Analysis
-
max time kernel
160s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
662b91219650d6fdf0712e069b9e0ec9.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
662b91219650d6fdf0712e069b9e0ec9.exe
Resource
win10v2004-20240226-en
General
-
Target
662b91219650d6fdf0712e069b9e0ec9.exe
-
Size
609KB
-
MD5
662b91219650d6fdf0712e069b9e0ec9
-
SHA1
8560009b4ec75fe0aed773f8a089c6e5776fbfa5
-
SHA256
66d25e8e3c51b0b82a9839f83493108904c4ecbc40f0c42e98170c3f593f7bc6
-
SHA512
37567835a1007cb8f5eca2e8792940add3ba92a9b6e9f5ca512f8631f62752da18d399ed1e90aabbd58730bf5a7cb28dd118cef633dcc4dcaffe5070af37c0b0
-
SSDEEP
12288:Wh3ZukLF5fRYZmLd7QrpMRU5tMOq7BZ22Xt9:WhMkxlRBdIpn5uB9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation 662b91219650d6fdf0712e069b9e0ec9.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation acrotray.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation acrotray .exe -
Executes dropped EXE 4 IoCs
pid Process 4768 acrotray.exe 1836 acrotray.exe 4940 acrotray .exe 2596 acrotray .exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "C:\\Program Files (x86)\\Adobe\\acrotray.exe" 662b91219650d6fdf0712e069b9e0ec9.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created \??\c:\program files (x86)\microsoft\edge\application\msedge.exe 662b91219650d6fdf0712e069b9e0ec9.exe File created C:\Program Files (x86)\Adobe\acrotray .exe 662b91219650d6fdf0712e069b9e0ec9.exe File created C:\Program Files (x86)\Adobe\acrotray.exe 662b91219650d6fdf0712e069b9e0ec9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2337078087" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b883981b30f3694996f9cdb73b998e5e00000000020000000000106600000001000020000000160f69e29565b88213cf44d4029f924dd362861f062834bb105e4f5c2f9b7572000000000e800000000200002000000068e9bafb54ebee5ea3b4e5c2dabb14d57cb72e200d412157ccdb98ea0e2b8fa320000000d5d89d55ad2257c402930b32517f196bc66026ced9cbc2ed7a637b99505939ec40000000ca55bab488dbb80563308acb501f2dac83495e4b73fd00f4f86d3fe97ddd0327d76539e02b369680ecd915a9abfb8f8d1ee550a38d28eb4ed8b968b4cb64ed1d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419456917" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BC1367C5-F6A9-11EE-9846-CE289885E65A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0ce0197b68ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04d2b9eb68ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2566295622" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31099574" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2337078087" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b883981b30f3694996f9cdb73b998e5e00000000020000000000106600000001000020000000ac1f9a9720a2003d4815dc3a33ee94fd016fbe936dc276d0ac12abbe0995002e000000000e8000000002000020000000ab7d8d28a15f9e332c2a9e52e5dd60f69179af78c267c509f7f9d62f284c029220000000ec5ab07ae5910ee9b4ea83cbb057747ca20939acedcc0a7ce082780732117e904000000080bac6210fc71cbb049ad94e966a04beac2e159a08a35faeaf361c4010f906973d9273197f0ff472e24380952fe7679ab2fc6a8325699beb04a1c47dec7f1ae0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d9a1acb68ada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31099574" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b883981b30f3694996f9cdb73b998e5e00000000020000000000106600000001000020000000d9bf0e0672985759b74a0a9a3daa4866b6bd8f6a47468b0d60044503e43c8bae000000000e80000000020000200000006ff31ec789cc0b4d6a7d5447e8dc5e6d79769c489be1f6bde08568cfc727680a20000000f2e8926a589e0b1a35234f9a3da60ab5d7f3efd73474dbc690c1eea7797b29bb4000000069280dc7ac653d627b553026913dad20c22b203e67395e8aa690214201846bd77a1a16f639d6572a32da0f61ebc41ff9f8b9fde6d74dcd883e2bee112df4edfb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b883981b30f3694996f9cdb73b998e5e00000000020000000000106600000001000020000000f4c85ad9e420c532bf372a5cdeb29df414a6adfdccd82d66931435322df232b0000000000e8000000002000020000000a449fe15a398eaba2e4ffc00ae572d5215c5416948fda7fbd03a318ed5bb1d5720000000a4aa86cc03a53b9520211a50292037f7952ce6edca960b7b80c9ade54b684df040000000a2119c7a85ca259d042751d701584ea1d5a4902061ee6151ed56d429c5a4f799c2da833142089733b7bbe3a36e6fe53263b1af6286850da9b60650ae79005869 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31099574" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ca7499b68ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1872 662b91219650d6fdf0712e069b9e0ec9.exe 1872 662b91219650d6fdf0712e069b9e0ec9.exe 1872 662b91219650d6fdf0712e069b9e0ec9.exe 1872 662b91219650d6fdf0712e069b9e0ec9.exe 1872 662b91219650d6fdf0712e069b9e0ec9.exe 1872 662b91219650d6fdf0712e069b9e0ec9.exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 4768 acrotray.exe 4768 acrotray.exe 4768 acrotray.exe 4768 acrotray.exe 4768 acrotray.exe 4768 acrotray.exe 4940 acrotray .exe 4940 acrotray .exe 4940 acrotray .exe 4940 acrotray .exe 1836 acrotray.exe 1836 acrotray.exe 1836 acrotray.exe 1836 acrotray.exe 4940 acrotray .exe 4940 acrotray .exe 2596 acrotray .exe 2596 acrotray .exe 2596 acrotray .exe 2596 acrotray .exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 1836 acrotray.exe 1836 acrotray.exe 2596 acrotray .exe 2596 acrotray .exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 1836 acrotray.exe 1836 acrotray.exe 2596 acrotray .exe 2596 acrotray .exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 1836 acrotray.exe 1836 acrotray.exe 2596 acrotray .exe 2596 acrotray .exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 1836 acrotray.exe 1836 acrotray.exe 2596 acrotray .exe 2596 acrotray .exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 1836 acrotray.exe 1836 acrotray.exe 2596 acrotray .exe 2596 acrotray .exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe 3408 662b91219650d6fdf0712e069b9e0ec9.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1872 662b91219650d6fdf0712e069b9e0ec9.exe Token: SeDebugPrivilege 3408 662b91219650d6fdf0712e069b9e0ec9.exe Token: SeDebugPrivilege 4768 acrotray.exe Token: SeDebugPrivilege 4940 acrotray .exe Token: SeDebugPrivilege 1836 acrotray.exe Token: SeDebugPrivilege 2596 acrotray .exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 688 iexplore.exe 688 iexplore.exe 688 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 688 iexplore.exe 688 iexplore.exe 4440 IEXPLORE.EXE 4440 IEXPLORE.EXE 688 iexplore.exe 688 iexplore.exe 4640 IEXPLORE.EXE 4640 IEXPLORE.EXE 688 iexplore.exe 688 iexplore.exe 540 IEXPLORE.EXE 540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1872 wrote to memory of 3408 1872 662b91219650d6fdf0712e069b9e0ec9.exe 94 PID 1872 wrote to memory of 3408 1872 662b91219650d6fdf0712e069b9e0ec9.exe 94 PID 1872 wrote to memory of 3408 1872 662b91219650d6fdf0712e069b9e0ec9.exe 94 PID 1872 wrote to memory of 4768 1872 662b91219650d6fdf0712e069b9e0ec9.exe 103 PID 1872 wrote to memory of 4768 1872 662b91219650d6fdf0712e069b9e0ec9.exe 103 PID 1872 wrote to memory of 4768 1872 662b91219650d6fdf0712e069b9e0ec9.exe 103 PID 4768 wrote to memory of 1836 4768 acrotray.exe 104 PID 4768 wrote to memory of 1836 4768 acrotray.exe 104 PID 4768 wrote to memory of 1836 4768 acrotray.exe 104 PID 4768 wrote to memory of 4940 4768 acrotray.exe 105 PID 4768 wrote to memory of 4940 4768 acrotray.exe 105 PID 4768 wrote to memory of 4940 4768 acrotray.exe 105 PID 4940 wrote to memory of 2596 4940 acrotray .exe 106 PID 4940 wrote to memory of 2596 4940 acrotray .exe 106 PID 4940 wrote to memory of 2596 4940 acrotray .exe 106 PID 688 wrote to memory of 4440 688 iexplore.exe 109 PID 688 wrote to memory of 4440 688 iexplore.exe 109 PID 688 wrote to memory of 4440 688 iexplore.exe 109 PID 688 wrote to memory of 4640 688 iexplore.exe 110 PID 688 wrote to memory of 4640 688 iexplore.exe 110 PID 688 wrote to memory of 4640 688 iexplore.exe 110 PID 688 wrote to memory of 540 688 iexplore.exe 111 PID 688 wrote to memory of 540 688 iexplore.exe 111 PID 688 wrote to memory of 540 688 iexplore.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\662b91219650d6fdf0712e069b9e0ec9.exe"C:\Users\Admin\AppData\Local\Temp\662b91219650d6fdf0712e069b9e0ec9.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\662b91219650d6fdf0712e069b9e0ec9.exe"C:\Users\Admin\AppData\Local\Temp\662b91219650d6fdf0712e069b9e0ec9.exe" C:\Users\Admin\AppData\Local\Temp\662b91219650d6fdf0712e069b9e0ec9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
C:\Program Files (x86)\Adobe\acrotray.exe"C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\662b91219650d6fdf0712e069b9e0ec9.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Program Files (x86)\Adobe\acrotray.exe"C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\662b91219650d6fdf0712e069b9e0ec9.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\Program Files (x86)\Adobe\acrotray .exe"C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\662b91219650d6fdf0712e069b9e0ec9.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files (x86)\Adobe\acrotray .exe"C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\662b91219650d6fdf0712e069b9e0ec9.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4460
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:688 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4440
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:688 CREDAT:17414 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4640
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:688 CREDAT:17422 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642KB
MD5ebe65590c56cd1bcdf50d4a1b26a9874
SHA1f3549759ad1910715e9d0eb2387c127fe89b784a
SHA256dd6415cdbb757c1d5ef7a69c6bb7d8e9344d721e4304b6270720348eec5d0912
SHA5121a24cac5f117847eba2f9f5aeb931dd488aaf9788b335d15718dc92376a5de9151b79dbfce06257f3b741855f7285a9e01e7c1c78b71b14ee73c271c30b39c45
-
Filesize
611KB
MD5b2bb7bc0f53874169a8168f7e230ba2d
SHA19e2d6601abccda81d3229d99149e7bdf8c57a786
SHA256d19669dc8a55dcd1a959f11069ac1f2af8e2fc73e0b203eb3773661241a7565b
SHA512dd923045984328075ad4dd59bab67cdbbe0406bc5fcca8b0fcc34956a3f4d596e3477b9cc044583f9b0709b3c779c80ce36cbf0e69d95e47fa922703fd76a0b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5791c953dc08344d984806c877877efa7
SHA1ffedf29a7c11bc153baefae839b4eb0e3df63609
SHA256b4a79c0846bcf023a7b6bda17778e1b431d2ba0cef78cf5caac7161aa74253fa
SHA512d157f9580ffd0a875643225ba70f45da3eee115ccb6828e5faa1d87616c7a324f592c365cee1e00bd00679a84dc6ee7dc8d349288e2cfc4f0c814cfc6ad588b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD540047d7b52ffa54f7f16eabb1dc9534d
SHA115dafe38e664b29a2b5e97c95edba80ca38ba80f
SHA256c3fcf98d14e5b88c4b7dcb90320ad29204d3affb6889409d860f2d6294df3c11
SHA51292b33ece82fa17396af2b8cb6d4af9ba9d5afa83a1d76f4e537ea611f9e100c276282844842be0697413d0b0cf2187e25df15f131d766ba6cacfa94c7b257173
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee