Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe
-
Size
3.2MB
-
MD5
1ec510f8c751490461f66c5ca0efe080
-
SHA1
54b619155fcc84d6ea04d41d38fbc8073c7cfd89
-
SHA256
b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1
-
SHA512
c66b44935f3fe045105a3ca8a8b23c00d33be8701614a43b2c3128a38ae33956bc5c6bbdc547a17f1d53b9e68d8f84aee560c9a8edd9ac86d1f4ac3a5bba2ff2
-
SSDEEP
49152:Bdx56xYcIcuHcKAH2IgGXikE2I6wdD1weda4NVk4aZ0uyj:Bd6x/IcuHcKAHfnEqwdDioa4NiK
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1424 wmpscfgs.exe 3740 wmpscfgs.exe 448 wmpscfgs.exe 32 wmpscfgs.exe 3136 msedge.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\users\\admin\\appdata\\local\\temp\\\\wmpscfgs.exe" b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\users\\admin\\appdata\\local\\temp\\\\wmpscfgs.exe" wmpscfgs.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
pid Process 3580 b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe 3580 b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe 1424 wmpscfgs.exe 3740 wmpscfgs.exe 3740 wmpscfgs.exe 1424 wmpscfgs.exe 3740 wmpscfgs.exe 1424 wmpscfgs.exe 448 wmpscfgs.exe 32 wmpscfgs.exe 3740 wmpscfgs.exe 1424 wmpscfgs.exe 448 wmpscfgs.exe 3740 wmpscfgs.exe 1424 wmpscfgs.exe 1424 wmpscfgs.exe 1424 wmpscfgs.exe 1424 wmpscfgs.exe 1424 wmpscfgs.exe 1424 wmpscfgs.exe 1424 wmpscfgs.exe 1424 wmpscfgs.exe 1424 wmpscfgs.exe 1424 wmpscfgs.exe 1424 wmpscfgs.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\240659625.dat wmpscfgs.exe File created C:\Program Files (x86)\240659765.dat wmpscfgs.exe File created \??\c:\program files (x86)\microsoft\edge\application\msedge.exe wmpscfgs.exe File opened for modification \??\c:\program files (x86)\adobe\acrotray.exe wmpscfgs.exe File created \??\c:\program files (x86)\internet explorer\wmpscfgs.exe wmpscfgs.exe File created \??\c:\program files (x86)\adobe\acrotray.exe b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe File created \??\c:\program files (x86)\internet explorer\wmpscfgs.exe b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe File opened for modification \??\c:\program files (x86)\adobe\acrotray .exe wmpscfgs.exe File created \??\c:\program files (x86)\microsoft\edge\application\msedge.exe b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe File created \??\c:\program files (x86)\adobe\acrotray .exe b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31115859" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{37EAF27D-3646-11EF-B9F7-D28C415B03FA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d032b9fe52cada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "210769922" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005fd41894714572428d7dd489da02471a00000000020000000000106600000001000020000000449a2f8932a8a6e62aeae6c05dc520fddc4c159cb1a38245c3c9a40028fb1e0c000000000e8000000002000020000000305e65bd64859b650cb5b5c0953d0524670d3cffcbc086f5ad51d91c9609ce7e20000000f1503747670780a8b099a88246741ebf83a6181eb1f25d3314969c65f3f02de6400000000b7dc1eaa58145203a6567d64b0a748cd43827df3fe5ee79bd0e0d1bafb0e47b14e45ffe623c63a76b00eb1a27e199b0f763ed8613a0715e10d3e9f6b3c57882 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "210926250" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a71f0f53cada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40972b1753cada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005fd41894714572428d7dd489da02471a00000000020000000000106600000001000020000000d5d7045b812b1382ac6905d60176c9a617600ce20608e0bcfe2d897dc850a085000000000e80000000020000200000001e75b8f7c860bc16794d46d5d585d151b3e832d40f2e6083ad4ca1f21bf0bf4c20000000596c893ca9b907b091a8f8e97c1b65bf942b9ee133a764e6ce5c59d068d71ed6400000008dc48b433e4dbb6984b3999fd306e07fd714ea9aa6513876514dae52107e77ca191ed72c8aeaa66137890c687f0331f4f5a6550dded4372b06909b301f85b97a iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005fd41894714572428d7dd489da02471a00000000020000000000106600000001000020000000bca9e45943498e3e7b1a7b5b8b2e392316607c9e87823485acb75e61c9bb136b000000000e8000000002000020000000230b1fa18eb27d1c1ceffb2e88ed0f468590fe77d7ff414fac46c7c30fe379b0200000009a95a0aa58235d9419e177545dff6bc3189b3fed4dbe7b213cfda1566fc78c0040000000aa264747c1ae81cf4ab1a77cbb9d4120b5a7d084a79f597f2852c71faeefc9c0689b0d6f4f692f44ccb63b25a55f474e384e2cc38cd34f74edc670f434e0483a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31115859" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff720000001a000000f80400007f020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3580 b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe 3580 b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe 1424 wmpscfgs.exe 1424 wmpscfgs.exe 1424 wmpscfgs.exe 1424 wmpscfgs.exe 3740 wmpscfgs.exe 3740 wmpscfgs.exe 3740 wmpscfgs.exe 3740 wmpscfgs.exe 448 wmpscfgs.exe 448 wmpscfgs.exe 32 wmpscfgs.exe 32 wmpscfgs.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3580 b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe Token: SeDebugPrivilege 1424 wmpscfgs.exe Token: SeDebugPrivilege 3740 wmpscfgs.exe Token: SeDebugPrivilege 448 wmpscfgs.exe Token: SeDebugPrivilege 32 wmpscfgs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 556 iexplore.exe 556 iexplore.exe 556 iexplore.exe 556 iexplore.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 3580 b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe 1424 wmpscfgs.exe 3740 wmpscfgs.exe 556 iexplore.exe 556 iexplore.exe 448 wmpscfgs.exe 32 wmpscfgs.exe 4716 IEXPLORE.EXE 4716 IEXPLORE.EXE 556 iexplore.exe 556 iexplore.exe 180 IEXPLORE.EXE 180 IEXPLORE.EXE 556 iexplore.exe 556 iexplore.exe 4140 IEXPLORE.EXE 4140 IEXPLORE.EXE 556 iexplore.exe 556 iexplore.exe 32 IEXPLORE.EXE 32 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3580 wrote to memory of 1424 3580 b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe 92 PID 3580 wrote to memory of 1424 3580 b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe 92 PID 3580 wrote to memory of 1424 3580 b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe 92 PID 3580 wrote to memory of 3740 3580 b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe 93 PID 3580 wrote to memory of 3740 3580 b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe 93 PID 3580 wrote to memory of 3740 3580 b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe 93 PID 556 wrote to memory of 4716 556 iexplore.exe 103 PID 556 wrote to memory of 4716 556 iexplore.exe 103 PID 556 wrote to memory of 4716 556 iexplore.exe 103 PID 1424 wrote to memory of 448 1424 wmpscfgs.exe 104 PID 1424 wrote to memory of 448 1424 wmpscfgs.exe 104 PID 1424 wrote to memory of 448 1424 wmpscfgs.exe 104 PID 1424 wrote to memory of 32 1424 wmpscfgs.exe 105 PID 1424 wrote to memory of 32 1424 wmpscfgs.exe 105 PID 1424 wrote to memory of 32 1424 wmpscfgs.exe 105 PID 556 wrote to memory of 180 556 iexplore.exe 107 PID 556 wrote to memory of 180 556 iexplore.exe 107 PID 556 wrote to memory of 180 556 iexplore.exe 107 PID 556 wrote to memory of 4140 556 iexplore.exe 110 PID 556 wrote to memory of 4140 556 iexplore.exe 110 PID 556 wrote to memory of 4140 556 iexplore.exe 110 PID 556 wrote to memory of 32 556 iexplore.exe 111 PID 556 wrote to memory of 32 556 iexplore.exe 111 PID 556 wrote to memory of 32 556 iexplore.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b74c8c560ec3375eed7bbed69332fcd0ac28790fd6d453a547800cdd6cb4f5f1_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3580 -
\??\c:\users\admin\appdata\local\temp\wmpscfgs.exec:\users\admin\appdata\local\temp\\wmpscfgs.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
\??\c:\users\admin\appdata\local\temp\wmpscfgs.exec:\users\admin\appdata\local\temp\\wmpscfgs.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:448
-
-
C:\Program Files (x86)\Internet Explorer\wmpscfgs.exeC:\Program Files (x86)\Internet Explorer\wmpscfgs.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:32
-
-
-
C:\Program Files (x86)\Internet Explorer\wmpscfgs.exeC:\Program Files (x86)\Internet Explorer\wmpscfgs.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3740
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:416
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:556 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4716
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:556 CREDAT:82948 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:180
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:556 CREDAT:17414 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4140
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:556 CREDAT:82960 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2232 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵
- Executes dropped EXE
PID:3136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD591429bbb1e41a374cfb5bd34e23d4648
SHA103952f846dd860044b8659609f928227567f69a7
SHA2562c5482c6300adf7f9c76f3cebc6f610f1c93abbf2623a619032c350ecf24f58a
SHA51259f1e5a17fa39d8150c8f00dcf427fcf901205d5443230ff0306673a3dddac6f70b23f46ad8f59aaac1b8350429bc56edff9a31b0045306d431d904868aa6f60
-
Filesize
3.3MB
MD583ca411483f7980775aff1296ef96e73
SHA19848b253c0ad8728e3cd2096838a211c6174e01c
SHA256c7041b586687be7b0e6a1774a291d6657bf32efe459ca6faeb537358d6fdc461
SHA5129609978976ef45289b01c970b116300e3688ea5439ade2f356a54e6a9cc603d34f065361fcd04d01c63b7678ed8bc661f200b6a84cd5dea876b0b652ab36c926
-
Filesize
33KB
MD554285d7f26ed4bc84ba79113426dcecb
SHA117dc89efec5df34a280459ffc0e27cb8467045ab
SHA256b0754afe500a24201f740ed9c023d64483ca9183fa6361d759bb329462d25344
SHA51288afabcad8dbb0f49cdea27c64783ec98ece295f139d50029d524950a5b40a7971f033529f7b60e5acdef5f0576bdcf107fa733bf439cc76693b654ebdd9a8df
-
Filesize
3.2MB
MD51b0b09ebec42b5e43e329181be617855
SHA1453f4b22ffda465606668aa2210d6a1eaa7855cd
SHA2565abb9a1a71bb3f9185691754b895bd81978d88841ba12f78db851496e734d605
SHA5127c5738662354e8964a1545af12735d53ac57ffe4074ad7e2cb74a6a49a4b57f2a3e1bbe96c3a6260ab0fc982cc53eb63fcc8a549107a3892953e275ec1b4d089
-
Filesize
16KB
MD56d2c5217caaeaa2c4f6ed41beb851fce
SHA1f80b0e1885580d2bc6a298f2639b312ff999467a
SHA25638545f25753b23f54d8b94ad39beec4c44d96b5f6a704dfb7271e591108461db
SHA512a575b1ce9b245c5aa3b6cf275db62f8da34019a7d23f4ef990abff723a3c6ab232aee8f2ab636e53ca7dbe5731552baf2d38600292227d106088e0fc50552bdb
-
Filesize
3.3MB
MD5604933b6c71c55c8a9ee9333c4886fb7
SHA1ff6245b45e99c97a6ba599644d8ea727eb9b157f
SHA256c2d438f1e28a3a15802b7835446bf9b7f322af1e459b6a2904f172fe1b773e48
SHA512ca7117e2417eb42bea03b3c18206a588f886348d96fec187f3b912c35a3c2c901ae63a0c7b3448b5f36df3cbea2cc407fb709b1cd6bc364a3c896e0effb93667
-
Filesize
3.3MB
MD5999775f23647822d4226cdbf9ee02a3b
SHA1aae0fde84b23bfed25c3d639336f54f0a6f334b4
SHA25611b87eb68d8c7bbc77523f06d62662442145fb1a74e675dde59f5c475ff96296
SHA512e6060c99a035c43dacbcfaa032d9366c2e4626b719b6fd8b3a0db996e33f1067586c0403a8678b56f2a7a702778e1525fbeff91583a34610d2e9754794243144
-
Filesize
3.3MB
MD56ad32c522d36019a0f473afabcd65c84
SHA17fd96f4adb9c213cd40b601015715c760a76ea59
SHA2564762c31a5242f147a7a2e20ca8acb7c2efe8a5d4c46256f478f0fc7597360811
SHA5127789ca3393e1870b7ce06825676ed9b198796dee919cf4cf7790cc2e7c37d09f00b193419d4f403bee1b42cc305e95fe0d4f8651e8824ab7e1828f53bf626e11