Malware Analysis Report

2024-09-23 04:02

Sample ID 240617-dry7hswcmn
Target 56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086
SHA256 56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086
Tags
metasploit backdoor discovery spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086

Threat Level: Known bad

The file 56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086 was found to be: Known bad.

Malicious Activity Summary

metasploit backdoor discovery spyware stealer trojan

MetaSploit

Drops file in Drivers directory

Reads user/profile data of web browsers

Checks computer location settings

Enumerates connected drives

Checks installed software on the system

Unsigned PE

Enumerates physical storage devices

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Enumerates system info in registry

Modifies Internet Explorer settings

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

Suspicious use of FindShellTrayWindow

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-17 03:15

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-17 03:15

Reported

2024-06-17 03:17

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe"

Signatures

MetaSploit

trojan backdoor metasploit

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4672 wrote to memory of 1964 N/A C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe
PID 4672 wrote to memory of 1964 N/A C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe
PID 4672 wrote to memory of 1964 N/A C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe
PID 1964 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1964 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4580 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4580 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 4600 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1888 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1888 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1264 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe

"C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe"

C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe

"C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe" Admin

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.178stu.com/my.htm

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4eb946f8,0x7ffc4eb94708,0x7ffc4eb94718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:8

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4444 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2160 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,6406742430954383282,16083867569238950786,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6136 /prefetch:2

Network

Country Destination Domain Proto
CN 1.15.12.73:4567 tcp
CN 1.15.12.73:4567 tcp
US 8.8.8.8:53 info.178stu.com udp
US 8.8.8.8:53 www.178stu.com udp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 google.com udp
US 8.8.4.4:53 google.com udp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.8.8:53 www.178stu.com udp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp
US 8.8.8.8:53 edge.msiserver.lan udp
US 8.8.8.8:53 www.178stu.com udp
US 8.8.8.8:53 nav.smartscreen.msiserver.lan udp

Files

memory/4672-0-0x00000000007A0000-0x00000000007A1000-memory.dmp

memory/4672-1-0x00000000007A0000-0x00000000007A1000-memory.dmp

memory/4672-2-0x0000000002570000-0x0000000002571000-memory.dmp

memory/4672-4-0x0000000000400000-0x00000000005E5000-memory.dmp

memory/1964-6-0x0000000002290000-0x0000000002291000-memory.dmp

memory/1964-9-0x0000000000400000-0x00000000005E5000-memory.dmp

memory/1964-11-0x0000000000400000-0x00000000005E5000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 612a6c4247ef652299b376221c984213
SHA1 d306f3b16bde39708aa862aee372345feb559750
SHA256 9d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA512 34a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973

C:\Windows\system32\drivers\etc\hosts

MD5 03450e8ddb20859f242195450c19b8f1
SHA1 9698f8caf67c8853e14c8bf4933949f458c3044a
SHA256 1bdd8f1dd7bd82b5b2313d8770dfe4f41cd3f45bbaeab8b8a7f75fc5e2d3720b
SHA512 87371e57bf2296af5ec7f5db772a4ce66729d54aa23a8b384e3f4c42310b97b636576c7dff67c27a3b679339cdeee05b836563ae2a878f0367caf247b3e1ba7b

\??\pipe\LOCAL\crashpad_1264_EIOMQMEYOAVPLBYS

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 56641592f6e69f5f5fb06f2319384490
SHA1 6a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA256 02d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512 c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 72a97c0d10f4ce53cf871318855f2075
SHA1 6ec4f3c7e2024ad486a1e6e4c9d056630117d476
SHA256 efe463e58d8750865da6467b604b8a7c2da56f39601b8ffef2c74553c0d5b7da
SHA512 c5cbcaa22f89258b2507fd5d92c8c35f55aa48edf3fe58ffa20aa929a4bf912ed87cbefdf8fb422d507c920c1b5e875143da51cc49ee8f8c73f3053ce5f9ef7e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 9a3317266f800908812c907f43349ed8
SHA1 3c3392355e45fc8a7307367c78df25afa4350fc7
SHA256 680ce41b5d402165ca48b119c7caf2d46186a3c4c1f4842c607969e26649b389
SHA512 0230cf10edcb514276d21b64d20242e6681ef50229b560b1cad039be047e39289a0d6419c1ad745028e1e045b2e215d9cec5823848b78aeb1c63d6ef6fe84e6d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 aed30d8c4cce8983aa86055ef8775e55
SHA1 b501bcfc97914b83a35135ee885eead60b6ea831
SHA256 3bb0ec04c35ba38ccd78ef9dde17c8e0ee1c3fc95b9506e771cec9228df5161a
SHA512 ac3d5927104d3994509b0351fb7eba49b6136b4ee8c27c5270caee5e775f9f8b950fc497c20b4d8aeddbfdf2d1ad39ce089d3dc52afa6d0f3c11d98ec5507133

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-17 03:15

Reported

2024-06-17 03:17

Platform

win7-20240508-en

Max time kernel

119s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe"

Signatures

MetaSploit

trojan backdoor metasploit

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D914D9F1-2C57-11EF-94AD-7A58A1FDD547} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000047cda73e9c4e5992488759aabd95f864ba23b3877ec119365ee88d7d8be53428000000000e800000000200002000000081e6cd7e3bf58f9facef4d5ebf4c54f192ed2baa4728820a9fe2aa39969f7d9290000000200c0a86187514acbceabd795c57012cdd6f8c2be0bd2824a513006099daa88e53762ad060eb66fc3cd5f1b26428570240a73bdc9a9e900744dd99fa0e4d80b5c7c0fcfe5b72d24e88d08c61ead6c1d99cb804974fe4488809e393758320e2cc73231dd68249f7e55ec3efc42c7181b089b172d32a82c8a8728e3adddaa617b958ba41457c16874f3d451cbb1ab122ca40000000b4c7296b5adf90b915671741982f7701f5a6712af2fc08a12d5effde8507e68264712bce2e40720a7e4677d31b87b4edfe64cfd87a958715cf4c7eb8be0ecc2f C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424756019" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000005c882f3286987d6e0a754ec11d963300bb67fafa7abf14cefe0c7478366a739e000000000e80000000020000200000004b11cd5546a8b0e4179ba4fc61ee5503e0a46056ee57028b07175d6579a401fc20000000093a58687e3094f6163ee307881d7759775b473c9bd38ed6a1f4bce5464e5cfb400000005b98bfd323b9753ac69267ef8f1611892e2e8208fc88cc37b4666ca0acf02ecca0337d5151e196a3b8c61fd48ba114778c64ec6f962ad1b513ef29e50a9c7ff1 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e499be64c0da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1960 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe
PID 1960 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe
PID 1960 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe
PID 1960 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe
PID 1736 wrote to memory of 2872 N/A C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 1736 wrote to memory of 2872 N/A C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 1736 wrote to memory of 2872 N/A C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 1736 wrote to memory of 2872 N/A C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2872 wrote to memory of 2592 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2872 wrote to memory of 2592 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2872 wrote to memory of 2592 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2872 wrote to memory of 2592 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe

"C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe"

C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe

"C:\Users\Admin\AppData\Local\Temp\56cd8ca18cfccdf833faaa83d44dc6e75b8e9ac06d731d70c3d26ea73e60e086.exe" Admin

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
CN 1.15.12.73:4567 tcp
CN 1.15.12.73:4567 tcp
US 8.8.8.8:53 info.178stu.com udp
US 8.8.8.8:53 www.178stu.com udp
US 8.8.8.8:53 www.178stu.com udp
US 8.8.8.8:53 www.178stu.com udp

Files

memory/1960-0-0x0000000000220000-0x0000000000221000-memory.dmp

memory/1960-1-0x0000000000220000-0x0000000000221000-memory.dmp

memory/1960-2-0x0000000000230000-0x0000000000231000-memory.dmp

memory/1960-4-0x0000000000400000-0x00000000005E5000-memory.dmp

memory/1736-6-0x0000000000270000-0x0000000000271000-memory.dmp

memory/1736-9-0x0000000000400000-0x00000000005E5000-memory.dmp

memory/1736-11-0x0000000000400000-0x00000000005E5000-memory.dmp