Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe
Resource
win10v2004-20240802-en
General
-
Target
0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe
-
Size
3.0MB
-
MD5
09626291258bc4cb0b6d753e0dd49cd8
-
SHA1
810c8626a2dc55dfcf288139234651a917823a0e
-
SHA256
0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2
-
SHA512
8ef894481431a19a556393b7f5fdbc999eaa5e9bb9007369cda63e5656227bcb534701b2eae63fe59fc5e6bc77f49e6dff7dc2c7627d1b749f991e225a7081ec
-
SSDEEP
49152:E7LwANQ2ZNy5GBHW8PpSvItiqpMir3y3zmwTzBo2T4wEQ431dAw+Bsq3d7dbn:6LJuMWWlt3Mijy3zJTzJID1dAws739p
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation acrotray.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation acrotray .exe -
Executes dropped EXE 4 IoCs
pid Process 1116 acrotray.exe 1516 acrotray.exe 752 acrotray .exe 2532 acrotray .exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "C:\\Program Files (x86)\\Adobe\\acrotray.exe" 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1116 acrotray.exe 1516 acrotray.exe 752 acrotray .exe 2532 acrotray .exe 1116 acrotray.exe 752 acrotray .exe 2532 acrotray .exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1116 acrotray.exe 752 acrotray .exe 2532 acrotray .exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1116 acrotray.exe 752 acrotray .exe 2532 acrotray .exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1116 acrotray.exe 752 acrotray .exe 2532 acrotray .exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1116 acrotray.exe 752 acrotray .exe 2532 acrotray .exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1116 acrotray.exe 752 acrotray .exe 2532 acrotray .exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1116 acrotray.exe 752 acrotray .exe 2532 acrotray .exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1116 acrotray.exe 752 acrotray .exe 2532 acrotray .exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1116 acrotray.exe 752 acrotray .exe 2532 acrotray .exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\acrotray .exe 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe File created C:\Program Files (x86)\Adobe\acrotray.exe 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acrotray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acrotray .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acrotray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acrotray .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31125114" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000101e57aeeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{0A06AA2D-5A6E-11EF-939B-762C928CCA03} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003d1c6f3067c0c84abb3839afa92ebb0f00000000020000000000106600000001000020000000aed69ebd057bd8b180947822904f0646a08cd6a5c1c8f49213e03c31d2e11bf9000000000e80000000020000200000003991d9f1200adc78db267801c7421addfc3fce77bfdcd5fc4a1e30b8d81fe4bd20000000c289d714e9a29de29ede5d687cfacb628b4f1711c5743ca614da98137e9b658b4000000052f52895d55c9fb3174b0b3a2e07cd549d966182c47f69cf0d3b91b2cc4684d257d2d437867d421976535afe4985e236e98cda56461ca8ddef8ea7628e6cf407 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31125114" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3730958164" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003d1c6f3067c0c84abb3839afa92ebb0f00000000020000000000106600000001000020000000ae914e429959ca81ee72db9bd7600ebe4d1fb45c1916cdf129ef1253adc4b004000000000e8000000002000020000000c021603629104feb78a09ee82de824664378713139a8e7d142f4c64acdc845b02000000038944f69bd9ebfecf7cafad42394767837fabb2757425cf573b90d29c5280614400000007971748899dfed80c02d85a701bdf795c3896972f7e8d5a4a65775dc0d504666284bcfda42ddf507d18e40e517f206a6b1187e3087eb4b3f40c6e417f385dc5b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0801ddd7aeeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3730958164" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1116 acrotray.exe 1116 acrotray.exe 1116 acrotray.exe 1116 acrotray.exe 1116 acrotray.exe 1116 acrotray.exe 752 acrotray .exe 752 acrotray .exe 752 acrotray .exe 752 acrotray .exe 1516 acrotray.exe 1516 acrotray.exe 1516 acrotray.exe 1516 acrotray.exe 752 acrotray .exe 752 acrotray .exe 2532 acrotray .exe 2532 acrotray .exe 2532 acrotray .exe 2532 acrotray .exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1516 acrotray.exe 2532 acrotray .exe 2532 acrotray .exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1516 acrotray.exe 2532 acrotray .exe 2532 acrotray .exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1516 acrotray.exe 2532 acrotray .exe 2532 acrotray .exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1516 acrotray.exe 2532 acrotray .exe 2532 acrotray .exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1516 acrotray.exe 2532 acrotray .exe 2532 acrotray .exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1516 acrotray.exe 1516 acrotray.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe Token: SeDebugPrivilege 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe Token: SeDebugPrivilege 1116 acrotray.exe Token: SeDebugPrivilege 752 acrotray .exe Token: SeDebugPrivilege 1516 acrotray.exe Token: SeDebugPrivilege 2532 acrotray .exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 516 iexplore.exe 516 iexplore.exe 516 iexplore.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1304 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 1116 acrotray.exe 516 iexplore.exe 516 iexplore.exe 4372 IEXPLORE.EXE 4372 IEXPLORE.EXE 1516 acrotray.exe 752 acrotray .exe 2532 acrotray .exe 516 iexplore.exe 516 iexplore.exe 976 IEXPLORE.EXE 976 IEXPLORE.EXE 516 iexplore.exe 516 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4560 wrote to memory of 1304 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 87 PID 4560 wrote to memory of 1304 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 87 PID 4560 wrote to memory of 1304 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 87 PID 4560 wrote to memory of 1116 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 95 PID 4560 wrote to memory of 1116 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 95 PID 4560 wrote to memory of 1116 4560 0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe 95 PID 516 wrote to memory of 4372 516 iexplore.exe 98 PID 516 wrote to memory of 4372 516 iexplore.exe 98 PID 516 wrote to memory of 4372 516 iexplore.exe 98 PID 1116 wrote to memory of 1516 1116 acrotray.exe 99 PID 1116 wrote to memory of 1516 1116 acrotray.exe 99 PID 1116 wrote to memory of 1516 1116 acrotray.exe 99 PID 1116 wrote to memory of 752 1116 acrotray.exe 100 PID 1116 wrote to memory of 752 1116 acrotray.exe 100 PID 1116 wrote to memory of 752 1116 acrotray.exe 100 PID 752 wrote to memory of 2532 752 acrotray .exe 101 PID 752 wrote to memory of 2532 752 acrotray .exe 101 PID 752 wrote to memory of 2532 752 acrotray .exe 101 PID 516 wrote to memory of 976 516 iexplore.exe 105 PID 516 wrote to memory of 976 516 iexplore.exe 105 PID 516 wrote to memory of 976 516 iexplore.exe 105 PID 516 wrote to memory of 3024 516 iexplore.exe 106 PID 516 wrote to memory of 3024 516 iexplore.exe 106 PID 516 wrote to memory of 3024 516 iexplore.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe"C:\Users\Admin\AppData\Local\Temp\0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe"C:\Users\Admin\AppData\Local\Temp\0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe" C:\Users\Admin\AppData\Local\Temp\0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1304
-
-
C:\Program Files (x86)\Adobe\acrotray.exe"C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files (x86)\Adobe\acrotray.exe"C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1516
-
-
C:\Program Files (x86)\Adobe\acrotray .exe"C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Program Files (x86)\Adobe\acrotray .exe"C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\0eb0169f4962d2fcf2866ec64d4ff15f6b20149d59203b82470fd918136515f2.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2532
-
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:3000
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:516 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4372
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:516 CREDAT:17416 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:976
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:516 CREDAT:17424 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5a52b5602dc7e83621f513b4ef5590355
SHA1748096c7458742d2b4779bca45bc79dcafc61476
SHA256d7bdae3f8c8ceec76d9af7bf6f9b271b9050e82eedda77545435f92c8eec25be
SHA5120766ed89b8b53c71f0d3eced318f1eb5300925851291467c61f2d80dcc1f6b041b7504fbb2f3c346286e4e788e32f221a4953464d0655741312939469243a2f7
-
Filesize
3.0MB
MD5ea788cb96f75aabaead1cf34d0213bc3
SHA1c5594ef97629d74540bce1fada6041e79e575403
SHA25678ee21594340a3e70b64ccd69d89aa9f40968684da72f220ab2b02ed859c0c32
SHA51216d8019a0c94fe61cc516cb00746df148367776254c04e18ecaa7eb30e55534414e383393172ac1d5aa2805b191c999a1adca31b795022639c66642f9d5a739e