Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-04-2024 16:50
Static task
static1
Behavioral task
behavioral1
Sample
M1NIT V3.exe
Resource
win7-20240221-en
General
-
Target
M1NIT V3.exe
-
Size
243KB
-
MD5
134701826c4fca01a8826ca05e8bb974
-
SHA1
2f6518d2a5f93683645ad6ca739e73dc29cffb78
-
SHA256
b6e4007669fa75dc2987f0c7bdf7eab0c623ba6de87197e94ea31a3d3b10cda8
-
SHA512
c78ad422ce675f7a92515e133ccc14b23b1c03763d94ecde1345bf76604fa78c44609b96cca6101467545ac09aa2f9e565005d2071bd2f7739dbc8e3b33008b3
-
SSDEEP
6144:UBlkZvaF4NTBK/1+LtGhywF6oiL9zjjGebSPv:UoSWNTUKYhX6xZP8Pv
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Drops desktop.ini file(s) 1 IoCs
Processes:
solitaire.exedescription ioc process File opened for modification C:\Users\Admin\Saved Games\Microsoft Games\desktop.ini solitaire.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000931d9f4a15b0480ef1e4925bd1056b4c10a3ea2d93af858c9e147cc3b21b07b3000000000e8000000002000020000000480bea20e957a7b489f35e20347d6d0b1649b8640dc741d21532e2d1a3d4bd6b20000000637aad39799549fa260b0a286d81ac3d87308f4095246b69085f32df8d9124924000000017c438f238369a9e2ba419747924e16a3a714d063ab007be9711f78b4185895ca5ff71f08b1aa30ae70dde572f9f716c34a5ec5b3331f9903fa0f4ea65983eb3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C28716C1-025A-11EF-A1FB-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{C28716C3-025A-11EF-A1FB-E299A69EE862}.dat = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff00000000000000008604000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C26E3791-025A-11EF-A1FB-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Modifies registry class 8 IoCs
Processes:
solitaire.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows solitaire.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX solitaire.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats solitaire.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{8669ECE8-D1C3-4345-8310-E60F6D44FDAF}\LastPlayed = "0" solitaire.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{8669ECE8-D1C3-4345-8310-E60F6D44FDAF} solitaire.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings solitaire.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software solitaire.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft solitaire.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
solitaire.exepid process 492 solitaire.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exepid process 2648 iexplore.exe 2648 iexplore.exe 2648 iexplore.exe 2648 iexplore.exe 2648 iexplore.exe 2648 iexplore.exe 2464 iexplore.exe 2600 iexplore.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2648 iexplore.exe 2648 iexplore.exe 2648 iexplore.exe 2648 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2648 iexplore.exe 2648 iexplore.exe 1360 IEXPLORE.EXE 1360 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2648 iexplore.exe 2648 iexplore.exe 2648 iexplore.exe 2648 iexplore.exe 2648 iexplore.exe 2648 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2464 iexplore.exe 2464 iexplore.exe 2600 iexplore.exe 2600 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
M1NIT V3.execmd.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 2868 wrote to memory of 2208 2868 M1NIT V3.exe cmd.exe PID 2868 wrote to memory of 2208 2868 M1NIT V3.exe cmd.exe PID 2868 wrote to memory of 2208 2868 M1NIT V3.exe cmd.exe PID 2868 wrote to memory of 2208 2868 M1NIT V3.exe cmd.exe PID 2208 wrote to memory of 2700 2208 cmd.exe reg.exe PID 2208 wrote to memory of 2700 2208 cmd.exe reg.exe PID 2208 wrote to memory of 2700 2208 cmd.exe reg.exe PID 2208 wrote to memory of 2648 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 2648 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 2648 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 2600 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 2600 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 2600 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 2464 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 2464 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 2464 2208 cmd.exe iexplore.exe PID 2648 wrote to memory of 2428 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 2428 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 2428 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 2428 2648 iexplore.exe IEXPLORE.EXE PID 2208 wrote to memory of 664 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 664 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 664 2208 cmd.exe iexplore.exe PID 2648 wrote to memory of 1360 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 1360 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 1360 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 1360 2648 iexplore.exe IEXPLORE.EXE PID 2208 wrote to memory of 564 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 564 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 564 2208 cmd.exe iexplore.exe PID 2648 wrote to memory of 2468 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 2468 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 2468 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 2468 2648 iexplore.exe IEXPLORE.EXE PID 2208 wrote to memory of 540 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 540 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 540 2208 cmd.exe iexplore.exe PID 2648 wrote to memory of 2232 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 2232 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 2232 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 2232 2648 iexplore.exe IEXPLORE.EXE PID 2208 wrote to memory of 2236 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 2236 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 2236 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 1816 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 1816 2208 cmd.exe iexplore.exe PID 2208 wrote to memory of 1816 2208 cmd.exe iexplore.exe PID 2464 wrote to memory of 2948 2464 iexplore.exe IEXPLORE.EXE PID 2464 wrote to memory of 2948 2464 iexplore.exe IEXPLORE.EXE PID 2464 wrote to memory of 2948 2464 iexplore.exe IEXPLORE.EXE PID 2464 wrote to memory of 2948 2464 iexplore.exe IEXPLORE.EXE PID 2600 wrote to memory of 2964 2600 iexplore.exe IEXPLORE.EXE PID 2600 wrote to memory of 2964 2600 iexplore.exe IEXPLORE.EXE PID 2600 wrote to memory of 2964 2600 iexplore.exe IEXPLORE.EXE PID 2600 wrote to memory of 2964 2600 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\M1NIT V3.exe"C:\Users\Admin\AppData\Local\Temp\M1NIT V3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\7742.tmp\7743.tmp\7744.bat "C:\Users\Admin\AppData\Local\Temp\M1NIT V3.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f3⤵PID:2700
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://upload.wikimedia.org/wikipedia/commons/4/4c/Lolcat.jpg3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275458 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:340995 /prefetch:24⤵
- Suspicious use of SetWindowsHookEx
PID:1360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:668675 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:537613 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://ne-kurim.ru/forum/attachments/image-42-jpg.148275/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://w7.pngwing.com/pngs/54/244/png-transparent-lolcat-kitten-meme-common-admission-test-cat-B7-2018-cat-mammal-animals-cat-like-mammal.png3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:24⤵
- Suspicious use of SetWindowsHookEx
PID:2948 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.aristide-leblog.com/wp-content/uploads/2013/02/lolcat-twitter-1.png3⤵PID:664
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://upload.wikimedia.org/wikipedia/commons/4/4c/Lolcat.jpg3⤵PID:564
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://ne-kurim.ru/forum/attachments/image-42-jpg.148275/3⤵PID:540
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://w7.pngwing.com/pngs/54/244/png-transparent-lolcat-kitten-meme-common-admission-test-cat-B7-2018-cat-mammal-animals-cat-like-mammal.png3⤵PID:2236
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.aristide-leblog.com/wp-content/uploads/2013/02/lolcat-twitter-1.png3⤵PID:1816
-
C:\Program Files\Microsoft Games\solitaire\solitaire.exe"C:\Program Files\Microsoft Games\solitaire\solitaire.exe"1⤵
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5b976722e6aa4d29d0c420c7b71ee206a
SHA1fa154a81a9adcff6ae004eb5a020eeab7bf1e6a0
SHA256fe8079d0a697efbc9cd448968ec09f9a24aa17646114be475c4864d04b57c808
SHA512b73be5f9fa8747c50c8bc736a3608d2a0393ce49f11fe0cb39c894d4f87455d55bcd0dd100f81d0ac8830fa72a98fbb15914115716d783a422600e576ab672ff
-
Filesize
503B
MD5f806fafc9d15483d6fe4806692328a0c
SHA165a5bb8b8d4e895f6454eef21b80f5832e6618ae
SHA256f3151728456b2897889aefe9a5aadbf467de91905aef3a0fb386a501a7873015
SHA512751a42151e756ce30555ca160d85b2b171668e900376d0a8f52613bfbca761ca585c5c6054062d48db235d0faf30115a47abb873e2ba488459466b22d5c83ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_ADE4E4D3A3BCBCA5C39C54D362D88565
Filesize471B
MD59ce06e69863d6402b77e9bb674e89e5e
SHA130a47fbe36bb56c7fa40f5479d2dec145cde70d9
SHA256a6b5cd23554afe89eb69c2b740b6e4847a1155b3324a5066b41c1ba765e18a16
SHA512935f9b6f0bf81964d7dd05cbba3064fe44054138e0baf861adf78cfea74371e8f8f663c86c71ae478cf4d4b5fa2471ea746d022ea7e90d29ad2640bbdf5f1afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5517f4d281e78ba6749568871f0e13d3c
SHA1e9f51a75cb41794de39ded0d46a280e3df098769
SHA256ce241de2d9c131bfa9afb26b293b2f79aba55f7af1cb5591283d5602f9746d6a
SHA51257190c044617ce12ad7e60c93281f3e22a338e5ce95b33c78b83266bd0530cef0ddd5ea77b5d5ced4a7c877f67c401c29fa72f3b9dc686193de0fd0d735d3800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD56d72c63168e6bdc0bc364f2f76287ae6
SHA1ff96b71e6fdb8d779efcd7a439a2daa73d46fe28
SHA256cee06f7bb86d1345d6a909d2c85f32c6780c96b3212c75dd606412624f4b5814
SHA512dc3c4939813ffcab66c30f5bb8c6b4fa1592dec5c6b3e5c2249bab99057258afc08d55b2546a8b5402a5d10794dec84cbf3a1ad7a9e19378458007807d69edba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5643ec289bc04d158fd44313d541fdcdd
SHA1bda0f1923c9c3c2b0d3fe47d5d41f869d50c2710
SHA256ae44446358c26c32757dbdf583e08aa1d86272e35902c4f11a5dbfe5d04b26e4
SHA512dc9fa93e22f2f4b0df13aeb60ac55f469e7a5f04b407fd48204d409a8f4b980245a7a622340961b47f5ee3679b3a0e84bb4638e35d51b3236efc276549c99b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58823587cd1d0cb664af8a118038696dd
SHA1605cedb6a486492e55a8764fc28e7c02cccdb64a
SHA256c00c45802da5e90d87f1f3bfd969c341c7cdb1c132a067cca950c393df3b9995
SHA512e0d9d3d833917bc5d69b638212eda2ae27aa2907721ad22f10183dae297af8045e4e005cd0985d95db743af18f03d6d67a71f004e100fd83986158c314c038ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acc4f64455183692c7003faa7c9b715b
SHA16615b31117730a638459bf8bc38fa0f2b64c7e66
SHA2561475898d12b9659445af86448660af3861a3866f285c9517432ca2173e105ee7
SHA512e5718db3f990b7d79112f4703a6e6caa3ec6b7f73ed55433dbb53e6881c21d2bc9d35c1115a646e47c7f7bdaef5f52122c1d4652db1de03e2d91d009a7959c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2C3D3D3886172A4F56D64789BA87C2C
Filesize548B
MD539769a3c3f0f40451f59b073596f3606
SHA131e577d5ecb2b8be1d46ce3c49c11acc8741423b
SHA25624a9ebc2afeebf93fbfe9b46d3d58de6db495b3192e17d55d96e2172b25f84c1
SHA5126622395064e8b2e4334a70782f975300b397f2e739ffba5682aae57b43876d9801256815532a04822238475eb1c48eff6c53d7a7d83ae6d266e2068cd2fa93bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_ADE4E4D3A3BCBCA5C39C54D362D88565
Filesize404B
MD5dbfc109c6a0376d7deb0f68c12caca83
SHA12437f8caca2cb1d492652c33d39dd87a6665ec16
SHA256c90e897cfa8b2f79c9ae2f28f4714879d79bbaf941d3e6057d0327dc89c0741e
SHA51223937bc162a8f401fb7d2c2276ab0c111935a290abb00ab71b20d237d611c8478d580a3ba16f0777525afa84c66dfd29dedd3c4af2a62b1c00fd1b383bea4daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5c2bb6c34d3634fafefbfc595447720e9
SHA1481cd06fd7605cb764764e01a1ccc8ed1726e48b
SHA256d7df620d459f28ce5ede3097f5ab928ac443332e21d2f73f3c6eaf53f943d6b2
SHA5123bdbb56578241fe10af3a0c4375da85fa239205e3e333a4e0f6725e4ba2a60a29da3297841f136836f12b4fea73b38cf55c287768e697184aff890a08bae0759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5e9ef8938376abd98f205c1643ec500fd
SHA1f732ee07b75dca333babe6da4998d21bc2d9796e
SHA256c2740c76013afe11e07cab79e346e85cbf72fc838e7d40ebfcbf7ec6a20353ed
SHA5123bebdec96c12759fbf45a192e56b46d2bb7a4500b732d1967e0e5dd19093c3ddd76ea156bb58224c2169564c1f24a01d41a6d4cfaedf6d9fe4aa2c64a8264328
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C26E3791-025A-11EF-A1FB-E299A69EE862}.dat
Filesize8KB
MD5179ae0fdf4ab8f91a2dd48dcf421ffa7
SHA17692519ecae5ac40c9a2c322122ff4f846ef7cdd
SHA256bdf6aedbaa26b0b2ab46821032ddf16908960f4b5317a267099dd0794181b6b1
SHA5120031c142e0475f7268d67e65e859474cd7bda8606883146dccc40c84e8c8f992391c9f3c5196c12ea8a9fdab8c54234f848d9ccbb9959cc294e1114034816429
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C2A04411-025A-11EF-A1FB-E299A69EE862}.dat
Filesize5KB
MD54da58feeb268881d74ee6f411f66d8a3
SHA153a92045065d7fa572e7c28ef1e507c53094338b
SHA256f227f58023938f8f2c57d427ec9193da98b5131d87e41ccfa8c8fbf91fe362ac
SHA512e351b79d6fb57851deadba842669337e118547424a8f1a5811d07aa7714e416bf37c0d4a3b705fa3b8cdc6bf1091b966e0283767c0ded14611ad43724759bbdb
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{C28716C3-025A-11EF-A1FB-E299A69EE862}.dat
Filesize4KB
MD5855c82df39bd3a49d6b83a2211b68170
SHA147e531c59753e3cffa19a00c3912b579774a06aa
SHA2560335c2b6991e1022b4847e55e05149d72fa5fcd7ae251275b325d0788d950a81
SHA51260b0f36bcc99a14734199276b5c564c0eb44c2b37c465725c2b61ec4addd0a8d6e204910dd6fdcb0f475be8ac35513cf1ffcfebbbeb7d86e0ad16f6f66754226
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{BA76E2A0-D0CB-11EE-AB17-C695CBC44580}.dat
Filesize5KB
MD5f3a79335ef74acfd7d00b61ad34aee58
SHA118c4b987a3aa3049267274917621b86d8766b72b
SHA25631dab1355ec32ed9b313645b8dfe7ab2cbab40b5213b8ae86c22479a61b27d8e
SHA51220407e9baf640e8e20d8bf506d241fdf8f0228345198ad0753c4f8adc21b59b2b9d8860998ac4b92486a4ee3682b21946c6ae16aaebb627ef6bbda6b01dfbc3e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{BA76E2A0-D0CB-11EE-AB17-C695CBC44580}.dat
Filesize7KB
MD503646d6bb8fcf69e850290e7570629b6
SHA115fa6986f69fc209fb04d664a5e425b68583a439
SHA256ec6c9cab384595882609f85e4433cb2ea0c792d33f2753ed37998c21a6082db1
SHA51263d51619c33bb26740b7f82daa0f26763c950d322a16d371879f4ca4daacef056c2a4fdeb468ed5a704140848a5c914373b41ff75e6248cd4e171bd5ae791fe0
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{BA76E2A0-D0CB-11EE-AB17-C695CBC44580}.dat
Filesize6KB
MD5ee325dd13aee313a03dcf9f37e2e2c82
SHA16b082f58a7aede90e18634aa49fec0420b2e4153
SHA256d311b29cea44122c5fcfff4a2c0b0d853ef60be7752244e12d333e9f02160e2d
SHA512831f336f587dbf36a38503b25a36ae2a7159fdf54171dcf2c62319caf40f12c6671b41fbf57be1ea31189cb519fd21dcf3b0c2de4e83c7151d23b1b47c2a9e0e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{C26E379E-025A-11EF-A1FB-E299A69EE862}.dat
Filesize4KB
MD54d446477e4b2919fe7fa3677b3a78f5d
SHA16ed1184f413f6d5f229fd994b8f83a70f94b8f69
SHA256d2b632aea9d1023933a48a3c26a0de0b4b881243c35518c83bddba626fc9cc33
SHA512dcb318edf33e7394f406953d250563b0cb556d68afa97719cda2ce2e3583601bee57290c6e7631bdd9387c2922cd7255c7b44955d490ef41c5c3e62cf104bf3c
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{C28716C4-025A-11EF-A1FB-E299A69EE862}.dat
Filesize4KB
MD59081fded65a61ddbfbb140ceceaaeba2
SHA1acbd107f2c38971b0949a3c0b9df106bd97a1efc
SHA2567fded562ae77d65004983db3cab79d99660e69194f51b8ec8194e2f2ee4fd666
SHA512cee3071aaf43892f78a2cc6d0bddccbc6157e93374bdf05483c478cb3ffc3630e2708323e7a1de7837b50b3b271ac47e78b4d90dbfe9b458c0513efba7461b64
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{C2A04414-025A-11EF-A1FB-E299A69EE862}.dat
Filesize5KB
MD5642cde548b74f051a6360a8c7a91884e
SHA137119ac8e71aa516bbbbc46d39e30b8e43d0428e
SHA256890e78569085469fda0677209d11c4de48fa0e6c45c634d89e151fc09b138c33
SHA5124ddc105943870901d8c3be379a28404209a73b430e538a3d757a8df7d7a043df298eab010d2d96cc3b4c92410b85a2b1dcd68a179396403c75b41ada91e50900
-
Filesize
5KB
MD515a6aa9433bc488def1b7588a078fc28
SHA1f2914bd2fa3bf90a0450effb12850797b1c46c53
SHA25631f9569b6c932d731246108cd2a267f3a4298d9ebf3b3bbb8770b38419c0a36f
SHA5126a9389bf72008254462ad5e380311609f2901a6661d08a93402687919e36e45eff05ade410497d0902f2aad66f31df3be358bcde662cbcd9ba22c69303104bd4
-
Filesize
6KB
MD552c9be26c5e521064e4c2794dfb0abf4
SHA18b3342d82e17f9962d5f9e7b728c33819b6b0c7e
SHA25659f5a6e57ba2a564bdedad51c137feabfce099557da656d26499f7da66cdf655
SHA512d40ec9297c59b572dcec99318195d6ccc57851a1724082694a8e90c530ac9e5ccac91f6d2299a657cd6d02a5e77caefe60cd713a9b71b1c501a657b51e642515
-
Filesize
6KB
MD5d60f9699c0bd9c077339cdf55f2f2dd0
SHA131908c98e9c45a020e185ea5bdca756a3c8a0874
SHA2564508d4894f7675d8dae62c96d82a948266f3bb2841dcb4b7d286c30ba5b7a3b9
SHA5121148e4134b528fc6862776d009ee77809ba6ccd3e11e30d66568f2789ebe5b3c3b1491e0311397374c19255ccba0e616cb786258e103b750469b4a05b567086a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\favicon[1].ico
Filesize5KB
MD50860c1e63e95143ca82e59a1cf0cd23b
SHA1439023c3c376b4790f5d3aeae09c14398386bb62
SHA256aca5bef0d0e60c7133daecd641970c10b53f1c7ab25922600e6f95830e74284f
SHA51268db868f2aaaa30e4d830d2c6831fbc8e0c0a94d6aa9bd62c69c92a2ed7b9f67362c06090b3472fd9f88049613843c0907fe524877374cbc41fb68f4a711739b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\favicon[1].ico
Filesize1KB
MD5c5c3627fa96a70466046cb579d555008
SHA15d902e20813d3ce342660fb65a108da826fd92dd
SHA2569eff92bb9950e4a955df2cb1ed15cf8ec6402e5afd8471898e7b3064434f472f
SHA512b1254e70fefdb648f254b496e4f188366d8395216a37b63c88931c98464c1faedb414abd8e1f7f51d75eeb19ccfc0c97514d901bd1590801609abf2f3093fc09
-
Filesize
154KB
MD59074c108bf5bd611456e0fdbb0df08f4
SHA162f9ba2e308749c20d03d6e6bbab1546fe503b7f
SHA25621550ba2e642802be1f39eea1e9b5be0963200716e24dd614d05abb026bb5481
SHA51201fb91b935102180a36c46d3269fc1c1acf0fcaa575cc7368018cd8f67e72b5a1726417c6721d0a4b8d1c13e4adeb02272efbbaad107083e43aa003f70ab3c33
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
16KB
MD58a55ace2af391728f2ea70ec054f5b9d
SHA1cea9cce397cb223bf84ed53a22908bbcbef6d5d4
SHA2562f3b4578bfda4008249d6141dad4f631ceb8f9906d3f5d6e9e03b53fd4737166
SHA51209b60750041a0776b0a32249b8c0de74b8a957e88a544ffc193180ea7bedffc3e6fdd3f017d8741767ad4c880c15758eb2aacca2960f7906642ef94ad3bd40f3