Overview
overview
10Static
static
10229da05be0...18.exe
windows7-x64
7229da05be0...18.exe
windows10-2004-x64
7!...��.exe
windows7-x64
3!...��.exe
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/XML.dll
windows7-x64
3$PLUGINSDIR/XML.dll
windows10-2004-x64
3CrashReporter.exe
windows7-x64
3CrashReporter.exe
windows10-2004-x64
3Incoming/M...�].url
windows7-x64
1Incoming/M...�].url
windows10-2004-x64
1Incoming/M...MV.url
windows7-x64
1Incoming/M...MV.url
windows10-2004-x64
1Incoming/�...��.url
windows7-x64
1Incoming/�...��.url
windows10-2004-x64
1MP2PLoader.exe
windows7-x64
1MP2PLoader.exe
windows10-2004-x64
3MTVP2P_phone.js
windows7-x64
3MTVP2P_phone.js
windows10-2004-x64
3MediaInfo.dll
windows7-x64
3MediaInfo.dll
windows10-2004-x64
3MtvP2P.exe
windows7-x64
6MtvP2P.exe
windows10-2004-x64
6Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 16:51
Behavioral task
behavioral1
Sample
229da05be0a100309faa895327f9ddad_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
229da05be0a100309faa895327f9ddad_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
!Զװ_Զ_��.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
!Զװ_Զ_��.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Blowfish.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Blowfish.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/Locate.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/Locate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/XML.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/XML.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
CrashReporter.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
CrashReporter.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Incoming/MTV2012-°[ٷվ].url
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Incoming/MTV2012-°[ٷվ].url
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Incoming/MTVؾ.MVȫ.MV.MV.url
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Incoming/MTVؾ.MVȫ.MV.MV.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Incoming/Աר.֧Ƿ..url
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Incoming/Աר.֧Ƿ..url
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
MP2PLoader.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
MP2PLoader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
MTVP2P_phone.js
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
MTVP2P_phone.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
MediaInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
MediaInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
MtvP2P.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
MtvP2P.exe
Resource
win10v2004-20241007-en
General
-
Target
MtvP2P.exe
-
Size
5.9MB
-
MD5
c256532149bb511a5616b660f1792c3a
-
SHA1
26d0add6702f18a03b365aec9d95683842a29d59
-
SHA256
05ba9c02c7871c980a873c7b0f935323f49875a3a536694ddd4f54626c76ca0c
-
SHA512
d0dfcaef2e0d883c64ede884e224751a5123d9d7593046089cc469f00bfb9e4f592fdfd9c7caa667efb7b5a8681bb681606b1a68bc87446a9b013ac3e49f25c5
-
SSDEEP
98304:xMGbGTwx49Y7GbHxjtM4wZEx+LYx73CBqGtSfo01T:0wriB8Z2ObKT
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\eMuleAutoStart = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MtvP2P.exe -AutoStart" MtvP2P.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{0A0DDBD3-6641-40B9-873F-BBDD26D6C14E} MtvP2P.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MtvP2P.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MenuExt\使用MTV分享精灵下载\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IE2EM.htm" MtvP2P.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MenuExt\使用MTV分享精灵下载\Contexts = "34" MtvP2P.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main MtvP2P.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DownloadUI = "{A0867FD1-79E7-456C-8B41-165A2504FD86}" MtvP2P.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MenuExt MtvP2P.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MenuExt\使用MTV分享精灵下载 MtvP2P.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kp2p\DefaultIcon MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\IE2EM.DLL MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D15FB88E-B87E-43D1-87C2-D5FF5FA33002} MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{DE1A243C-C7CB-4543-AC32-A2D2CA879663}\ProxyStubClsid32 MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ed2k\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MP2PLoader.exe" MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MtvP2P\shell MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mp2p\DefaultIcon MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MtvP2Pmetfile\Shell MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DM.EMDM\CurVer\ = "DM.EMDM.1" MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48618374-565F-4CA0-B8CD-6F496C997FAF}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F59B9BF7-9A25-4610-B059-4431AB20C3FF}\TypeLib\ = "{8F5497A2-6C8C-45EA-87BC-5A76F2F5E28B}" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ed2k\URL Protocol MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A0DDBD3-6641-40B9-873F-BBDD26D6C14E}\Implemented Categories MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE2EM.IE2EMUrlTaker.1 MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE2EM.IE2EMUrlTaker\CLSID MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE2EM.IE2EMUrlTaker\CLSID\ = "{48618374-565F-4CA0-B8CD-6F496C997FAF}" MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.part MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MtvP2Ppartfile MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D15FB88E-B87E-43D1-87C2-D5FF5FA33002}\VersionIndependentProgID MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F59B9BF7-9A25-4610-B059-4431AB20C3FF}\ = "IIE2EMBHO" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F59B9BF7-9A25-4610-B059-4431AB20C3FF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A0DDBD3-6641-40B9-873F-BBDD26D6C14E}\AppID = "{BCEADC2F-0C89-43F5-8DE9-068B5BC265E2}" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{DE1A243C-C7CB-4543-AC32-A2D2CA879663}\ = "IIE2EMUrlTaker" MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MtvP2Ppartfile\Shell MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MtvP2Pmetfile MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A0867FD1-79E7-456C-8B41-165A2504FD86}\AppID = "{BCEADC2F-0C89-43F5-8DE9-068B5BC265E2}" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.IE2EMBHO.1\CLSID\ = "{0A0DDBD3-6641-40B9-873F-BBDD26D6C14E}" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.IE2EMBHO\CLSID\ = "{0A0DDBD3-6641-40B9-873F-BBDD26D6C14E}" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.IE2EMBHO\CurVer\ = "BHO.IE2EMBHO.1" MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.IE2EMBHO.1 MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.IE2EMBHO\CurVer MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A0DDBD3-6641-40B9-873F-BBDD26D6C14E}\TypeLib\ = "{8F5497A2-6C8C-45EA-87BC-5A76F2F5E28B}" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48618374-565F-4CA0-B8CD-6F496C997FAF}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\modules\\IE2EM.dll" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MtvP2P\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\MtvP2P.exe\" \"%1\"" MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DM.EMDM\CurVer MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A0867FD1-79E7-456C-8B41-165A2504FD86}\InprocServer32 MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DE1A243C-C7CB-4543-AC32-A2D2CA879663}\ProxyStubClsid32 MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ed2k\shell MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ed2k\shell\open MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mp2p\shell MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{BCEADC2F-0C89-43F5-8DE9-068B5BC265E2}\ = "IE2EM" MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D15FB88E-B87E-43D1-87C2-D5FF5FA33002}\TypeLib MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DE1A243C-C7CB-4543-AC32-A2D2CA879663}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F59B9BF7-9A25-4610-B059-4431AB20C3FF}\ = "IIE2EMBHO" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mp2p\ = "URL: mp2p Protocol" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kp2p\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MP2PLoader.exe" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kp2p\ = "URL: kp2p Protocol" MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE2EM.IE2EMUrlTaker.1\CLSID MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48618374-565F-4CA0-B8CD-6F496C997FAF}\Implemented Categories MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D15FB88E-B87E-43D1-87C2-D5FF5FA33002}\ProgID\ = "BHO.ProtMon.1" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D15FB88E-B87E-43D1-87C2-D5FF5FA33002}\TypeLib\ = "{8F5497A2-6C8C-45EA-87BC-5A76F2F5E28B}" MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MtvP2P MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kp2p\shell\open\command MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MtvP2Ppartfile\Shell\Open\Command MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DM.EMDM.1 MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.IE2EMBHO MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE2EM.IE2EMUrlTaker.1\ = "IE2EMUrlTaker Class" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MtvP2Ppartfile\ = "MtvP2Ppartfile" MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48618374-565F-4CA0-B8CD-6F496C997FAF}\VersionIndependentProgID\ = "IE2EM.IE2EMUrlTaker" MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48618374-565F-4CA0-B8CD-6F496C997FAF}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D15FB88E-B87E-43D1-87C2-D5FF5FA33002}\Implemented Categories MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DE1A243C-C7CB-4543-AC32-A2D2CA879663} MtvP2P.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DE1A243C-C7CB-4543-AC32-A2D2CA879663}\TypeLib\Version = "1.0" MtvP2P.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.met MtvP2P.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe -
Suspicious use of SetWindowsHookEx 38 IoCs
pid Process 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 1892 MtvP2P.exe 2672 updater.exe 2672 updater.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2672 1892 MtvP2P.exe 32 PID 1892 wrote to memory of 2672 1892 MtvP2P.exe 32 PID 1892 wrote to memory of 2672 1892 MtvP2P.exe 32 PID 1892 wrote to memory of 2672 1892 MtvP2P.exe 32 PID 1892 wrote to memory of 2672 1892 MtvP2P.exe 32 PID 1892 wrote to memory of 2672 1892 MtvP2P.exe 32 PID 1892 wrote to memory of 2672 1892 MtvP2P.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\MtvP2P.exe"C:\Users\Admin\AppData\Local\Temp\MtvP2P.exe"1⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\updater.exeupdater.exe -checkforupdates2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD5c36685fdc1b9a56002040854db2d653e
SHA1f83c507c53e69a3e6a9d195d884c88424c68fec3
SHA25683eafc118ee2ef9073ef3ce2a22a49fe47a950df022806a23ab07bb889db1d6f
SHA51235da87fac37efa2df13f4c5c1aabfbbbb3121fda9a288a1ce7420f84608c859a7effb05672d73b5b1346984e7b5b3e77f9cb1140adbfdebaa8e0b246647eb760
-
Filesize
1KB
MD5063e13b271822dfe9a1fec7a970d13e4
SHA115d079cbc32eb48d94aaccd2bd2bac2dbaecd3dc
SHA256d8979e399efa0df1bf2f7fb69fa24c7ea202e35f0525d9b53c73232ef3dffb59
SHA512c85fdcfd17e245ec81878a7a1bc732e8d4789a8da539e2bacf8ff7e3fc95e841054bc4e60340fb7994f61b0253b8325e32afcb13044b041dc73915e176bf95ef
-
Filesize
1KB
MD5961c1402c1bb856cca8f7928df96f547
SHA1176dbcd34f76ee9669c16bfd175dfe17a1a5efc5
SHA2560e243cdfe910dbbd99290c333ee5bbfc994ecf95b272fe9b8d75034670b5823e
SHA5122fd011fe2d89ffa83dc1167695e954a310054026d66c6c0771d9ab3752d55bacf88fc9338c13b6201594824a013d94e158a4e8954eeb417828202ec4308c8abd