Analysis
-
max time kernel
141s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe
Resource
win10v2004-20241007-en
General
-
Target
54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe
-
Size
1.7MB
-
MD5
e1b5974f42b0b3a7b1f3127a441e60cf
-
SHA1
e6b54471231659e339b591a6fd0cd42f89f9c57f
-
SHA256
54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787
-
SHA512
609b87f1facd68f3c2b8e6750b97dae2912958e6ea245dedf5e693db81ab87ccabee7e511475cdfcb22b6bcabf86473be7127fd12e71e356f1becfd7f305756a
-
SSDEEP
24576:rVCAkMVlNznPyYe3zvGtGLosZDRjmXDs9VpsmNkhXpc2JW3zGI7:ZCAlNb4StGLosZpAw9oTcpqU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation acrotray .exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation acrotray.exe -
Executes dropped EXE 4 IoCs
pid Process 3236 acrotray.exe 1892 acrotray.exe 4832 acrotray .exe 4452 acrotray .exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "C:\\Program Files (x86)\\Adobe\\acrotray.exe" 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\acrotray .exe 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe File created C:\Program Files (x86)\Adobe\acrotray.exe 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acrotray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acrotray .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1482211708" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000013dbeb74f69550459d232b3693c378ca000000000200000000001066000000010000200000009ed385383de408e73fb61d24dc56442a2a0d2c2d55d54429c32099d2a6af9cd4000000000e80000000020000200000007b17550af30b525dd70392a7b127db058309d45cb2cf32d00a7f55ea2ab9903b2000000077239083731840c714f3d045ec643754ff4877c773be27060cc99e3d14b1596d40000000e0997b441be7c07e091312dfaf1a60695ce9b050710ef30231d5eb3db3266cffaeb3a85fe1922600967bc979c4e2309691c1dac79e1ee191bbc6b3f7f1cc32ac iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31136399" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000013dbeb74f69550459d232b3693c378ca00000000020000000000106600000001000020000000947cfd58333996f17ea5e55ba09ab519fdec90d1c8a59b357c5085616cf9aeb2000000000e800000000200002000000039cbe6424cc30c90d06c9d1fe1f3a17d1880181e06349e0ea389428aafc32a7720000000bcc0649541cb0b30d4de0c1919026278b5a01f26b056e943e6a49103e2d74abf4000000049d496561250ab90bcebefe4adc13da8da92fb9857d9bbc776e6a2ad0a6718eb5c57e13a7aaa311170a324023c3f9c6410ba853da757e3442a1df2058f2e9148 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{83D9BD48-8682-11EF-BDBF-622000771059} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1482211708" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304b43608f1adb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136399" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bebd578f1adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4600 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 4600 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 4600 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 4600 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 4600 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 4600 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 3236 acrotray.exe 3236 acrotray.exe 3236 acrotray.exe 3236 acrotray.exe 1892 acrotray.exe 1892 acrotray.exe 1892 acrotray.exe 1892 acrotray.exe 3236 acrotray.exe 3236 acrotray.exe 4832 acrotray .exe 4832 acrotray .exe 4832 acrotray .exe 4832 acrotray .exe 4832 acrotray .exe 4832 acrotray .exe 4452 acrotray .exe 4452 acrotray .exe 4452 acrotray .exe 4452 acrotray .exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1892 acrotray.exe 1892 acrotray.exe 4452 acrotray .exe 4452 acrotray .exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1892 acrotray.exe 1892 acrotray.exe 4452 acrotray .exe 4452 acrotray .exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1892 acrotray.exe 1892 acrotray.exe 4452 acrotray .exe 4452 acrotray .exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1892 acrotray.exe 1892 acrotray.exe 4452 acrotray .exe 4452 acrotray .exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1892 acrotray.exe 1892 acrotray.exe 4452 acrotray .exe 4452 acrotray .exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 1892 acrotray.exe 1892 acrotray.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4600 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe Token: SeDebugPrivilege 1484 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe Token: SeDebugPrivilege 3236 acrotray.exe Token: SeDebugPrivilege 1892 acrotray.exe Token: SeDebugPrivilege 4832 acrotray .exe Token: SeDebugPrivilege 4452 acrotray .exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 4544 IEXPLORE.EXE 4544 IEXPLORE.EXE 2516 iexplore.exe 2516 iexplore.exe 952 IEXPLORE.EXE 952 IEXPLORE.EXE 2516 iexplore.exe 2516 iexplore.exe 4964 IEXPLORE.EXE 4964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4600 wrote to memory of 1484 4600 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 86 PID 4600 wrote to memory of 1484 4600 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 86 PID 4600 wrote to memory of 1484 4600 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 86 PID 4600 wrote to memory of 3236 4600 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 87 PID 4600 wrote to memory of 3236 4600 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 87 PID 4600 wrote to memory of 3236 4600 54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe 87 PID 3236 wrote to memory of 1892 3236 acrotray.exe 90 PID 3236 wrote to memory of 1892 3236 acrotray.exe 90 PID 3236 wrote to memory of 1892 3236 acrotray.exe 90 PID 3236 wrote to memory of 4832 3236 acrotray.exe 91 PID 3236 wrote to memory of 4832 3236 acrotray.exe 91 PID 3236 wrote to memory of 4832 3236 acrotray.exe 91 PID 2516 wrote to memory of 4544 2516 iexplore.exe 93 PID 2516 wrote to memory of 4544 2516 iexplore.exe 93 PID 2516 wrote to memory of 4544 2516 iexplore.exe 93 PID 4832 wrote to memory of 4452 4832 acrotray .exe 94 PID 4832 wrote to memory of 4452 4832 acrotray .exe 94 PID 4832 wrote to memory of 4452 4832 acrotray .exe 94 PID 2516 wrote to memory of 952 2516 iexplore.exe 101 PID 2516 wrote to memory of 952 2516 iexplore.exe 101 PID 2516 wrote to memory of 952 2516 iexplore.exe 101 PID 2516 wrote to memory of 4964 2516 iexplore.exe 102 PID 2516 wrote to memory of 4964 2516 iexplore.exe 102 PID 2516 wrote to memory of 4964 2516 iexplore.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe"C:\Users\Admin\AppData\Local\Temp\54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe"C:\Users\Admin\AppData\Local\Temp\54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe" C:\Users\Admin\AppData\Local\Temp\54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
C:\Program Files (x86)\Adobe\acrotray.exe"C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Program Files (x86)\Adobe\acrotray.exe"C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Program Files (x86)\Adobe\acrotray .exe"C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files (x86)\Adobe\acrotray .exe"C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\54f13168b72256e51b75f0be4f6d92343feedde2ca2b0d8e3caeb48a47e85787.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:4148
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4544
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:17416 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:952
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:17424 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD546da8a01002c304dcc9e13fac05a2a32
SHA182fa037a4ebabf9fa8052e206fe5939314ebbf94
SHA256d8afeed44701c5028b603e38cf7ff202f855c4ab4daab83059c9a908a01b9ded
SHA512742cff51362ca1cf8c23873264af4219eacfe04739292c4df8d14f30c08da98d523887dc5ed1a0e34597ca861990a6a3215ccec90ff3c42e1c2488e195c6cc67
-
Filesize
1.7MB
MD53e270dc53f047608883dea3438a0078f
SHA1945b6c31ee313c1cbe8f48f83ba9a99e00f99d71
SHA256534f85bbc7443bf164be6ac17a2ce5899800dc911ef091452946e3959a65d429
SHA512b2eb6c452beca842a22237ea71447135f06c6a52a76c9f5623def644c23c088e9469b4628d2ec82560cd40ad42b18e3d6bafef9769b6f16ccf191f9f1139e0e9
-
Filesize
33KB
MD5285520bc859a840449187cc43864a1cb
SHA13d85ac9801d3cc9a3577bc6f6ef3c754d2677dff
SHA256ac8e37a73437f2c13789726ea053c21fcdfd485896aabd6498702064968e34da
SHA5127d99e9b95ed4fdc8a510b3830e7948be99d55edfac91ec71c4c7e534176a25ebe48c1955dc39a950f1a3322ef7d18910048c16492ebb9ff54d517a294602d6a5