Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe
Resource
win10v2004-20240426-en
General
-
Target
be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe
-
Size
3.2MB
-
MD5
782834c20b3c2c393f4a913f2b5742e8
-
SHA1
858cab6c4f353224345c033dcfba0b33950e1168
-
SHA256
be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7
-
SHA512
f104a0fddd17bd30fc52b62376fe40b0cbb23beaab0746bb49c2bd2771cc0caf0e2eb5ef8ed5cff0d98b6708c898d3ca52bb856c0c6dc874b66c2cf2d586d83b
-
SSDEEP
49152:nnyN1rnv/cGbfHlULG/zVkIbowR0cmd1vVjm8uOPdsFo:mhuWzSI0wR0cm/Fm81uo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation acrotray .exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation acrotray.exe -
Executes dropped EXE 4 IoCs
pid Process 4216 acrotray.exe 4088 acrotray.exe 2852 acrotray .exe 4068 acrotray .exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "C:\\Program Files (x86)\\Adobe\\acrotray.exe" be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created \??\c:\program files (x86)\common files\java\java update\jusched.exe be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe File created C:\Program Files (x86)\Adobe\acrotray .exe be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe File created C:\Program Files (x86)\Adobe\acrotray.exe be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31106469" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dd3367a5a5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1544893441" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001d5b14faf460f94697b58b95a53f8d1400000000020000000000106600000001000020000000fceed9ddf771b82ea402ac1c42bd6d07f4a3fdf20785cf0870d86bcca7eebf12000000000e80000000020000200000001d5a439f8bafd2c9149a22b13691d1ed0c962b2266d7e0d20613a53e00dd6c9320000000606ff65fe3e81cd2f34bde9347bce05371ad5edd384ae23e25945c362a219a5b40000000e68c7c0d6ab22c849e7f123a666f4c693f853c39fcc938b3b8fb950d7fe5c1c06b286d1d245f6e4b3945c045bd273a26871cb57a56bdeed54c5a3d9e94e78b3e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ab5e57a5a5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001d5b14faf460f94697b58b95a53f8d1400000000020000000000106600000001000020000000a36843124b8b70a2032eafc4448126b799d3022867b1b3402684f2892b2e8f93000000000e8000000002000020000000d222e910a918c7e381b8ae7cd5a6f8d514de4e30f2f76d841be17dce6072d07120000000717672b4825ffbba48f4fe67d1db398298b012f5bdc7a20d7b53e86235e2f26a40000000a6ff23cb256f98c0c378564a363687abda4f8c9ce9147dbbab21766983b6bcb93eca1772e1323c134602a31066557dc8f4b5c26abdbce706379d2431b3bfdb42 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 005b054ba5a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{87A481A6-1198-11EF-B541-468278FCF08E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001d5b14faf460f94697b58b95a53f8d1400000000020000000000106600000001000020000000ab43739b5898e1c1cd5c5da54c9922e82b6ac4af6a88de55d8e8e021fba97e74000000000e8000000002000020000000d1bde021cb48eab9aeae245151935d70c7c3d72374436fffce4a84eb384c5a8d2000000095a177e13fbcc696f8f5c3b7db1dd6876c27bc4ce3d583d0a4073b9851b5763540000000b2780a16052c988124209375863e8a77d3392c0df8a8f25c077125bf68e85bb114d20a0883772431081ea5abfcfb5876b26065478341d035f9a55fa413ff1246 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1544893441" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31106469" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001d5b14faf460f94697b58b95a53f8d14000000000200000000001066000000010000200000009110a2212538a2559880a5528dc47e704d53ae0afed3989f3e4abd2dad869c49000000000e8000000002000020000000957afb201e52bd36e47d7d151bc2b40f10d35aec776494df8b6e7ce735b2cedd200000005e4dfc3f31acd9781f9e07feb545c72abaf0eec721aa196d7842e324fdcfe1e24000000087ca86a2c88571719618cd9553518703d96dc51abc98e20bcc28b308318aee2c76a1c3ed8ee74687219af01557aa9efb113249458c3b1bec5c7b9bbc13b11116 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0288d4ba5a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2424 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 2424 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 2424 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 2424 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 2424 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 2424 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 4216 acrotray.exe 4216 acrotray.exe 4216 acrotray.exe 4216 acrotray.exe 4216 acrotray.exe 4216 acrotray.exe 4088 acrotray.exe 4088 acrotray.exe 4088 acrotray.exe 4088 acrotray.exe 2852 acrotray .exe 2852 acrotray .exe 2852 acrotray .exe 2852 acrotray .exe 2852 acrotray .exe 2852 acrotray .exe 4068 acrotray .exe 4068 acrotray .exe 4068 acrotray .exe 4068 acrotray .exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 4088 acrotray.exe 4088 acrotray.exe 4068 acrotray .exe 4068 acrotray .exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 4088 acrotray.exe 4088 acrotray.exe 4068 acrotray .exe 4068 acrotray .exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 4088 acrotray.exe 4088 acrotray.exe 4068 acrotray .exe 4068 acrotray .exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 4088 acrotray.exe 4088 acrotray.exe 4068 acrotray .exe 4068 acrotray .exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 4088 acrotray.exe 4088 acrotray.exe 4068 acrotray .exe 4068 acrotray .exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 4088 acrotray.exe 4088 acrotray.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2424 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe Token: SeDebugPrivilege 3540 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe Token: SeDebugPrivilege 4216 acrotray.exe Token: SeDebugPrivilege 4088 acrotray.exe Token: SeDebugPrivilege 2852 acrotray .exe Token: SeDebugPrivilege 4068 acrotray .exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2456 iexplore.exe 2456 iexplore.exe 2456 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2456 iexplore.exe 2456 iexplore.exe 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2456 iexplore.exe 2456 iexplore.exe 4896 IEXPLORE.EXE 4896 IEXPLORE.EXE 2456 iexplore.exe 2456 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3540 2424 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 82 PID 2424 wrote to memory of 3540 2424 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 82 PID 2424 wrote to memory of 3540 2424 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 82 PID 2424 wrote to memory of 4216 2424 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 97 PID 2424 wrote to memory of 4216 2424 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 97 PID 2424 wrote to memory of 4216 2424 be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe 97 PID 2456 wrote to memory of 2232 2456 iexplore.exe 100 PID 2456 wrote to memory of 2232 2456 iexplore.exe 100 PID 2456 wrote to memory of 2232 2456 iexplore.exe 100 PID 4216 wrote to memory of 4088 4216 acrotray.exe 101 PID 4216 wrote to memory of 4088 4216 acrotray.exe 101 PID 4216 wrote to memory of 4088 4216 acrotray.exe 101 PID 4216 wrote to memory of 2852 4216 acrotray.exe 102 PID 4216 wrote to memory of 2852 4216 acrotray.exe 102 PID 4216 wrote to memory of 2852 4216 acrotray.exe 102 PID 2852 wrote to memory of 4068 2852 acrotray .exe 103 PID 2852 wrote to memory of 4068 2852 acrotray .exe 103 PID 2852 wrote to memory of 4068 2852 acrotray .exe 103 PID 2456 wrote to memory of 4896 2456 iexplore.exe 106 PID 2456 wrote to memory of 4896 2456 iexplore.exe 106 PID 2456 wrote to memory of 4896 2456 iexplore.exe 106 PID 2456 wrote to memory of 2632 2456 iexplore.exe 107 PID 2456 wrote to memory of 2632 2456 iexplore.exe 107 PID 2456 wrote to memory of 2632 2456 iexplore.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe"C:\Users\Admin\AppData\Local\Temp\be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe"C:\Users\Admin\AppData\Local\Temp\be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe" C:\Users\Admin\AppData\Local\Temp\be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Program Files (x86)\Adobe\acrotray.exe"C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files (x86)\Adobe\acrotray.exe"C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
C:\Program Files (x86)\Adobe\acrotray .exe"C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Adobe\acrotray .exe"C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\be19254ab2868916380284a1b89373993e3d9110e569141f67017436d15a89e7.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4488
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2232
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:17416 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4896
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:17420 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD57e05ba70f797d3a605773849e115cb84
SHA1999a1ee8a149ed2e8efbb5b2ea435364df61b298
SHA256e99338e9ac199457184b94bf475da596c431426c31f46d7ca2f4470991944f6d
SHA512c5c5199622ac945d6985c14de8acf9e384ba5d5a5466fff09bbddeedd9adf5fea9350b6e49b8ba72222090525d5c46dc0a4bf07c725fb589231a3bfed4d69a9b
-
Filesize
3.2MB
MD5101301a7e20896a3536813106e3c8cf2
SHA1b07c9801a105de4a203b7749035478056eae0568
SHA256593c44c33aad46751812d38ae64c2f29702bcc31785403a6e3deea2c416e3653
SHA512c8f16b78c026027135a7a5a14f4a641194b11efe9bb4e813461d8e8ed202d22b10b97de1dab52869ba571ee65385116f85c6bd3a9cb4d4f59a024043c3aa9f1a