Overview
overview
10Static
static
90x00010000...55.exe
windows7-x64
10x00010000...55.exe
windows10-2004-x64
30x00010000...47.exe
windows7-x64
30x00010000...47.exe
windows10-2004-x64
30x00010000...70.exe
windows7-x64
70x00010000...70.exe
windows10-2004-x64
70x00010000...13.exe
windows7-x64
70x00010000...13.exe
windows10-2004-x64
70x00020000...73.exe
windows7-x64
90x00020000...73.exe
windows10-2004-x64
90x00020000...83.exe
windows7-x64
100x00020000...83.exe
windows10-2004-x64
100x00020000...36.exe
windows7-x64
80x00020000...36.exe
windows10-2004-x64
80x00020000...40.exe
windows7-x64
100x00020000...40.exe
windows10-2004-x64
100x00030000...09.exe
windows7-x64
100x00030000...09.exe
windows10-2004-x64
100x00030000...22.exe
windows7-x64
100x00030000...22.exe
windows10-2004-x64
100x00030000...26.exe
windows7-x64
100x00030000...26.exe
windows10-2004-x64
100x00030000...34.exe
windows7-x64
100x00030000...34.exe
windows10-2004-x64
100x00030000...06.exe
windows7-x64
100x00030000...06.exe
windows10-2004-x64
100x00030000...41.exe
windows7-x64
30x00030000...41.exe
windows10-2004-x64
30x00030000...45.exe
windows7-x64
100x00030000...45.exe
windows10-2004-x64
100x00030000...48.exe
windows7-x64
70x00030000...48.exe
windows10-2004-x64
7Analysis
-
max time kernel
120s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 08:10
Behavioral task
behavioral1
Sample
0x000100000001ab86-55.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0x000100000001ab86-55.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
0x000100000001ab87-47.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
0x000100000001ab87-47.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
0x000100000001ab9c-70.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
0x000100000001ab9c-70.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
0x000100000001ad02-313.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
0x000100000001ad02-313.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
0x000200000001aca8-173.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
0x000200000001aca8-173.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
0x000200000001acb5-183.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
0x000200000001acb5-183.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
0x000200000001acdf-236.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
0x000200000001acdf-236.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
0x000200000001ace9-240.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
0x000200000001ace9-240.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
0x000300000001a5a2-209.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
0x000300000001a5a2-209.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
0x000300000001ac90-122.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
0x000300000001ac90-122.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
0x000300000001ac99-126.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
0x000300000001ac99-126.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
0x000300000001ac9e-134.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
0x000300000001ac9e-134.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
0x000300000001ac9e-206.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
0x000300000001ac9e-206.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
0x000300000001ac9f-141.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
0x000300000001ac9f-141.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
0x000300000001acec-245.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
0x000300000001acec-245.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
0x000300000001aced-248.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
0x000300000001aced-248.exe
Resource
win10v2004-20241007-en
General
-
Target
0x000100000001ab9c-70.exe
-
Size
977KB
-
MD5
5c6684e8c2b678de9e2776c6b50ddd72
-
SHA1
7d255100d811de745e6ee908d1e0f8ba4ff21add
-
SHA256
bb5d2c07ce902c78227325bf5f336c04335874445fc0635a6b67ae5ba9d2fefc
-
SHA512
f627ca67610f9d5c137bdae8b3f8f6c08ff9162d12b3e30d3886c72aec047d34e31b5f0e17120dc99d71b0c316e43bb946fc5d40a9babec7229ce3a3c9292acb
-
SSDEEP
24576:AyImjLox0UGnen302pqa5ugHd+XfyvS+x8eoSg1vpADsF:Ayju0U8e302pcgHd+X66+twvpr
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2556 0x000100000001ab9c-70.tmp 2496 seed.sfx.exe 1508 seed.exe -
Loads dropped DLL 15 IoCs
pid Process 2520 0x000100000001ab9c-70.exe 2556 0x000100000001ab9c-70.tmp 2556 0x000100000001ab9c-70.tmp 2556 0x000100000001ab9c-70.tmp 2496 seed.sfx.exe 2496 seed.sfx.exe 2496 seed.sfx.exe 2496 seed.sfx.exe 2496 seed.sfx.exe 1508 seed.exe 1076 WerFault.exe 1076 WerFault.exe 1076 WerFault.exe 1076 WerFault.exe 1076 WerFault.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 3 iplogger.org 6 iplogger.org 7 iplogger.org -
Drops file in Program Files directory 36 IoCs
description ioc Process File created C:\Program Files (x86)\RearRips\unins000.dat 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\is-V3VHF.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\is-51IRH.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\is-E4B6Q.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-JMUNV.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-8KON9.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-UHK04.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\lang\is-QCQ3G.tmp 0x000100000001ab9c-70.tmp File opened for modification C:\Program Files (x86)\Seed Trade\Seed seed.sfx.exe File created C:\Program Files (x86)\Seed Trade\Seed\__tmp_rar_sfx_access_check_259439818 seed.sfx.exe File opened for modification C:\Program Files (x86)\RearRips\seed.sfx.exe 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\is-DKM9N.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\is-5K7R1.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-JI3R1.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\is-431A9.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-B5QLL.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\lang\is-MAL8M.tmp 0x000100000001ab9c-70.tmp File opened for modification C:\Program Files (x86)\Seed Trade seed.sfx.exe File created C:\Program Files (x86)\RearRips\is-IDUL9.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-DB7BI.tmp 0x000100000001ab9c-70.tmp File opened for modification C:\Program Files (x86)\RearRips\unins000.dat 0x000100000001ab9c-70.tmp File opened for modification C:\Program Files (x86)\RearRips\DreamTrip.exe 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-QHGO9.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-T1R43.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-9V8IF.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-D8JQI.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-RRVL5.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\Seed Trade\Seed\seed.exe seed.sfx.exe File opened for modification C:\Program Files (x86)\Seed Trade\Seed\seed.exe seed.sfx.exe File created C:\Program Files (x86)\RearRips\is-H0L5L.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-1988V.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-NES48.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-GCTQU.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\is-A9K7R.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-5JUT0.tmp 0x000100000001ab9c-70.tmp File created C:\Program Files (x86)\RearRips\images\is-NUMD0.tmp 0x000100000001ab9c-70.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1076 1508 WerFault.exe 36 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seed.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0x000100000001ab9c-70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0x000100000001ab9c-70.tmp -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000004b1e3d29e435129f8f66b09d01e1936018d411e24560699999c4867984c9bc99000000000e800000000200002000000036c77b900f5aadcd1eb1fdeaf27c4430ebcbfd9b8854c669c06b2c3765c2901d2000000073a0ded974ab3a81c0d89ead4aeaaf6b03a06a279facb308ee1bf4d00766edc84000000013b7d0f42483cd91c777238c88f448ca56fa0baa249c5a3b924909f12d4149e4f65aa66dc9a0e6a5a8ab154741e4e80ddc168000cb4ec223b4213b2c969e4db0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436956128" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e977575a2fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E9CEFC1-9B4D-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2556 0x000100000001ab9c-70.tmp 2556 0x000100000001ab9c-70.tmp -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2556 0x000100000001ab9c-70.tmp 756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 756 iexplore.exe 756 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2556 2520 0x000100000001ab9c-70.exe 30 PID 2520 wrote to memory of 2556 2520 0x000100000001ab9c-70.exe 30 PID 2520 wrote to memory of 2556 2520 0x000100000001ab9c-70.exe 30 PID 2520 wrote to memory of 2556 2520 0x000100000001ab9c-70.exe 30 PID 2520 wrote to memory of 2556 2520 0x000100000001ab9c-70.exe 30 PID 2520 wrote to memory of 2556 2520 0x000100000001ab9c-70.exe 30 PID 2520 wrote to memory of 2556 2520 0x000100000001ab9c-70.exe 30 PID 2556 wrote to memory of 2496 2556 0x000100000001ab9c-70.tmp 31 PID 2556 wrote to memory of 2496 2556 0x000100000001ab9c-70.tmp 31 PID 2556 wrote to memory of 2496 2556 0x000100000001ab9c-70.tmp 31 PID 2556 wrote to memory of 2496 2556 0x000100000001ab9c-70.tmp 31 PID 2556 wrote to memory of 2616 2556 0x000100000001ab9c-70.tmp 32 PID 2556 wrote to memory of 2616 2556 0x000100000001ab9c-70.tmp 32 PID 2556 wrote to memory of 2616 2556 0x000100000001ab9c-70.tmp 32 PID 2556 wrote to memory of 2616 2556 0x000100000001ab9c-70.tmp 32 PID 2616 wrote to memory of 756 2616 cmd.exe 34 PID 2616 wrote to memory of 756 2616 cmd.exe 34 PID 2616 wrote to memory of 756 2616 cmd.exe 34 PID 2616 wrote to memory of 756 2616 cmd.exe 34 PID 756 wrote to memory of 2816 756 iexplore.exe 35 PID 756 wrote to memory of 2816 756 iexplore.exe 35 PID 756 wrote to memory of 2816 756 iexplore.exe 35 PID 756 wrote to memory of 2816 756 iexplore.exe 35 PID 2496 wrote to memory of 1508 2496 seed.sfx.exe 36 PID 2496 wrote to memory of 1508 2496 seed.sfx.exe 36 PID 2496 wrote to memory of 1508 2496 seed.sfx.exe 36 PID 2496 wrote to memory of 1508 2496 seed.sfx.exe 36 PID 1508 wrote to memory of 1076 1508 seed.exe 37 PID 1508 wrote to memory of 1076 1508 seed.exe 37 PID 1508 wrote to memory of 1076 1508 seed.exe 37 PID 1508 wrote to memory of 1076 1508 seed.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x000100000001ab9c-70.exe"C:\Users\Admin\AppData\Local\Temp\0x000100000001ab9c-70.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\is-4928Q.tmp\0x000100000001ab9c-70.tmp"C:\Users\Admin\AppData\Local\Temp\is-4928Q.tmp\0x000100000001ab9c-70.tmp" /SL5="$5012A,748569,121344,C:\Users\Admin\AppData\Local\Temp\0x000100000001ab9c-70.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\RearRips\seed.sfx.exe"C:\Program Files (x86)\RearRips\seed.sfx.exe" -pK2j8l614 -s13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Seed Trade\Seed\seed.exe"C:\Program Files (x86)\Seed Trade\Seed\seed.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 1285⤵
- Loads dropped DLL
- Program crash
PID:1076
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/14Zhe7"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/14Zhe74⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796KB
MD57ec2dc7b1f8f981bda11868fd9493234
SHA14a4ee59a6b9ea0ae9c609386581463e1a0294133
SHA2561de138bb3e707b6d6e0c8f5242444ff9f1c84882d18a00e3da36a8547f6343c9
SHA512f985453c1c4049c00e75891bd4159765ac59f0040c6ee99d179b5719ef392911a25eb3194b82b3172a0852657feb20ebfb2fa91abe65f82357a4b9b2368f820e
-
Filesize
422KB
MD5440025c27c8de30f7ee0b415726b5a02
SHA1877e3682135de61ec241c16fe258a1a5906f20e2
SHA256a31cc4bf3dbead273e545711926580b65ff3c9d68f4e3103e3bfd28681fe81cd
SHA51244396a1f77bf14e541502b9ff9f8d251e029ee6de05f1db62bacb7111d42a912b3085395229b0cc8f92704519cc4efabfe0b62b5272e1fc03df0974f8fa1e5dc
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD540351dfc023c8991675b334fa7369512
SHA1a489f89cef3723b4be0a9aceeeeca2cac25aaef6
SHA256fb4dcb199a05d3788aa977323d1fea444b0f8054ef83881cbc75af734006561a
SHA51292d800d36cc7216a1ffb866326f5afdd284811484e7fb9c5686001add29d0659251ff48d59c5f9993824128f56761287021ed7954a4beb0a22afc3ee958a396f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff948f81c78970194a71854de4f53b40
SHA13b2cfcdd4a7d3715506450dc4a3fd251b494f0e3
SHA256ff555a2322c425a5ce7a18ad90650fad04edacbbf7639b440f5bda64d01efef8
SHA5125e1b6e1b55e518579e4643d6e46a0c7032e303fbca52327b5db6645362b0f36bb554f984c8d73c94d636c34fdda4824d13e5c594f35d34819cc4425dcbf0083d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f05c3f929fd2ff3401427e8c9f425e
SHA149dffb0a806ca7d3f2f8c7390ebd454faa594da4
SHA25611a0d3c6e67a62c1a98b5a852dde619cc12b89d10bd91ed32910196139d73190
SHA512721aa45628e1b975d98979dbeee6459a060c78d29257641c8891d1ee6d53f79a08cb647cfcf6e010d7b46a95ada4f94240c3bbacb040dd046144360976b358a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585e19cdd5cb304daee9bb499245b0509
SHA14c036d82f689ef5a97cd7551a9f10dd483955a0a
SHA256dd309ffe3295437110cc5a74f763ec05a9d0fdb6a31bfc6ef22f6cda6bd3c601
SHA5128a9141a427e8b60cc10bea108950174154642326eba92675ad96b06055b512e7af79369fac7bc10000bc0f48d024f5d5cb1c56108d6187f452568090f0d284ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535ef08901ec1cde92849294a4f8b0d8f
SHA10c0e719c20b9c9ffb3fbb0540247a6cc6282d4c7
SHA2563c116a6f19fe600aea9222be3c645fb4830ad0eb7329820e7dc4a9d7c0b6b85e
SHA5120490d5b73e158f48eb84a70317a27dbb6d231aa990ab2445867272a2c584691914c3971b35191f603df12513f27fd9759cc4d71948bafe01207822e7a2a80260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5703c16990f5bfc143333045c82c7e657
SHA1e1601385c5d3b1398674b118a713dea0a232edb7
SHA2562da63de85e3fdb3fa320d21670bd8beb7af0f70d20a4198449f1e02eb9bdc06e
SHA512014d89c5796ab5bf8bb312d5d12696e518239d65ead2c0677aa1cde214bf47ac662b776ea357bb01206b64ab6736e8d59b77f3fdcd6664e1446e0cc117bfc218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e15f32e014b1c3c99e8b3c9b1d2e972
SHA16dda0223d6a9f85786d4fce454e4ea5ae891e01b
SHA256b2df4115db9a1c6a2616460e1261a70d78c65c46af12e36c47e43c7b1c7f08c7
SHA51288a410924e131aea8d08d488378d2b55683bcd46d946a40518309d596b2cee35ea83f786439f7d4e9b11967833469e56a76decb7f847eec50570e580bdbb83ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582f237a735b3572631ad087c59748728
SHA14ddeed7b3ea500c9c6cde3973fbd9df4fa199fa7
SHA256bb37471cc3a65eaf56d5e41268a55d13da142d504293c947b3ef7040c53ba7f0
SHA512dd26ce3b9e739d9051441df0a0ae250b3bce8660c124fe5f850c4d23a36792d7e56a87a76b5b459ed39ab6a03d8e5069a0862f0920ff1f8d388c00372a0b2e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe54c43d35e4822ead12061a17ab76ff
SHA1ebf9ba6c99d02cfd7734848d44a1bb910c07ac03
SHA256272008f171386007037f28d5a0a741c6d4fbc4b3d1eba52da18e2c1694da2129
SHA51241605215cea4e19d2aa120ca5535476fdc8f66966457279a7a7cc29c4ac8b23d30e64cf250743be13e3af4eace6f4a79f867a73e28565409dea24087a056d221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982b22df28a5e03d16d0879a7082c03b
SHA18934ceb5a7b9a8f2f03fcc62e9a38aa8c113cfc9
SHA256862128517e1adb97820288ee7c0e933067fd327d71563f357a50b7e5501eda45
SHA5121ce11380ccb7caa51b1302cdedc62c2eecae1533d5eaf56f61cb789b7736a96560197003a81f921cfa331359fb772662c122b2285c591f5fdb2b0ecefa9d788b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54350dbe3066bb7b1d542089d184a38ff
SHA1efa30bc9a13cbc9ff484b50b68c4d7176f82a5d9
SHA256a1bc77903697dea548c2c2dbb56e0898115aabb30acf014723bcd507a56615a7
SHA5129697fb55b494da77e3cc4094f39e5bf71186b6f00653cfb3337f486450ef78e067c9b7863d407931958233b6c9d4d1fdcb5c7ba968fa911b276fa5093cb862f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53235eb7e6fd5ef39ee4e7006846348c7
SHA13fedae3c79c0b15fb5ec96e614e05a1609151bca
SHA25615ffd3a573c86707e5ff2aec30c9c7373cae64aad4d763af77f393cc6f71621c
SHA5129199f93acab7f7bd8e5b52bbd374ba08b304860e0adfd726180d48be73f93b06f93967fadf8f6556afc99fd81ce009ed342c1ce52fffe338197dae6a29888c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2981d969a69b6d9f76373a2b12702e
SHA175550cd0108faa2863f1f0a2b18bd2bca1981b00
SHA256a2f225f39e8981e22c866cbcace4cc2a55f6a61b791228cc96c2ee92747cdf12
SHA5127e199a7ca9873b40b2e8bc1daf631a3106933dc640a31cdb991d25a87085b8a383c62dccfb291b4f37c835bdf7db518fd4ae93bccb09e34b6aeea9881216d930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5448ff20f9fce3abb702ee8ba42d979cd
SHA11d33759fa10a49b52adbd85dda093cb79bc73b0d
SHA25697568cb2143763fff72bf7321ecf2c8e5f82c13c48582d6319c18ae5703b542b
SHA5127417fafbd2e1c2a81fae20fb687e3e544261f40bd5b64243743d34dd3b0487e6b6cd38b93d5680680e645f883e5abbac4332d512bfff2d1321b2571054ae6a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580964ae0715d62de5134f42582f869f3
SHA1cd1ce9752d26bfb43d94d957c5d291b8e32368a9
SHA256d9b59a8862317b5ef14a1a2404eb035c7c9bab04251801dd1e3a191b0032a563
SHA5125210a06174252f61c4bc3122ab540ed4b11a11543be5e38576638988b94151f62333cce03b49431cb9cae047aea1f6c02a2af2e816e0d9d9bc4c16c90190bd0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5090bc5c998c79ff1729cbe04af6f8520
SHA1b7db3d709e03880eead97d71bcf36b8151a799f7
SHA2560e29c11b466ef97738093467f12a3fef2603e8f6d025af80ccd416a41f633ae2
SHA51213e5b992080badad865867bc212143e9d2e0f98ae8be955d12e3267f302a2a1d008a5fd126589148eda2f4bc505707fc0fc3451f00fc1c9000b2aad145f31511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534fe9f4bdbaecd822782e1d49f404c3c
SHA1a2d95d9bf155505dc59aece985f4f5da0c9cf910
SHA2561f211a396ebeced452cba961033ed1a22c19a9f0ea17e0d268e480b63b539568
SHA512e71f2c0a3679e214b96cb399d5579192aa2db3b52dd20a154c20b3e3cb4cc4ba6732edb3d65ba8e0775eda3e8677bd94bf868930d88eae1681d305d457bea0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d0f0060bca9835c8362136c83a3ba8f
SHA110af0b3349eb6bfdec3a14de78f5dfad2ace6c13
SHA2562f186aa274d511e51c02c82468e50b5eb64f73cb18b352a6fa7f4cc1bd896a47
SHA512b708c0242a291f1e4083080c4b414c1c7e34c22a373e212a079e5f76d526ac09dd474662af3709bdf7223e232a439f9512d07d31c49f2fb42ad308a13c781887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f4bacf06d67a8017fffa42ee764744
SHA1978ea79f8b7cce458b0de04ec3f585e9759d5816
SHA2562a6453c5bc909641348609649246e1b90fac1c95ca8e1bad48bb87495bf3aeac
SHA512a935136ee4628202aca28067bab69e3bacf2dff7f1f26def91153f20e5c5f9895c75a526a9d82fdfb136b52dcf78120d4b4967a3403957a1c285c7edda220c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf841ed2b8dc3b6f0038e34a2846e57
SHA10e6f0bdb463cdb36185725b9606410a9b3193789
SHA25663abd03d7819de125c90e50b95082b0498f1b0a9cc945b5bbd3bff3e57b0b3cd
SHA5125bcd908b64bca62d251eae0c8739f9416946ef513e1c1e87ec51b4309b8e27938652b118524e6d34ad088238513c8d7a56f3615053c7546d870709242a66042b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5706c28f5f5c5ba6a3656890b2f398dd4
SHA1819858ba52079aa43b696a584703c940a0540877
SHA2563fa1f494b062bab7450ba245afd2ef61a10bfee22c1643534fd37df20fad40ed
SHA51218bfeb4259453366c42ad3a74216343e4303b23a5ee89275c22cbec0c2f33a83caab467ccb4681fb1e5de5b76defb88a5a322998424c479fa825f4f7962ee35d
-
Filesize
2KB
MD59cdf1e727b41dd7d6eef674ab8e6bf34
SHA1fa8654d8b1a563841792e4d67936739341791d18
SHA2562ba5ffd5e270087b69c155894e83ca4b167aa13975f6cc0bb422aee5ec60f223
SHA5122e80b929b04793aaaa874a540ddc887a5c226d4ccae5f5436e9b3580cf34b358138b772e1f83ec576e892e6b145ae9ac5f33adbb2d43f20089fce9fa125c7aaf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZKZ95V4R\favicon[1].png
Filesize2KB
MD518c023bc439b446f91bf942270882422
SHA1768d59e3085976dba252232a65a4af562675f782
SHA256e0e71acef1efbfab69a1a60cd8fadded948d0e47a0a27c59a0be7033f6a84482
SHA512a95ad7b48596bc0af23d05d1e58681e5d65e707247f96c5bc088880f4525312a1834a89615a0e33aea6b066793088a193ec29b5c96ea216f531c443487ae0735
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
775KB
MD5eb1de7cffd44f3e3279451f089908ca6
SHA1d1c29b20fd6b95adff4b5afac8982e77f61e2ddd
SHA2568f2fd0056dc1d9c7d604b2b7d6d070c7c973de882e2b429ee8b5b6d3b4640e33
SHA512bb47351d058ba938b45e9e73b1cc3c61e589649c1709fdf05b702980760e82a5e7cf277bae4e822bc296696db205bd105bb61e912f3a427909ec7f5ee5ac97cc
-
Filesize
302KB
MD51b1d204ffccda58c9d6101e348c7bbb8
SHA1bf73b49a7db21fa2bfbb111dc06a163f14b4f657
SHA256e950963a8f60b5981af47607c54687c0e8d31edac56c03aafde552a418074ba7
SHA5122295d8b7ea494db0727b0aca964c94035ff05e4a863e35027e0ab274392263a64d9b05ee5309d72aca20f6cf20019c547a3acc3d391ff2182af890874ac1a93f
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
764KB
MD51a8ac942e4c2302d349caaed9943360d
SHA1a08ce743c3d90a2b713db3e58e747e7a00a32590
SHA256db8341fc8e86f7b80fbe144aa9ceea3e3369b64dcd5998c5a7f186c304cfeb96
SHA512d65e4f9846bb6fba5a8b4f9409b2576af041dfa9b453800c298ec810bd27cfcf28d1933bc79893aa79323654ab4b85e321b03eaf17d67f0e19c79749751e4aab