to memory of 4060 4864 iexplore.exe 115 PID 4864 wrote to memory of 4060 4864 iexplore.exe 115 PID 4864 wrote to memory of 3876 4864 iexplore.exe 117 PID 4864 wrote to memory of 3876 4864 iexplore.exe 117 PID 4864 wrote to memory of 3876 4864 iexplore.exe 117 PID 4864 wrote to memory of 3808 4864 iexplore.exe 118 PID 4864 wrote to memory of 3808 4864 iexplore.exe 118 PID 4864 wrote to memory of 3808 4864 iexplore.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe"C:\Users\Admin\AppData\Local\Temp\30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe"C:\Users\Admin\AppData\Local\Temp\30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe" C:\Users\Admin\AppData\Local\Temp\30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
C:\Program Files (x86)\Adobe\acrotray.exe"C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Adobe\acrotray.exe"C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
C:\Program Files (x86)\Adobe\acrotray .exe"C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Adobe\acrotray .exe"C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\30e777e73b1db299d0b5bf492a65ff0cb1a749ee6d636e58843e4b8b3ab2a589.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:4400
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4592
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4864 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4060
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4864 CREDAT:82950 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3876
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4864 CREDAT:82958 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD58009f95831b51ace0ff865b0d3a141de
SHA10a6e54e1404ad2afe1f16b9adee89ba9ad035b64
SHA256836c61d0d717e8cdc94f5a0e1f22847a78b77c6968083528f48c00f7e1ad6897
SHA512eea552c910a75e6cd2eba8aee559b66fde9a1eaf6b4b7a72c8d99592a18d3af757e8e0cf038bf0e57dd66a66d7f1d1a591ac02e879c0b4ffd56bbec1c66539d0
-
Filesize
179KB
MD5c445ee1fcc373bbcf4ea9f2c06b388fe
SHA15bb445c0cf3de93f21d95852e4b55b2cef3b21f5
SHA256197f17a7e8e5f2a6f99394ecd7eb199a33cc0bc0bc3d87e98c11380b3fbc9a1f
SHA512944c859922f7991f2eea3d79b59074c22cb9e1042f742d24fb8097275b0b7fd549487be8e557007f785eefbf0e9fc5462b2b6b31193eba9a2c9a3eac390efaf6
-
Filesize
455KB
MD5a2abc833e64e21a76e08ca2b16b7c388
SHA12d50d84c502d9dbf35e1c19a8e4c39b47c48bff3
SHA256e943059aaaec67bfe9fc6588706df0ed098f873b1c23ccf469985d5efbd01516
SHA512c6a6f458af10019ab7524252d03e318476625ef3633acc9aeffa52b0938c7d56d74725aeee10711e80facfe218afcc0e099516d59bd3f7f053bdd2ea3c1c33aa
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
32KB
MD5481b762cb35e9b51e29d4c3fd951d90a
SHA124d87cbe34c340b2963499748cee47cd0bea00af
SHA256dca4905f387f0954bb5e1bc86181072e58c18bbc04593e19284253e7f85bac0d
SHA51225f4802ef9f14278641da53616828048901e488ae533617b9b4c24f7feebd7043d96ac5836ce57c7efc25f869baabaa4e4ecba95ebd2c16207b49b529e48430c